Enterprise final
You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory.
A stub zone
Which of the following is a requirement for using Storage Spaces Direct?
A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.
What is Group Policy, and why is it used?
Group policy provides people security on computers and makes sure that people only access what they are allowed to access if the policy applies to them.
Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue.
IQN is not present in the access server list.
Which of the following is true of WINS?
It can only resolve NetBIOS names to IPv4 addresses.
Which of the following is true of WINS?What is the difference between stub zones and conditional
It can only resolve NetBIOS names to IPv4 addresses.
Why does IIS contain an FTP server service? What is the alternative option for Web app developers who do not want to use this service?
It has a FTP server to provide FTP access on your web server. NAS is the alternative to it.
Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?
After selecting the role services that Aria wants to install
Which of the following organizations does not need to install a WINS server?
An organization that has disabled NetBIOS on its computers
In the context of DHCP, why do organizations use MAC address filtering?
It restricts IP leases to computers purchased by the organization and it can prevent one or more computers from obtaining an IP lease from a DHCP server while allowing all others
What is the use of group NetBIOS name records?
Can identify unique computers and groups
What makes Nano Server container images great for Web Apps?
Can run containerized Linux Web apps using LCOW, or containerized Windows Web apps built using Nano Server for resource efficiency
Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network.
Carlos sets the lease duration to 7 days
If users report errors when trying to save or open files, what would you do as an administrator?
Check on the file, see what the problem is, and find out if they can fix it or if they have to call someone
List the options that are listed when you right-click a process on the Details tab of Task Manager.
End process tree ends the process and all associated subprocesses. Set priority can be used to increase or reduce the amount of processor time that the system dedicates to running the process. Set affinity allows you to specify the physical and logical processors on which to run the process. Analyze wait chain shows the threads or processes that are blocking the process. UAC virtualization allows you to run the process as a standard user, while still allowing the process to perform privileged tasks on the system.
What is the first step in troubleshooting an issue where a single computer is unable to lease an address?
Confirming that the computer has a physical connection to the network
Rahul is a systems administrator in a multinational corporation. As part of the routine auditing process, he checks the Security event log and finds out that there was a failed attempt to view a file on the server. He remembers that there was a similar attempt made a year ago. But he is not able to find the event in the log file. Can you explain the cause of the problem?
It was deleted because it was on there for to long, so if he wants to keep things like that he'll have to extend the size limit which would let him keep it.
Describe Windows Subsystem for Linux (WSL).
It's a set of OS components that allows 64 bit Linux programs to run on Windows kernel without virtualization.
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?
Jabez created a shared folder that is accessible to remote servers in the collection.
After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running?
PS C:\> docker ps
Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result?
PS C:\> docker pull microsoft/iis
XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?
Published the software under Software Settings in the User Configuration
Discuss the authentication provider and accounting provider options that are available when configuring the security properties for a remote access server.
RADIUS Authentication RADIUS accounting
How do you create a RAID level 1 volume with two disks in the Disk Management tool?
Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks
Which of the following statements is true of SAN devices?
SAN devices are functionally like an external USB drive.
Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue?
SERVERA does not have a NetBIOS name record on any WINS server.
Aster has created new firewall rules in Windows Defender. One of the new rules appears to cause an error. Aster thinks that the rule itself is the issue. Describe the steps she should follow to eliminate the rule as the cause of issue.
She could see what the error is and what it's saying it's not allowing. For example a rule could say it won't allow traffic from a certain IP address if the problem says that you can't get traffic from that address then remove the rule that says that. If it's not the rule consider some other factors on the computer.
Lisa, the system administrator of a bank, is going on a sabbatical for 12 weeks. Before leaving, she must prepare a knowledge transfer document to assist her colleague who will oversee her responsibilities in her absence. The document must include a report of the properties and settings of the GPOs. List the steps that Lisa needs to follow to obtain this report.
She could find a lot of it in the group managment policy tool and put it in a document.
Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85.
The IP addresses were configured manually
You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container. Which of the following is true of this scenario?
The Linux kernel provided by Docker runs on the Hyper-V hypervisor.
Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?
The NAT router should be a Next Generation Firewall.
What are the two main tools in Windows Server 2019 that you can use to create and manage local volumes and how do they differ?
The disk management app and server manager. Disk management can use up to 32 storage devices while the server manager can use unlimited storage devices.
Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work?
The issue was with the software and not the operating system.
You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario?
The list of Windows container images will be displayed.
Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay. If true, which of the following would justify this choice?
The organization contains DHCP relay agents in different locations.
You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate?
The percentage of time a storage device was not performing a read or write function
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?
The performance of file sharing applications will increase.
The subnet mask cannot be modified once a scope is created.
True
When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found.
True
Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes?
Theodore used the sudo passwd root command.
While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?
WID connectivity
Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?
Trang should select the network interface that is connected to the DMZ.
The hard disk of a Windows Server 2019 system in your organization has crashed. Unfortunately, the boot volume was on the hard disk, and you happen to not have a backup of the operating system. What will you do in this situation?
Use full backup of the operating system Power down the system and replace the failed storage device. Boot the system using Windows Server 2019 installation media and click Repair your computer at the Windows Server 2019 installation page Click Troubleshoot, and then click System Image Recovery. Click Windows Server and supply the location of the full system backup in the Re-image your computer wizard.
Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.
false
The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content.
false
The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.
false
The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.
false
The terms "program" and "process" are one and the same.
false
To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor.
false
Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations.
false
WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does.
false
When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition.
false
How will you troubleshoot a performance issue if the information available in Task Manager is not sufficient for you to identify the root cause of the problem?
go to the resource monitor
Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation?
memory integrity settings
What command can you use to determine if a network service is listening on the correct port number?
netstat -a
Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use?
a replication partnet
Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change?
apachect1 configtest
If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?
allow connection if its secure
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?
web app proxy
Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?
network device enrollment service role service
Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering.
next gen firewall
You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue?
reboot the router
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?
remote clients
Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?
remote desktop protocol
Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX.
repository
Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option?
reservations
Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?
rory used the shadow option
What logs are created by Windows for reporting general operating system and software application events?
system logs
Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been?
the space for file cache was not sufficient
Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk.
true
You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server.
true
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?
12 TB
You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?
1701/TCP
How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?
1MB
What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?
2048 encryption
You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name.
A PTR record
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?
A man-in-the-middle attack
Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes.
A new copy of Reena's file is created and associated with the same file name.
Explain continuous deployment.
A process where newer versions of apps meant for the web are sent to a cloud provider to test and deploy it. This is to make sure that it works the way it's supposed to and that it's most of all safe.
Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other.
A replication partner
What resource record type defines an IPv6 host address in DNS?
AAAA record
How does a remote access client determine the creation of an IPSec tunnel to connect to a remote access server using DirectAccess?
Because direct access provides automated secure remote access for computers joined to an Active Directory domain
David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?
By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts
Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service?
By using the /spotfix option with the chkdsk command
Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result.
Clear the DNS Server cache, and clear the DNS cache on the resolver
What is the difference between stub zones and conditional forwarders?
Conditional forwarder doesn't participate in zone transfers and stub zones do Another is with conditional forwarders if a query is sent the the DNS server it will do a recursion and find the answer to the query and with a stub zone a referral is given to the resolver.
How will you configure an existing Windows Server 2019 system as an iSCSI SAN device?
Configure iSCSI target on the iSCSI SAN device Ensure server can connect to it Connect a Ethernet cable from a iSCSI compliant network interface on a server to an Ethernet port on your iSCSI device Configure the iSCSI initiator on your Windows Server 2019 system to connect to the name or IP address of the SAN device
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data.
Create several thin-provisioned virtual disks
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR.
Create the partitions and label one of the partitions as extended
Alya runs the following command in Windows PowerShell: docker run -d -p --name cont1 kerinapp. What does the -d option do in this scenario?
Detaches the container from the previous PowerShell session and has it running in the background until you tell it to stop with the docker stop command
Emory install the WSL feature on a Web server. Next, she installs an Ubuntu Linux distribution and creates a new Linux user account, EmoryJ. She logs into the Ubuntu system using this user account. Which of the following is true of this scenario?
Emory can use the EmoryJ user account to run administrative commands as the root user.
What constraints are available for use in a remote access policy?
Encryption strength, Idle time out, IP packet filters
You are a system administrator and all the computers on your organization's network are unable to lease addresses from the DHCP servers. How will you fix this issue?
Ensure that the DHCP Service is running Start the DHCP service by, highlighting the server object in the navigation pane of the DHCP tool Select More Actions Select All Tasks Click Start from the Actions pane.
Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?
Extensible Authentication Protocol (EAP)
Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition—either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module. Which of the following justifies Ezra's choice?
Ezra intends to run Linux containers on the server
Anthony is a server administrator and has been asked to configure and issue the Root Certification Authority certificate to all the users in his organization. The default template is a schema version 1 template, but Anthony wants users to be auto-enrolled. Briefly outline the steps Anthony can follow to create a new template to ensure that users are auto-enrolled.
He can create a copy of a schema version 1 that uses schema version 2 Right click schema version click duplicate template to make a copy and make it version 2 Modify the template to suit your needs This is necessary because schema version 1 won't let you auto enroll, but version 2 will
Dev is configuring the DHCP server in his organization. He wants to restrict some computers from obtaining an IP lease from the DHCP. How can he achieve this?
He can respond only to DHCPDISCOVER packets containing a MAC address from an organization computer and respond to all DHCPDISCOVER packets except blacklisted addresses
Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem?
He can use the Filter Current Log option in the Actions pane in Event Viewer.
Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks?
Hire the services of a third-party Certification Authority
How is a simple volume created in Server Manager?
In Server Manager select the TASKS drop-down box in the VOLUMES pane Click New Volume to start the New Volume Wizard Respond to promptsSelect the storage deviceSpecify the size of the volumeVolume assigned the next available drive letterChoose a folder path to the volume or make a partition Select the formatting options for the volumeIf you select Generate short file namesMS-DOS-compatible filenames will be generated for files created on the filesystem that have a name longer than 8 characters (before the file extension) for backward compatibility to older applicationsCreate the volume
Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead?
Install a WINS server
Explain why optimizing volumes is necessary.
Lets you defragments volumes which makes them faster to access
By default, where are updates synchronized from in WSUS?
Microsoft Update servers on the Internet
Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server?
NS record
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.
NTFS is a journaling filesystem, while FAT32 is not.
Runako wants to build a social networking website and host it using a PaaS provider. The social networking website will have users posting and sharing large quantities of media such as videos and images. He is currently evaluating the storage options that the app will need. Which of the following storage options should Runako use and why?
Object storage, because it allows a Web app to directly store objects
When implementing a VPN server on Windows Server 2019, what are the four remote access tunneling protocols available for use, and how do they differ?
Point-to-Point Tunneling Protocol: Encrypts data using Microsoft Point-to-Point Encryption (MPPE) Layer Two Tunneling Protocol (L2TP): Encrypts data packets using encryption keys varying in length Internet Key Exchange version 2 (IKEv2): Faster than L2TP and it uses 256-bit encryption keys and requires that remote access clients and servers authenticate to each other using an IPSec encryption certificate or preshared key. secure socket tunneling protocol (SSTP): Uses Secure Sockets Layer (SSL) encryption with 128-bit keys and it uses Transport Layer Security (TLS) encryption with 256-bit keys
Can you distinguish between proactive and reactive maintenance with examples?
Proactive maintenance minimizes the chance of future problems and their impacts This is usually identifying a problem before they occur Reactive monitoring corrects numerous problems during monitoring For example investigating accidents and incidents
Which of the following RAID level configurations is not supported by Windows Server 2019?
RAID level 2
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?
Remote Desktop Gateway
What are the different role services available for the Remote Desktop services server role?
Remote desktop connection broker Remote desktop gateway Remote desktop licensing Remote desktop session host Remote desktop virtualization host Remote desktop web access
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?
RemoteApp
Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next?
Reno should turn off debug logging.
What are the advantages of implementing a Windows Server Update Services (WSUS) server in an organization?
Resolves potential bandwidth saturation problems Helps coordinate updates on computers Performs synchronization Ensures computer gets updates
List and briefly describe the folders in the Certification Authority tool that are used to manage and configure most CA functionalities.
Revoked certificates: lists certificates that have a future expiry date but should not be used Issued certificates: lists certificates that have been issued to users and computers Pending requests: lists certificate requests that must be approved by a server administrator before they are issued to a user or computer Failed requests: lists certificate enrollment requests that cannot be completed because the request did not match the criteria in the certificate template. Certificate templates: lists the certificate templates that are used by the CA to process certificate enrollment requests.
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system.
Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.
Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following options should Merlyn choose?
SaaS
Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do?
She should create the Web app using ASP.NET.
Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?
She will select the Demand-dial connections service.
Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario?
Some of the resource records for N2001EY will be made available for scavenging after 28 days.
Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?
The Block Inheritance setting prevented the OUs from applying the GPOs.
Explain the DHCP lease process
The DHCP lease process is where a DHCP client requests IP configuration from a DHCP server involves several stages: Client sends a request to all hosts on the LAN DHCP server sends an offer that has a potential IP configuration DHCP client then accepts the offer by sending a DHCPREQUEST packet to the associated DHCP server DHCP server sends to the client an acknowledgement indicating the amount of time the client can use the IP configuration Client configures itself with the IP configuration When it's halfway thoruhg its lease time it'll send a DHCPREQUEST to renew the IP configuration When the lease it up it'll discard it's IP configuration.
Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue?
The FQDN in the HTTPS certificate does not match the Web server FQDN.
Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server?
The MX record
TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data. Which of the following is true of this scenario?
The TravelBugz app communicates with the Web app using the TCP/IP protocol.
Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario?
The client will contact the Web server with the address 172.6.0.15.
To prevent man-in-the-middle attacks, Janet, a network administrator, configures a GPO such that all the traffic sent toward a specific database server is encrypted using IPSec. While most of her colleagues are able to successfully connect to the database via the IPSec authentication process, the connection is not successful for some computers. What do you see to be the problem here?
The computers did not have an IPSec certificate.
Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website?
The first website is using port 443, so the second website cannot use the same port.
How do last mile technologies impact the speed at which an organization can transfer information over the Internet?
The speed of you transferring info over the internet is limited by the speed of tech that connects the organization to ISP and that technology is last mile technology.
Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option.
The system uses SDD not HDD
Describe the need for and process of changing the default folder for downloaded container images.
This controls where you put your downloaded container images, so it's better to know where they are. You can create the (folder location) text file and edit the contents to specify the appropriate path
Tuyet types the following statement into File Explorer: \\serverA\Share1. The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week. Which of the following is true of this scenario?
Tuyet's computer's name record will be deleted from the WINS server.
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI.
Using hardware RAID externally to provide fault tolerance
Describe the use of virtual directories in the context of Web servers.
Virtual directory associates a directory name in a Uniform Resource Locator (URL) to a folder on the filesystem containing website and Web app content
What are the four main features provided by Windows Defender that can be configured? Give a brief description of each feature.
Virus and threat protection: does malware scans on your computers and helps you find ransomware on your computers Firewall and network protection: sets up a firewall when connected to a domain, private, or public network App and browser control: allows you to configure the action taken when new apps are accessed from the Internet, as well as configure app exploit protection features. Device security: says if your computer does UEFI secure boot and supports core isolation feature
List the sequence of events that takes place to ensure that data is encrypted during the transfer when someone accesses a website.
Web browser downloads the public key of the server. Web browser generates a symmetric key that it will use to encrypt traffic to and from the Web server. Web browser encrypts the symmetric key using the web servers public key Web browser sends the encrypted symmetric key across the network to the Web server Web server uses its private key to decrypt the symmetric key that was encrypted using its public key Both the server and browser use the symmetric key to encrypt traffic passed between them
Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?
When a user account has the Control access through NPS Network Policy option set
The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?
While installing WSUS, the option Store updates in the following location was deselected.
You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why?
Yes. Events related to hardware issues are usually recorded in the system event log.
How do you resolve a DNA-related problem caused by an invalid DNS cache entry?
You clear the DNS cache entries for DNS lookup
Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured?
activate the server in active directory
Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?
certlm.msc
Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet?
check with the program vendor for an update
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening.
click set deduplication schedule
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?
direct access
You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list?
docker container prune
Asher, a system administrator, wants to run containers on Windows Server 2019. He chooses to install Docker using the Windows containers component. Which of the following is a service that will help Asher manage and run Docker containers on the server?
docker daemon
Which of the following is true of Group Policy Objects (GPOs)?
don't apply to active directory groups
Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use?
error pages
Block storage can easily be shared by several different Web apps, virtual machines, or containers.
false
If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.
false
Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system.
iSCSI target
Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information?
increase size limit of event log
VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario?
infrastructure as a service
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?
mounting
What information must be provided in order to configure an IPv6 DHCP scope?
name for the scope, description for the scope, and the scope prefix.
Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time?
performance monitor
Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?
profile pane
You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use?
security
You just completed troubleshooting a server role issue with the help of the Setup event log. How will you save the events shown in the event log for future reference?
select the event log in the navigation pane, click Save All Events As from the Actions pane, and specify the file location and format.
What is a starter GPO, and how is it created?
starter GPO: A template that can be used to simplify the configuration of Administrative Templates in new GPOs. Right click starter GPO in the group policy management tool, click new, and specify a GPO name
Identify the option that can be used to create storage pools that include storage devices from different servers on a network.
storage spaces direct