Hands-On Server 2019 Post-Assessment Quiz Review

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Booker is the IT administrator for Juan Computing. He receives a request to install Windows Server 2019. One of the accompanying requests is that the data stored on the server will be accessed and modified frequently by hundreds of users. Which of the following should Booker consider using for the installation?

a. An SSD

Anita logs into her personal computer and begins streaming a movie from ArkanShotz. She simultaneously opens a Microsoft Word file on her laptop and starts jotting down notes to help her write a review of the movie. To calculate some numbers that she needs to plug into the article, she opens a calculator on her smartphone. Which of the following is true of this scenario?

a. ArkanShotz is an example of a Web app.

Which of the following is true of the Infrastructure Master Active Directory FSMO role?

a. It is used to coordinate group membership.

Jsmith is a member of two groups in your organization, the Accounting group and the Contractor group. He wants to save a file to Folder A on his local computer but finds he has no access. Upon investigating, you discover the Accounting group has Full control over Folder A, but the Contractor group has been denied all access to the folder. What is Jsmith's effective access?

a. Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

Lisa attempts to increase the priority of a print job to allow it to print before other print jobs are submitted by other users. However, she is unable to do so because of a restriction. Which of the following limitations placed by Windows Server 2019 may be causing this issue?

a. Lisa does not have Manage Documents permission.

The queue status in the Print Management window shows Attention Required. The print server does not have the LPD service installed. Which command will you use to mitigate this problem?

a. Restart-Service spooler

In the past, you have faced issues with the response time of a Windows Server 2019 system, SERVERZ, in your organization. To avoid future problems, you create a data collector set called SERVERZ Data Collector Set. Which of the following predefined data collector configurations will you use?

a. System Diagnostics

Barack configures a Window 2019 server as a DNS server. He creates forward and reverse lookup zones on the server to provide authoritative responses. A client contacts the DNS server for a lookup request, but the request cannot be resolved using the zones. Which of the following is true of this scenario?

a. The DNS server will attempt to resolve the request by performing a recursive query using the root hints.

Which of the following statements accurately reflects the default permissions applied to printers?

a. The Everyone group has Print permission.

Read the script below and answer the question that follows. $answer = Read-Host "Would you like to run the WebsiteCache script? Yes/No/Quit" if ($answer -eq "Yes" -or $answer -eq "Y") {"Caching Websites - Please Wait"; & C:\WebsiteCache.ps1} elseif($answer -eq "No" -or $answer -eq "N") {"Caching Aborted"} elseif($answer -eq "Quit" -or $answer -eq "Q") {"End Program"; Start-Sleep 3; exit} else {"Caching Websites - Please Wait"; & C:\WebsiteCache.ps1} If a user executes this code in Windows PowerShell and enters "Okay," what is the result?

a. The WebsiteCache script will be executed successfully.

Aslam is configuring a DHCP server in his organization. During the creation of a new scope, he is prompted to enter an exclusion range. If Aslam chooses to leave this range empty, which of the following will indicate that Aslam has made an incorrect choice?

a. The organization contains computers with manually configured IP addresses.

Fang creates external and internal virtual switches on a server that has Hyper-V installed. Which of the following statements is true of the physical network interface in this scenario?

a. The physical network interface should not be configured to use IP.

A Read-only Domain Controller (RODC) cannot be used to update information in Active Directory, and it does not replicate to regular DCs.

a. True

If a WSUS server is implemented in an organization, updates must be approved on the WSUS server before they can be installed on computers.

a. True

Peer-to-peer networking offers only moderate network security because user account information must be maintained on each workstation.

a. True

Windows 7 clients can be allowed to use DirectAccess.

a. True

Windows Deployment Services can be used to rapidly deploy Windows Server 2019 to physical servers that are connected to the network.

a. True

Windows Server 2019 allows you to enable data deduplication for NTFS and ReFS volumes that are not the boot or system volume.

a. True

Riya has an external storage area network device that she wants to connect to the Windows Server 2019 operating system. Which of the following protocols can she use to connect her device to the operating system?

a. iSCSI

You are troubleshooting a network issue on your server and suspect the issue exists beyond your gateway/router, in another LAN. Which of the following commands will you use to test the connectivity to the router in the other LAN?

a. tracert

Which TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

b. 443

Which of the following statements is true of Distributed File System (DFS) namespaces?

c. It does not have to be installed on all the servers within an organization.

Fault-tolerant RAID volumes ensure that you no longer need backups.

b. False

Microsoft Hyper-V is a Type 2 hypervisor.

b. False

Modern operating systems such as Windows 10 do not support NetBIOS and use FQDNs instead.

b. False

When a BPA scan used to verify server roles, the analysis of each role yields a report that shows four levels of severity.

b. False

Which Registry root key has information about the current hardware profile?

b. HKEY_CURRENT_CONFIG

Which of the following statements is true of the primordial storage pool?

b. It lists the four available local storage devices in the physical disks.

Malcolm installs Windows Server 2019 on a physical server in his organization to run Windows Web apps. One of the Web apps that Malcolm intends to run on this server requires a large amount of object storage. How can Malcolm address this requirement?

b. Malcolm can configure the app to access object storage on a cloud provider.

You set up a Windows Server 2019 system and install the Docker EE package. Next, you run the following command to enable LCOW: PS C:\> [Environment]::SetEnvironmentVariable("LCOW_SUPPORTED", "1", "Machine") Which of the following commands should you run next to complete setting up LCOW?

b. PS C:\> Restart-Service Docker

Nargiza, a system administrator, is setting up user accounts for a newly recruited graphic designer whose name is Philip Thomson. Active Directory is set up on Windows 2019 Server. Which of the following can Nargiza use as the account name?

b. Philip.Thomson

Nancy is a system administrator working in a multinational corporation. She often receives complaints from her colleagues that people take the wrong printed documents because of the large number of print jobs. How can Nancy sort this issue?

b. She should configure a separator page.

Dorene, a system administrator, is configuring a DHCP relay on the remote access server. She adds an IPv4 relay agent and specifies the IP address of the DHCP server that contains the scope for the DMZ network. What should Dorene do next?

b. She should configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.

A small-scale organization uses a WPA2 wireless LAN to provide Internet access to its regular visitors. It was later found that some people passing by the office building used Aircrack, a cracking tool, to access the Internet through the organization's WLAN. Upon consulting with experts, the organization decides to use a RADIUS server to block such tools. What do you think made it so easy for outsiders to crack and use the organization's WLAN in the first place?

b. The WLAN allowed users to connect to the Internet using the same password.

Identify the next step in the printing process after a document to be printed has been generated.

b. The software application contacts a print API.

Which of the following is true of user quotas?

b. They limit the space that users can consume within the filesystem.

Your organization uses Windows Server 2019, and you recently installed a fresh copy of Windows Server 2019 Standard Edition on a system. Which of the following statements is true if the domain controller automatically activated the license on this new system?

b. You received a generic volume license key (GVLK) with Windows Server 2019 installation media.

Which of the following commands can be run to perform a check on F: drive and fix any errors found with the filesystem?

b. chkdsk /f F:\

Which of the following commands can be used on the Command Prompt Window to run the Windows Defender Firewall with Advanced Security tool?

b. wf.msc

Raisa is configuring the logging properties for the sales department on the RADIUS server. She wants the server to only log specific events. Raisa selects Sales on the Network Policy Server tool. Which of the following options should Raisa select next?

c. Change Log File Properties

Which of the following refers to a temporary space for files that need to replicate to other systems?

c. DFS staging folder

Keanu, a system administrator, created a virtual machine using the default settings. After a few weeks, he notices that the virtual hard disk is almost full, so he decides to expand the hard disk. He opens the virtual hard drive settings and is faced with multiple options. Help Keanu pick the correct settings option.

c. Edit

As a system administrator, you will be tasked with performing both proactive and reactive maintenance of a Windows Server 2019 machine. Which of the following tasks will you perform as part of proactive maintenance?

c. Ensure that 20% free space is always available for file caches.

Nathaniel, a system administrator of a marketing firm, has noticed unusual activity consistent with a malware attack. After some research, he finds out that the firm's private key has been compromised, and he needs to revoke the compromised certificate. What steps should Nathaniel follow to find the option to revoke the compromised certificate?

c. Go to Issued Certificates, right-click the relevant certificate, and click All Tasks

Sakura, a system administrator, is making some changes to the domain-level GPO in her organization. These changes must be applied to all users and computer accounts. She knows that some of the OUs in the Active Directory have GPO settings that prevent the application of any domain-level GPO changes. What should Sakura do to ensure that changes in the domain-level GPO are applied to all users and computer accounts?

c. She should configure the GPU link with the Enforced setting.

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019, installs server roles and features, and adds third-party software. The next step is to remove all unique information from this computer. Which of the following tools should Abu use?

c. System Preparation Tool

Gabriela attempts to share a folder with other users via NFS sharing. However, she is unable to do so because of a restriction.

c. The folder is on a FAT32 filesystem.

Trent is the system administrator at an organization that has offices in three countries. The Human Resources department has its own domain, domainHR.com, and has two domain controllers in each country. The domain controllers are named DC1, DC2, DC3, DC4, DC5, and DC6. To improve the efficiency of Active Directory replication, Trent decides to create sites for each location. Trent creates the only site in the domain HR.com root forest at the location that contains the domain controllers DC3 and DC4. Which of the following is true of this scenario?

c. The site will be named Default-First-Site-Name.

Priscilla is configuring a new Web server in her organization. A common complaint across the organization is that Web apps load slowly. Her manager asks her to configure IIS in a way that improves the loading of Web apps. Which of these IIS role services should Priscilla install to help with this?

c. Web Server Performance

Runako is configuring DHCP options on his organization's DHCP server. He has configured the default router option and the time server option. Next, he wants to configure the DNS Servers option. Which option number is Runako likely to choose to complete this task?

d. 006

Ayan is a system administrator at an organization that has a high rate of employee churn. This means that a high percentage of employees leave the organization over a specific time period. In addition, the organization also sees a high percentage of previous employees returning to the company. When a user leaves this organization, which of the following cmdlets is Ayan most likely to use?

d. Disable -ADAccount

Nova, a Web app developer, builds an application that she wants to make available to other developers. She wants to distribute it along with the container image that is configured to run the app. Which of the following can host Nova's Web app?

d. Docker Hub

One of the common applications running on Safara's system has not been receiving automatic updates. She suspects that the update service for the application has turned off. She wants to view a list of services on the system. Which of the following PowerShell cmdlets should Safara run?

d. Get-Service

What statement correctly describes the pathping command?

d. It can be used to test network latency in milliseconds.

Norman installs the Windows Server 2019 Essentials Edition on a server. He needs to send out a note to his team explaining the features and limitations of the server.

d. It does not include the Hyper-V role that is used to manage virtual machines.

What is the feature that allows a WDS server to send a bootable WIM copy to be installed by multiple clients simultaneously?

d. Multicast

Pascal installs the Remote Desktop Services server role on multiple servers in his organization. He intends to allow users remote access to the organization's resources in the DMZ. Because multiple users will be creating remote sessions, Pascal wants to ensure that this load is balanced across the servers with the Remote Desktop Services server role installed. Which of the following role services will allow Pascal to accomplish this?

d. Remote Desktop Connection Broker

Which of the following is a tool that a server administrator would typically use first while facing a problem with the performance of a system?

d. Task Manager

Ksenia sets up the DNS Server role on SERVERX. Next, she sets up a primary and secondary zone, followed by a stub zone. Which of the following is true of this scenario?

d. The stub zone will contain NS records.

Maryann is working on a system that is connected to the Active Directory domain of her company, Fixvent. She is performing a few server administration tasks using Server Manager. The server that requires these administration tasks is running Windows Server 2019. If Maryann uses the Remote Server Administration Tools (RSAT) to complete these tasks, which is the most likely operating system on her computer?

d. Windows 10 Professional


संबंधित स्टडी सेट्स

Vitamins and fat-soluble vitamins

View Set

Human Anatomy and Physiology - Cardiovascular

View Set

Microbiology Chapter 8: Microbial Genetics and Genetic Engineering

View Set

PTA 140 Ther Ex - Final Exam Study Guide

View Set

Renaissance and Protestant Reformation Test

View Set