IST Test3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A [a] _________________ - [b] __________________ [c] _________________ Primary DNS Server contains a read-write copy of a zone file in its Active Directory Database

?

Move the terms in the correct order to demonstrate the DHCP Lease process

1. Discover 2. Offer 3. Request 4. Acknowledge

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.

False

Match the definition to the resource record 1Resolves FQDN to an IP address 2Resolves one FQDN to another FQDN; also called an alias 3Resolves and IP address to an FQDN 4Identifies the email server

I. A II. CNAME III. PTR IV. MX

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?

Click Set Deduplication Schedule

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?

Selected Answer: b. Every backup only backs up data that has been modified since the previous backup.

Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option?

Selected Answer: c. The system uses an SSD and not an HDD.

If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured

Selected Answer: enforced

________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.

Selected Answer: filtering

To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window

Selected Answer: gpupdate

The first step in troubleshooting DNS typically involves testing the forward lookup zone with _______________________ (not PING)

Selected Answer: nslookup

Which of the following are/ can be included in a certificate(all that apply)

Selected Answers: Public Key Digital Signature CRL location the location of the CAs public key certificate name a serial number

A DNS server that contains resource records for one or more zones is _____________ for those zones

Selected Answer: authoritative

A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)

Specified Answer for a group Specified Answer for b policy Specified Answer for c object

Type in the UNC including the slashes in the correct direction to access the QTR1 folder on the server with the NetBIOS name bluedog (no space) [a]Slash(es)______________ [b]text_____________[c] Slash(es) _____________[d]text__________

Specified Answer for: a \\ Specified Answer for: b bluedog Specified Answer for: c \ Specified Answer for: d QTR1

[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings

Specified Answer for: a administrative Specified Answer for: b templates

You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings

Specified Answer for: a block Specified Answer for: b inheritance

A DNS server containing no zones is a [a] ________________________ [b]_________________ DNS Server

Specified Answer for: a caching Specified Answer for: b only

Most organizations will configure DNS servers as [a]______________ [b]_____________ to relay lookup request that they cannot resolve to ISP DNS servers

Specified Answer for: a default Specified Answer for: b forwarding

The [a]____________________ [b] _____________________ feature of DNS is used to create SRV records to locate Active Directory Services

Specified Answer for: a dynamic Specified Answer for: b update

A [a]___________ [b]__________ is when DNS Servers resolve a FQDN to an IP Address

Specified Answer for: a forward Specified Answer for: b lookup

To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings

Specified Answer for: a group Specified Answer for: b policy

To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manager

Specified Answer for: a group Specified Answer for: b policy Specified Answer for: c management

To fix missing or mis-configured DNS records you can use [a]______________ / [b]_____________ at the command prompt

Specified Answer for: a ipconfig Specified Answer for: b registerdns

HTTPS uses a [a] __________ key and a [b]__________ key

Specified Answer for: a public Specified Answer for: b symmetric

A [a]___________ [b]__________ is when DNS Servers resolve an IP Address to a FQDN

Specified Answer for: a reverse Specified Answer for: b lookup

[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.

Specified Answer for: a revoked Specified Answer for: b certificates

DNS Servers contain a [a]________________ [b] _____________ file that contains IP addresses of DNS servers holding top-level DNS zones

Specified Answer for: a root Specified Answer for: b Hint

The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.

Specified Answer for: a security Specified Answer for: b settings

As with conditional forwarders, a [a]______________ [b]_____________[c] _____________forwards request for a target directly to a DNS server in the target organization

Specified Answer for: a stub Specified Answer for: b dns Specified Answer for: c server

EFS uses both [a] __________ and [b] __________________ encription

Specified Answer for: a symmetric Specified Answer for: b asymmetric

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?

The performance of file sharing applications will increase.

There is also a Local Computer GPO

True

To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority

True

You can configure a __________________ server for NetBIOS name resolution

WINS

You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be

b. Create the partitions and label one of the partitions as extended

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?

c. 1 MB

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

c. Mounting

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?

c. 12 TB

Identify the option that can be used to create storage pools that include storage devices from different servers on a network.

a. Storage Spaces Direct

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

a. RAID level 0

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

a. Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.

a. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

Software that is ___________________ under software settings is automatically installed

assigned

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?

b. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

The first CA deployed is known as the ________________ CA

root

The CA public/private key pair expires every ____________ years. (provide number) by default

5

To configure a 2019 server as a DHCP server you must ___________________ the scope

Activate

Match the option (aka Scope Option) with the Provides the IP address of the default gateway to the client Provides the IP address of the DNS server to the client Provides the IP address of the WINS server to the client Changes the node type for NetBIOS name resolution 0x08 says query the WINS Server first for NetBIOS name resolution and if that doesn't work broadcast the query

B. 003 C. 006 D. 044 A. 046

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?

Create several thin-provisioned virtual disks

To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)

MMC

A GPO can be linked to a- pick all that apply

Site Domain OU

A [a] _____________ [b] ____________ [c] _______________ [d] ____________ server configures a network interface (on the clients) with the IP address automatically(use complete words)

The correct answer is DHCP

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?

Using hardware RAID externally to provide fault tolerance

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

b. iSCSI initiator

Which of the following RAID level configurations is not supported by Windows Server 2019?

c. RAID level 2

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?

d. NTFS is a journaling filesystem, while FAT32 is not.

Which of the following statements is true of SAN devices?

d. SAN devices are functionally like an external USB drive.

A _____________ DNS server contains a read-write copy of a zone

primary

The ____________________ has the IP configuration for your clients on your network

scope

A___________ DNS server contains a read-only copy of a zone

secondary

Each part of a namespace is a _________________________

zone


संबंधित स्टडी सेट्स

Construction Methods and Equipment

View Set

Series 7 Simulated Exam Wrong Questions Only

View Set

gravity, eclipses and tides review

View Set