ITN 200 Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?

1 MB

Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?

12 TB

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?

2048-bit encryption

Which of the following is a requirement for using Storage Spaces Direct?

A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup?

A PTR record A PTR record resolves an IP address to an FQDN. This is the record that you need to use to perform a reverse lookup.

Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019?

A new copy of Reena's file is created and associated with the same file name.

Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use

A replication partner

You are administrator for an Active Directory domain and have been tasked with improving response time for resolving DNS queries for resources in a second company owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?

A stub zone Stub zones contain NS and host records that allow a DNS server to access an authoritative zone on another DNS server. Creating a stub zone involves the least overhead

What resource record type defines an IPv6 host address in DNS?

AAAA record An AAAA record resolves an FQDN to an IPv6 address

Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose?

Advanced

Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?

After selecting the role services that Aria wants to install

If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?

Allow the connection if it is secure

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers

Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled?

Autoenroll

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers?

By using a WMI filter

Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service?

By using the /spotfix option with the chkdsk command He can use the /spotfix option with the chkdsk command to only fix errors that were previously identified by the Spot Verifier service.

Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network. Which of the following decisions should Carlos reevaluate?

Carlos sets the lease duration to 7 days. Carlos should reevaluate his decision to set the lease duration to 7 days. A lease time of 7 days is appropriate for most networks that contain desktop PCs, but he should lower the lease time on networks that provide IP address configuration for mobile devices.

Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

Clear the DNS Server cache, and clear the DNS cache on the resolver

Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening.

Click Set Deduplication Schedule

Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish?

Create several thin-provisioned virtual disks

You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be?

Create the partitions and label one of the partitions as extended

Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard?

Damien should not select the Use force tunneling option.

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?

Demarcation point

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?

DirectAccess

Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?

Every backup only backs up data that has been modified since the previous backup.

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?

Extensible Authentication Protocol (EAP)

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. T/F

FALSE

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. T/F

FALSE

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering. T.F

FALSE After creating a forward or reverse lookup zone, you can manually create resource records in a zone. For zones that allow dynamic updates, you still need to manually create CNAME and MX records as well as host records that provide for round robin or netmask ordering.

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order. T/F

FALSE If multiple GPOs are linked to the same site, domain, or OU, they will be applied in link order, with the highest link order applied first and the lowest link order applied last.

If there are multiple DHCP servers on a network, DHCP clients will accept the first offer that they receive. T/F?

FALSE If there are multiple DHCP servers on your network, DHCP clients will accept the first offer that they receive and decline all other offers by sending a DHCPDECLINE packet to the other DHCP servers.

When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition. T/F

FALSE The CA public/private key expires every 5 years and the new CA public/private key pair is generated automatically.

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server. T/F

FALSE The Remote Desktop app uses Remote Desktop Protocol (RDP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server.

Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations. T/F

FALSE Trimming will erase sections of non-volatile memory chips.

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks?

Hire the services of a third-party Certification Authority

Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue?

IQN is not present in the access server list.

Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead?

Install a WINS server Kaya should install Windows Internet Name Service (WINS) servers to provide centralized NetBIOS name resolution that does not use broadcasts.

Which of the following is true of WINS?

It can only resolve NetBIOS names to IPv4 addresses.

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true?

Jabez created a shared folder that is accessible to remote servers in the collection.

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration server, which of the following services should you select?

LAN routing

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true? ​

Michaela's organization allows users to connect remotely using their personal computers.

By default, where are updates synchronized from in WSUS?

Microsoft Update servers on the Internet

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.

NTFS is a journaling filesystem, while FAT32 is not.

Kelsan Informatics has its client computers connected to a router through which the clients can access the organizations servers in the DMZ. The DMZ is connected to a NAT router that is connected to the internet. In addition to providing access to the internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?

Next Gerneration Firewall

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?

Published the software under Software Settings in the User Configuration

Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

RAID level 0

Which of the following RAID level configurations is not supported by Windows Server 2019?

RAID level 2

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?

Remote Clients

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

Remote Desktop Gateway

Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?

Remote Desktop Protocol

Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?

Remote Desktop Web Access

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?

RemoteApp

Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next?

Reno should turn off debug logging.

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option?

Reservations Reservations allow you to provide the same IP address each time a DHCPDISCOVER is received from a DHCP client that has a certain MAC address. Reservations are often created for network-attached printers, servers, and network devices that must receive an IP address from a DHCP server that does not change over time.

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?

Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.

Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true?

Rory used the Shadow option.

Which of the following statements is true of SAN devices?

SAN devices are functionally like an external USB drive.

Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue?

SERVERA does not have a NetBIOS name record on any WINS server.

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do?

She will select the Demand-dial connections service.

Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario?

Some of the resource records for N2001EY will be made available for scavenging after 28 days. The dynamically updated records for N2001EY will be made available for scavenging after 28 days. The manually created records will not be scavenged.

Identify the option that can be used to create storage pools that include storage devices from different servers on a network.

Storage Spaces Direct

Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer?

Suspend-PrintJob

The subnet mask cannot be modified once a scope is created. T/F

TRUE

Using a disk management too, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. T/F

TRUE

When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found. T/F

TRUE

You can obtain a Remote Desktop session by navigating to https://server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server. T/F

TRUE

A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key. T/F

TRUE A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key. Most keys are 256 bits in length. With every additional bit added to the length of the key, the strength of the encryption doubles.

Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. T/F

TRUE Provided that no partitions exist on the disk, you can right-click a disk in the Disk Management tool and click Convert to GPT to create a GPT on a disk that has an MBR, or click Convert to MBR to create an MBR on a disk that has a GPT.

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information?

The Add Roles and Features Wizard

Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?

The Block Inheritance setting prevented the OUs from applying the GPOs.

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?

The DNS server and DHCP server are in different domains.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server,which of the following most likely caused this issue?

The IP addresses were configured manually.

Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server?

The MX record When Felicia sends the email, her email server locates the target email server by resolving the MX record for zoneA.com.

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

The NAT router should be a Next Generation Firewall. The NAT router should be a Next Generation Firewall if you want to configure a reverse proxy instead of port forwarding.

Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server?

The NS record An NS record is used to identify a DNS server that is authoritative for a zone. In this scenario, the NS record identifies SERVER1 as an authoritative DNS server.

Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?

The Network Device Enrollment Service role service

Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?

The Profile pane

Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option?

The System uses an SSD and an HHD The Create storage tiers on this virtual disk option is only selectable if the storage pool contains a combination of hard disk and SSD storage devices

Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario?

The client will contact the Web server with the address 172.6.0.15. The FQDN server will return both IP addresses They will be in the order 172.6.0.15 followed by 192.168.1.75, Therefore the client will contact 172.6.0.15. This is because netmask ordering ensures that the IP address that most closely resembles the client's IP address is returned first.

Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage?

The iSCSI target

Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay. If true, which of the following would justify this choice?

The organization contains DHCP relay agents in different locations. By default, DHCPOFFER packets are provided immediately by a DHCP server following the receipt of a DHCPDISCOVER packet, but you can provide a short delay should this cause problems with the DHCP relay agents in your organization.

Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?

The performance of file sharing applications will increase. A large allocation unit size will increase the performance of file sharing applications, whereas a small allocation unit size will increase the performance of database applications.

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario?

The remote access server also contains a network location server.

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

The remote access server was not rebooted after the recent changes.

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?

The settings can only be applied at the next login.

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?

Trang should select the network interface that is connected to the DMZ.

Tuyet types the following statement into File Explorer: \\serverA\Share1. The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week. Which of the following is true of this scenario?

Tuyet's computer's name record will be deleted from the WINS server.

Navin wants to reduce the chances of a data breach and monitor and control the traffic on his company's website. Instead of using a NAT router, he sets up an external server that acts as a filter between the organization's website and end users. Which of the following options must Navin select and configure when configuring WSUS?

Use a proxy server when synchronizing

A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?

Using hardware RAID externally to provide fault tolerance

While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?

WID connectivity

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization?

Web Application Proxy

Wilmer is creating a new remote access policy for the sales department in the organization. On the specify Conditions screen of the wizard to create policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?

When a user account has the Control access through the NPS Network Policy option set.

The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?

While installing WSUS, the option Store updates in the following location was deselected.

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues Missing resource records in a secondary zone are often caused by zone transfer issues. Zone transfers may not occur successfully if the network bandwidth is saturated at the time the zone transfer was initiated.

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?

certlm.msc

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

iSCSI initiator


संबंधित स्टडी सेट्स

ANAT Ch 1 Body Orientation Practice Quiz-A

View Set

Med Surg Chapter 40: Management of Patients with Gastric and Duodenal Disorders

View Set

Security+ Terminology | Chapter 3 Understanding Devices and Infrastructure | Sybex & Wiley Book

View Set

the "secularization thesis/paradigm"

View Set

Clinical Terminologies, Classifications, and Code Systems

View Set

Building your Real Estate Business

View Set