NEW network admin midterm part 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change? Organization Profile Account General

Account

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this? Create an empty file called KettleApp within the folder. Rename the shared folder to KettleProgram/KettleApp. Add KettleApp as a keyword in the folder's properties. Transfer ownership of the folder to a user called KettleApp.

Add KettleApp as a keyword in the folder's properties.

Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next? Create new user accounts for the branch office users Use the Active Directory Domain Services Configuration Wizard to configure the RODC Run the Active Directory Domain Services Installation Wizard Add branch office user accounts to the Allowed RODC Password Replication Group

Add branch office user accounts to the Allowed RODC Password Replication Group

Which printer server configuration task is performed before shared printers are added within the Print Management tool? Change the printer name, location, and comment Add manufacturer-supplied printer drivers for the associated print device Deploy with Group Policy Render print jobs on client computers

Add manufacturer-supplied printer drivers for the associated print device

Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose? Port Drivers Advanced Security

Advanced

Which of the following statements is true of the ownership of a file or folder? The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account. Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission. The owner of a file or folder cannot modify all the permissions for that file or folder. An administrator can take ownership of a file or folder without being granted the permission to do so.

An administrator can take ownership of a file or folder without being granted the permission to do so.

Which of the following organizations should consider using Azure Active Directory? An organization that deploys Internet accessible services, such as FTP or DNS An organization that uses IIS as a web server An organization that subscribes to Office 365 services An organization that has a substantially onsite workforce

An organization that subscribes to Office 365 services

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file? The group permissions override permissions granted to Pavel's user account. Another group has the Deny box checked for Read access. The Project Manager group restricts Pavel's ability to view the file. The Developer group restricts Pavel's ability to view the file.

Another group has the Deny box checked for Read access.

After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario? The stolen computers can rejoin the domain after resetting their passwords. Shania does not need to delete the stolen RODC computer account if the other computer accounts are reset. Any computers that were not stolen will need to rejoin the domain. The Active Directory database on the stolen RODC is deleted automatically.

Any computers that were not stolen will need to rejoin the domain.

As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose? Branch office direct printing Printer pooling List in the directory Bidirectional printing

Bidirectional printing

Which of the following actions cannot be performed by a user with Print permission? Cancel all print jobs Pause, resume, and restart print jobs Cancel the print jobs they have ownership of Send print jobs to the printer

Cancel all print jobs

Which of the following statements about directory partitions is true? Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain. If any change is made to a configuration partition, the change is also replicated in the schema partition. Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships. The largest section of the Active Directory database is the configuration partition.

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future? Enable the archive attribute Configure active screening Enable the encrypt attribute Configure passive screening

Configure passive screening

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage? Configuring folder quota Configuring passive screening Configuring active screening Configuring user quota

Configuring user quota

Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems? Custom filters View Server Properties The Advanced tab

Custom filters

Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take? Delete the RODC computer account Disable user accounts in the branch office Create a new RODC Shut down all RODCs

Delete the RODC computer account

A print device, Printer_2AC, is installed on SEVERX within your organization. The printer must be automatically added to each computer added to the domain. Which of the following options can be used for this purpose? Use the Add Printer wizard Enable advanced printing features Deploy with Group Policy Audit object access policy

Deploy with Group Policy

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents? Client for Network File System (NFS) Distributed File System (DFS) replication File Server Resource Manager (FSRM) Distributed File System (DFS) namespaces

Distributed File System (DFS) replication

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution? Universal Group Membership Caching User Principle Name Selective authentication Distribution groups

Distribution groups

Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected? Properties Cancel All Documents All Printers Document List

Document List

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets? Assign the hidden attribute to the folder Use a pair of public and private keys that are uniquely generated for a system Modify the folder permissions for each user through Advanced Security Settings Edit the Default Domain Policy object to enable auditing functionality

Edit the Default Domain Policy object to enable auditing functionality

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied? Windows Server 2016 Windows Server 2019 FAT32 on a Windows 7 system FAT32 on a Windows 10 system

FAT32 on a Windows 7 system

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? No access Modify Read Full control

Full control

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario? A member server Access Control List Group Policy A standalone server

Group Policy

Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance? He can use SMTP instead of IP to improve performance. He can increase the number of domain controllers to spread the replication load. He change the bridgehead server to one with a faster network interface. He can restrict the number of domain controllers to one per site.

He change the bridgehead server to one with a faster network interface.

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue? Hiroshi should create site objects and specify timed intervals for replication using site link objects. Hiroshi should create separate domains for each location to avoid the need for replication. Hiroshi should remove all domain controllers and have only one domain controller for the domain. Hiroshi should reduce the number of domain controllers to just one per physical location.

Hiroshi should create site objects and specify timed intervals for replication using site link objects.

What is the use of the New-ADReplicationSite Windows PowerShell cmdlet? It can be used to change the bridgehead server in a site. It can be used to launch the Active Directory Sites and Services tool. It can be used to create a new site object. It can be used configure the replication settings within a site link object.

It can be used to create a new site object.

Which of the following statements regarding a domain functional level is accurate? It applies to domain controllers, clients, and other servers that are present in the domain. It represents the oldest Windows Server version that can be used on a domain controller. A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level. Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised.

It represents the oldest Windows Server version that can be used on a domain controller.

Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center? It can only be used to manage OU, user, group, and computer objects, but not to create these objects. It is a command line tool similar to Windows PowerShell that requires the use of cmdlets. It uses a minimal color interface that is similar to the one provided by Server Manager. It does not support features introduced within Windows Server 2008 R2 and later functional levels.

It uses a minimal color interface that is similar to the one provided by Server Manager.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory? RAP LDAP NFS SMB

LDAP

Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window? Enable printer pooling Enable advanced printing List in the directory Branch Office Direct Printing

List in the directory

Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder? Laurel forgot to click the Allow root access option for Mark. The default permission is Read-Only, but Mark needs the Read-Write permission. MSmark is a computer name and not Mark's user account name. The ReFS permission is Read/Write, whereas the NFS permission is Read.

MSmark is a computer name and not Mark's user account name.

Which of the following print server permissions allows users to configure print server settings within the Print Management tool? View Server Manage Documents Manage Server Manage Printers

Manage Server

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true? Minisha has run the following command: Get-ADForest | select SchemaMaster,DomainNamingMaster. Minisha has run the following command: Set-ADDomainMode -Identity domainX.com -DomainMode Windows2012R2Domain. Minisha is a member of the Enterprise Admins group in both organizations. Minisha is a member of the Domain Admins group in both organizations. Analysis:

Minisha is a member of the Enterprise Admins group in both organizations.

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions? Full control Write Read and execute Modify

Modify

Which of the following is the default format used to store documents received by the GDI API for modern print devices? GDI2XPS RAW (FF appended) RAW (FF auto) NT EMF

NT EMF

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue. The software does not back up files larger than 500 MB. Natalie did not enable the index attribute on the folder. NTFS filesystems do not support the backup of large files. Natalie did not enable the archive attribute on the folder.

Natalie did not enable the archive attribute on the folder.

Several users access the same shared printer in Lia's organization. A colleague tells her that the paper tray needs to be refilled. She uses the Printer menu to manage the print jobs and refill the paper tray. Which option do you think she would have chosen in the Printer menu if the documents within the print queue resumed printing after the refilling of the paper tray? Cancel All Documents Pause Printing Pause Restart

Pause printing

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome? Petra.T will be allowed to log in and access resources across the domain. Petra.T will not be allowed to log in to the system because the global catalog server is not available. Petra.T will be allowed to log in to the system with cached credentials. Petra.T will be locked out of their account until the domain controller can access the global catalog.

Petra.T will be allowed to log in to the system with cached credentials.

While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected? Shared Printer LPD Service Print Server Internet Printing

Print Server

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? Read/Write Full control Read Modify

Read

Identify the process that coverts the documents within the spool folder to a format understandable by the print device. Print job Print queue Rendering Spooling

Rendering

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared. Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button. Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share.

Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.

Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used. IPP LDP SMS SMB

SMB

Identify the correct process that automatically adds SMB shared printers to computers that join a domain. Select the printer within the Print Management tool and click Enable Branch Office Direct Printing Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu Access the Advanced tab of the printer and select Auto deploy printer to client computers Access the Sharing tab of the printer and select the List in the directory option

Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu

You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task? Set-ADForestMode -Identity domainA.com -ForestMode Windows2012R2Domain Get-ADDomain | select PDCEmulator,RIDMaster,InfrastructureMaster Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain netdom.exe

Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

What option should you use on a printer's Advanced properties page if pages from different jobs are mixed? Print directly to the printer Enable advanced printing Print spooled documents first Start printing after last page is spooled

Start printing after last page is spooled

Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer? Restart-Service spooler-force http://serverx/printers Set-Printer printername-restart Suspend-PrinJob

Suspend-PrinJob

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document? Sysprtj.sep Pcl.sep Pscript.sep Sysprint.sep

Sysprint.sep

Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options? The Security tab The Ports tab The Advanced tab The Sharing tab

The Advanced tab

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019? A discretionary access control list Common Internet File System Windows Run The Windows Search Service

The Windows Search Service

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? The file is moved but is only visible to Windows systems that can see EFS files. The file transfer does not occur because FAT32 cannot store encrypted files. The file is decrypted and placed onto the FAT32 volume. The file encryption is maintained on the new location.

The file is decrypted and placed onto the FAT32 volume.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? The folder is set to read-only until the user performing the move changes the attribute. The folder is copied along with all NTFS and share permissions. The folder inherits the share permissions but loses the NTFS permissions. The folder loses all NTFS and share permissions associated with it.

The folder inherits the share permissions but loses the NTFS permissions.

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​ Which of the following attributes should Nora deactivate to exclude the data files from searches? ​ The index attribute The compress attribute The archive attribute The hidden attribute

The index attribute

What happens when a print job exceeds the print device storage capacity? The Print Spooler service increases the print device storage capacity. The rendering process slows down, which results in a decrease in the print job. The print jobs are sent to the Server Message Block (SMB). The print jobs are divided into smaller parts and sent to the print device sequentially.

The print jobs are divided into smaller parts and sent to the print device sequentially.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure? The user's account has been locked because of frequent failed password attempts. The user is in a new OU and lacks permission to log into the computer used. The computer is having issues communicating with the domain and is attempting to use cached credentials. The global catalog server has not replicated the user's account information to the rest of the domain.

The user's account has been locked because of frequent failed password attempts.

What are users who only have the List folder contents permission allowed to do? They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. They can traverse folders, view file contents, view attributes and permissions, and execute files. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain? Two One Three Zero

Two

Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system? Wi-Fi Bluetooth USB Ethernet

USB

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next? Update all the domain controllers running Windows Sever 2012 to Windows Server 2016 Revert the domain functional level of each domain in the forest to Windows Server 2016 Update the servers running Windows Server 2008 R2 to Windows Server 2019 Update the clients that are running Windows 7 to Windows 10

Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone? Updated or reinstalled the printer driver on all the print clients individually Turned the printer off and turned it on again Updated or reinstalled the printer driver on the print server Changed the location of the spool folder

Updated or reinstalled the printer driver on the print server

Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario? When new domain controllers are added to this network, they will be added to NewYorkSite by default. This restricts the creation of bridgehead servers, and only NewYorkSite will contain bridgehead servers. Assigning an IP address to a site indicates that domain controllers within this site contain the global catalog. Anahira will not be able to install or use Simple Mail Transfer Protocol (SMTP) to perform Active Directory replication.

When new domain controllers are added to this network, they will be added to NewYorkSite by default.

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager? Write attributes Read attributes Write extended attributes Read extended attributes

Write extended attributes

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? dfsutil.exe cipher.exe fsutil.exe compact.exe

cipher.exe


संबंधित स्टडी सेट्स

Research Method 321: Final Exam Study Guide

View Set

Ch 10- Global Strategy: Competing Around the World

View Set

Which word MOST NEARLY matches the definition?

View Set