Server module 1
Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine. a.True b. False
A. True
Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? a. An on-premise server b. A cloud-based server c. A client d. A network
B. A cloud-based server
Storage pinning is the process of planning hardware for a specific server within an organization. a. True b. False
B. False
Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task? a. Microsoft Management Console b. Azure Active Directory C. Windows PowerShell d. Windows Admin Center
C. Windows power shell
Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure? a. Server Core cannot be installed on personal computers. b. Tamara's computer does not contain an optical drive. c. Server Core requires at least a 1.4 GHz 64-bit processor. D.Tamara's computer has 30 GB free hard disk space.
D. Tamara's computer has 30 GB free hard disk space
What is the advantage of using Hyper-V containers?
Hyper-V containers offer advantages such as enhanced isolation through hardware virtualization, efficient resource utilization, and the ability to run multiple containers with different operating systems on the same host. This provides flexibility and security, making it suitable for diverse application scenarios.
Explain the nested virtualization feature of Hyper-V.
Nested virtualization in Hyper-V allows you to run a virtual machine (VM) inside another VM. This feature is beneficial for scenarios like testing and development environments where multiple layers of virtualization are needed. It enables you to run a hypervisor, such as Hyper-V, within a virtual machine, extending virtualization capabilities. Keep in mind that proper hardware support and configuration are essential for nested virtualization to function effectively.
What is a domain, and how does it affect computers and users that are members of the domain?
A domain in the context of computer networks refers to a group of computers and devices that share a common set of rules, policies, and user accounts. In a Windows environment, this is often implemented using Active Directory. Computers and users that are members of the domain can benefit from centralized management, authentication, and access control. Key aspects include: 1. **Centralized Authentication:** Users can log in with a single set of credentials, managed by the domain controller, providing a unified login experience. 2. **Access Control:** Administrators can define and manage user permissions centrally, ensuring consistent access rights across the domain. 3. **Policy Management:** Group Policies can be applied to control settings and configurations on computers within the domain, facilitating consistent management. 4. **Resource Sharing:** Users can access shared resources like files, printers, and applications easily within the domain, promoting collaboration. 5. **Security:** Security measures, such as account policies and encryption, can be enforced across the domain, enhancing overall system security. Overall, domains streamline administration, improve security, and simplify user and computer management in a networked environment.
You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next? a. Change the boot order in the BIOS. b. Insert the DVD after turning on your computer. c. Copy the ISO image to a bootable USB drive. d. Download Burnaware or Rufus.
A. Change the boot order in the BIOS
Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. b. Walter Wells does not use storage replicas or storage spaces. c. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows. d. Walter Wells currently outsources its hardware maintenance operations to an external vendor.
A. Walter wells spends a considerable amount of money on encrypting Linux virtual machines
The Windows 10 Education edition supports Hyper-V but not nested virtualization. a. True b. False
B. False
Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true? a. Janice is using a Type-2 hypervisor to control both virtual machines. 5) Janice has enabled nested virtualization on the Windows 10 operating system. c. Janice has enabled nested virtualization on the Windows Server operating system. d. Janice is using the Windows Server 2012 R2 Edition in the virtual machines.
B. Janice has enabled nested virtualization on the windows server operating system
Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization? a. Nadira removed VM2 to accommodate VM3. b Nadira powered off VM1, ran a PowerShell command, and powered on VM1. c. Nadira ran the following PowerShell command: Get-VMNetworkAdapter - VMName VM3 | Set-VMNetworkAdapter - MacAddressSpoofing On. d. Nadira enabled nested virtualization in Windows 10 using a PowerShell command.
B. Nadira powered off VM1, ran a PowerShell command, and powered on VM1.
Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? a. Avoid sandboxing in a testing environment b. Run these web applications in containers c. Increase the scalability of the system d. Use nested virtualization instead
B. Run these web applications in containers
Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? a. Storage pinning b. Storage tiering c. Capacity planning d. Data deduplication
B. Storage tiering
Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use? a. Journaling b. Virtualization c. Sandboxing d. Deduplication
B. Virtualization
What is the IP address that is assigned to the network loopback interface? a. 0.0.0.0 b. 255.255.255.255 c. 127.0.0.1 d. 10.0.0.0
C. 127.0.0.1
Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files. a. Don should use thin provisioning and fix the size of each virtual disk to 60 GB. b. Don should use thick provisioning and fix the size of each virtual disk to 100 GB. C Don should use thin provisioning. d. Don should use thick provisioning.
C. Don should use thin provisioning
Which of the following is true of Storage Server 2019? a. It can have a maximum memory of 24 TB. b. It can host unlimited virtual machines. c. It cannot be purchased from Microsoft directly. d. It can be download for free and used in any environment.
C. It cannot be purchased from Microsoft directly
Which of the following statements is true of a client on a computer network? a. It is a server that is located within the physical premises of an organization. b. It is a computer that shares resources in response to a request from another computer. C. It is a computer that requests for resources from another computer on the network. d. It is a server that is located outside an organization's premises and accessed via the Internet.
C. It is a computer that requests for resources from another computer on the network.
Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true? a. Satish's computer does not meet the minimum storage requirements. b. Satish installed Server Core instead of the full version. c. Satish's computer does not have an optical disk drive. d. Satish has installed the server over the Internet from a remote device.
C. Satish's computer does not have an optical disk drive
Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? a. The server will not be dedicated to a specific function but will serve multiple functions. b. The server will be managed by a novice administrator that fulfills other roles in the company. C. The server will be dedicated to web services and accessed via the Internet. d. The server will also function as an Active Directory domain controller.
C. The server will be dedicated to web services and accessed via the internet
Identify the true statement about Type 2 hypervisors. a. They can run independent of a host operating system. b. They can interact with the hardware directly. C. They can run multiple operating systems on a single host. d. They self-contain a small operating system.
C. They can run multiple operating systems on a single host
Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? a. Windows Admin Center b. Microsoft Management Console C. Windows Server Catalog d. Windows Server Configuration Wizard
C. Windows server catalog
Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? a. Malaika's computer b. The Edge browser c. The website address d. The responding computer
D. The responding computer
Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10? a. Windows 10 automatically encrypts Linux containers. b. Windows 10 provides Server Core and Nano Server options. c. Windows 10 has the Windows Server Azure Network Adapter. d. Windows 10 has Windows Subsystem for Linux.
D. Windows 10 had windows subsystem for Linux
After you begin the installation process, how do you ensure that you install the full Windows Server and not just the Server Core?
During the installation process of Windows Server, you can choose between installing the full version of Windows Server with a graphical user interface (GUI) or opting for the Server Core installation, which is a minimalistic version without the GUI. To ensure you install the full version, follow these steps: 1. **Start the Installation:** - Boot from the Windows Server installation media or mount the ISO file. - Begin the installation process by selecting the appropriate boot device. 2. **Language and Other Preferences:** - Choose your language, time, and keyboard input preferences. 3. **Installation Type:** - At the "Windows Server Setup" screen, click on "Install Now." 4. **Product Key:** - Enter the product key when prompted. 5. **Select the Edition:** - Choose the edition of Windows Server you want to install (Standard or Datacenter). 6. **License Terms:** - Accept the license terms and click "Next." 7. **Choose Installation Type:** - Here's where you select the installation type. To install the full version with a GUI, choose the option labeled "Windows Server with Desktop Experience." 8. **Select Installation Disk:** - If prompted, select the disk where you want to install Windows Server. 9. **Begin Installation:** - Click "Next" and proceed with the installation. The setup process will install the full version with the graphical interface. 10. **Complete the Setup:** - Follow any additional prompts, such as creating or selecting a partition for the installation. 11. **Finish Installation:** - Once the installation completes, the system will prompt you to set a password for the Administrator account. By choosing the "Windows Server with Desktop Experience" option during the installation type, you ensure that you are installing the full version of Windows Server w
What is a subnet mask in the context of IPv4? Explain with an example.
In IPv4 networking, a subnet mask is a 32-bit number that divides an IP address into network and host portions. It helps identify the network to which an IP address belongs and the specific device (host) within that network. Subnetting is a technique used to create smaller, more manageable networks within a larger network. A subnet mask consists of consecutive 1-bits followed by consecutive 0-bits. The 1-bits represent the network portion, and the 0-bits represent the host portion. To illustrate, let's look at an example: Suppose you have the IP address `192.168.1.25` and a subnet mask of `255.255.255.0`. In binary: - IP Address: `11000000.10101000.00000001.00011001` - Subnet Mask: `11111111.11111111.11111111.00000000` In this case, the subnet mask `255.255.255.0` indicates that the first 24 bits are reserved for the network, and the remaining 8 bits are for hosts. Therefore, this IP address is part of the network `192.168.1.0`. The range of host addresses within this subnet is from `192.168.1.1` to `192.168.1.254`, with `192.168.1.255` typically reserved for broadcast. Subnetting allows network administrators to efficiently allocate IP addresses and manage network traffic. Different subnet masks lead to different subnet sizes, enabling customization to suit the network's needs.
What is the difference between multitasking and multithreading?
Multitasking and multithreading are both techniques used in computing, but they refer to different concepts: 1. **Multitasking:** - **Definition:** Multitasking is the concurrent execution of multiple tasks or processes on a computer system. - **Usage:** It allows a computer to perform multiple tasks seemingly simultaneously by rapidly switching between them, giving the appearance of parallel execution. - **Example:** Running a word processor, a web browser, and an email client concurrently on a computer. 2. **Multithreading:** - **Definition:** Multithreading is a specific form of multitasking that involves the concurrent execution of two or more sequences of instructions, known as threads, within the same process. - **Usage:** It enables more efficient utilization of CPU resources by dividing a process into multiple threads that can execute independently. - **Example:** A web browser might use multithreading to download content in one thread while rendering a webpage in another thread, allowing parallel execution within the same application. In summary, multitasking is a broader concept that refers to the concurrent execution of multiple tasks or processes, while multithreading specifically involves multiple threads within a single process. Multithreading is a way to implement multitasking at a more granular level within a single application or process.
What is the self-healing feature of NTFS, and how does it work?
NTFS (New Technology File System) includes a self-healing feature designed to detect and correct certain types of file system errors automatically. This feature helps maintain the integrity and reliability of the file system. The self-healing process involves the following mechanisms: 1. **Log File and Checkpoints:** NTFS maintains a log file that records all changes scheduled for the file system. In the event of a system failure, NTFS can use this log file to identify incomplete transactions and revert to a consistent state. Checkpoints help to determine the last known good state. 2. **Chkdsk (Check Disk) Utility:** The Chkdsk utility scans the file system for inconsistencies and errors. When it detects a problem, it attempts to fix it. This utility can be scheduled to run during system startup or initiated manually. 3. **Volume Shadow Copy Service (VSS):** VSS creates snapshots of the file system at specific points in time. These snapshots serve as backups and can be used to recover files and restore the file system to a consistent state. 4. **Transaction Resource Manager (TRM):** NTFS uses TRM to manage transactions involving multiple file system operations. If a transaction cannot be completed, NTFS can roll back changes to maintain a consistent state. While these mechanisms contribute to the self-healing capability of NTFS, it's important to note that not all file system issues can be automatically corrected. In some cases, manual intervention or additional recovery measures may be necessary.
How does TCP provide reliable end-to-end delivery of data?
TCP (Transmission Control Protocol) ensures reliable end-to-end delivery of data through several mechanisms designed to handle issues such as data loss, duplication, and out-of-order delivery. Here are key features that contribute to TCP's reliability: 1. **Acknowledgment and Retransmission:** - TCP uses acknowledgments to confirm the receipt of data. When a sender sends a TCP segment, it waits for an acknowledgment from the receiver. If an acknowledgment is not received within a specified time, the sender retransmits the data. 2. **Sequence Numbers:** - Each TCP segment is assigned a sequence number, allowing the receiver to reorder segments that arrive out of order. This helps ensure the correct order of data at the destination. 3. **Flow Control:** - TCP employs flow control mechanisms to prevent the sender from overwhelming the receiver with data. It uses a sliding window mechanism, where the sender adjusts the rate of data transmission based on feedback from the receiver. 4. **Checksum:** - TCP includes a checksum in each segment to detect errors during data transmission. If the receiver detects an error, it requests the sender to retransmit the corrupted segment. 5. **Connection Establishment and Termination:** - TCP establishes a connection before data transfer begins, and it ensures orderly connection termination. This prevents data loss during setup and teardown phases. 6. **Congestion Control:** - TCP has congestion control mechanisms to avoid network congestion. It adjusts the transmission rate based on network conditions, reducing the likelihood of packet loss due to congestion. 7. **Timeouts and Retransmission Timer:** - TCP uses timeouts and retransmission timers to handle cases where acknowledgments are not received within a reasonable time. If an acknowledgment is not receive
Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? a. The SAN on the rack malfunctioned. b. The management station on the rack malfunctioned. c. The blackout caused all the servers on the rack to shut down because there is no power supply. d. The blackout took down the Internet, so Rhonda can't reach the email server.
The blackout took down the Internet, so Rhonda can't reach the email server.
Rafiq uses Windows 10 Professional. He has enrolled in a Windows Server course. How can he practice the lab exercises on his system?
To practice Windows Server lab exercises on a Windows 10 Professional system, Rafiq can set up a virtualized environment using virtualization software like Hyper-V or Oracle VirtualBox. Here are general steps to get started: ### Using Hyper-V (Built into Windows 10 Pro): 1. **Enable Hyper-V:** - Ensure that Hyper-V is enabled on Rafiq's Windows 10 system. This can be done through the "Turn Windows features on or off" menu in the Control Panel. 2. **Create a Virtual Machine (VM):** - Open Hyper-V Manager and create a new virtual machine. - Follow the wizard to configure the VM, specifying details like RAM, storage, and network settings. 3. **Install Windows Server:** - Install the Windows Server operating system on the newly created VM. This can be done using an ISO file or other installation media. 4. **Configure Networking:** - Set up networking on the VM to allow communication with the host machine and the external network. 5. **Snapshots and Cloning:** - Utilize Hyper-V features like snapshots to capture the VM's state at a particular time. This allows Rafiq to revert to a specific configuration easily. - Cloning VMs is also useful for creating multiple instances with the same setup. ### Using Oracle VirtualBox: 1. **Install VirtualBox:** - Download and install Oracle VirtualBox on Rafiq's Windows 10 system. 2. **Create a Virtual Machine (VM):** - Open VirtualBox and create a new VM. Configure settings like RAM, storage, and network. 3. **Install Windows Server:** - Install the Windows Server OS on the VM using an ISO file or other installation media. 4. **Guest Additions:** - Install VirtualBox Guest Additions on the Windows Server VM for improved integration and features. 5. **Networking:** - Set up networking in VirtualBox to enable communication between the host an
How do the different versions of Windows Server 2019 handle CAL and core-based licenses?
Windows Server 2019 licensing can be based on either Client Access Licenses (CALs) or cores. The edition of Windows Server 2019 determines which licensing model is applicable. Here's a brief overview: 1. **Standard Edition:** - **CALs:** Requires CALs for each user or device accessing the server. CALs are needed for every user or device, regardless of the number of server cores. - **Cores:** Standard Edition includes licenses for up to 16 cores. Additional core licenses are required for servers with more than 16 cores. 2. **Datacenter Edition:** - **CALs:** CALs are not required for the Datacenter Edition. Licensing is based on the total number of physical cores on the server. - **Cores:** Requires core-based licensing. Each license covers two physical cores, and there is typically a minimum purchase requirement. It's important to license all the cores on the server. Remember that CALs and core-based licenses are mutually exclusive; you choose one licensing model or the other for a particular server. The edition of Windows Server and the licensing model affect the cost and how you manage and pay for server access. Always refer to the official Microsoft licensing documentation for the most accurate and up-to-date information, as licensing terms can be subject to change.
You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? a. The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019. c. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. d. The server can't be upgraded to Server 2019, as no upgrade path exists. You must perform a clean install.
b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.
Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why? a. Home-FileServer-Raphael because it contains his name and is at least 15 characters b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters c. TEL COMP F3 because it contains a mix of letters, numbers, and spaces d. W@Sh!nGTOn, because it contains special characters, numbers, upper case letters, and lower case letters
b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters