Servers final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How many partitions can exist on a GPT disk in Windows Server 2016?

128

For members of a protected users global group, how often must the Kerberos Ticket Granting Ticket be renewed?

4 hours

Which if the following is the correct in-arpa zone address for server with an IP address of 191.99.50.250

99.191.in-addr.arpa.dns

Group Policy Object contains settings to manage which of the following item(s)? Pick all that apply.

All are valid answers

Which of the following items can you manage using group policies? Pick all that apply

Change password policies, Mapping of shares, Startup, shutdown of computers, Deployment of software, Restrict current applications from running

After installing Routing and Remote Access, a default remote access policy is created. What is the default access permission defined in this policy?

Deny access

Disk duplexing is the same as what type of disk redundancy?

Disk mirroring

What password security option ensures that a user must choose new passwords when a password change is required?

Enforce password history

A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned, and Read permissions at the share level. What is the effective permissions for the user on the file?

Full control

If no domain or workgroup is configured during installation of Windows Server 2016, where is the computer placed?

In a workgroup called "Workgroup"

By default on Windows Server 2016, what is the processor scheduling set to prioritize?

It is set to prioritize background services.

What does the "Enforce user logon restrictions" option do when configuring Kerberos?

It turns on Kerberos security.

Which of the following are recommended security measure for protecting your DNS. - Pick all that apply

Monitor DNS Logs, Allow only secure dynamic updates

When replication occurs between sites, what servers are involved in replication?

Replication only occurs between two bridgehead servers.

What character should you place at the end of a share name in order to hide the share?

Select one: a. $ b. ? c. * d. ! Feedback The correct answer is: $

What is the default cache duration for a DFS namespace folder?

Select one: a. 1 hour b. 30 minutes c. 25 minutes d. 6 minutes Feedback The correct answer is: 30 minutes

What is the IP address that is assigned to the network loopback interface?

Select one: a. 1.1.1.1 b. 224.0.0.255 c. 127.0.0.1 d. 192.168.1.1 Feedback The correct answer is: 127.0.0.1

You are working on a Windows Server 2016 installation with an IP address of 192.168.100.76, and a subnet mask of 255.255.255.0. What is the network identifier for this network in binary octet format?

Select one: a. 11000000.10101000.01100110.00000000 b. 10000000.10111000.01100100.00000000 c. 11000000.10101000.01100100.00000000 d. 10000000.10101000.01100100.00000000 Feedback The correct answer is: 11000000.10101000.01100100.00000000

You are on the 172.16.99.0 network with a subnet mask of 255.255.254.0. What is NOT a valid host IP address on this network?

Select one: a. 172.16.99.1 b. 172.16.99.255 c. 172.16.100.255 d. 172.16.100.0 Feedback The correct answer is: 172.16.100.255

What is the default timeout value used for a printer configured to use an LPT port?

Select one: a. 30 seconds b. 60 seconds c. 90 seconds d. 120 seconds Feedback The correct answer is: 90 seconds

What is the minimum amount of disk space required for installing Windows Server Core?

Select one: a. 36 GB b. 32 GB c. 400 MB d. 50 GB Feedback The correct answer is: 32 GB

What TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

Select one: a. 500 b. 443 c. 1812 d. 1723 Feedback The correct answer is: 443

You are configuring a RAID-5 array with five disks, each disk is 3TB in size. What will be the total usable size of the RAID-5 volume?

Select one: a. 6 TB b. 3 TB c. 15 TB d. 12 TB Feedback The correct answer is: 12 TB

You are administrator for an Active Directory domain and have been tasked with improving response time for resolving DNS queries for resources in a second company owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?

Select one: a. A glue zone b. A forward zone c. A reverse zone d. A stub zone Feedback The correct answer is: A stub zone

What DNS resource record type is used to provide the SMTP servers that can accept mail for the domain?

Select one: a. A record b. AAAA record c. SRV record d. MX record Feedback The correct answer is: MX record

Regarding the partition scheme on a disk using MBR, what statement is true?

Select one: a. A system with multiple partitions will boot from the first partition. b. Extended partitions can be marked as active. c. An MBR disk partition can be set as primary or secondary. d. A primary partition must be marked as active in order for the system to boot. Feedback The correct answer is: A primary partition must be marked as active in order for the system to boot.

What is needed for an SNMP management system to be able to poll and receive data from an SNMP agent?

Select one: a. A valid username and password b. A community name c. The SNMP Agent's SNMP ID. d. An allowed entry in an SNMP ACL. Feedback The correct answer is: A community name

What is the ideal use case for a RAID-0 array?

Select one: a. A volume that requires error correction and data parity usage. b. A critical data store that must remain online even after disk failure. c. A volume that is used for temporary storage of data that is copied from another volume. d. An multi-disk array that requires checksum usage to verify data integrity. Feedback The correct answer is: A volume that is used for temporary storage of data that is copied from another volume.

What occurs when a device driver that has not been signed is installed?

Select one: a. A warning indicating that the publisher of the driver can't be verified, but the driver will still be loaded. b. The device will function, but a warning will be logged in Event Viewer when it is loaded. c. A warning indicating that the publisher of the driver can't be verified and the driver will not be loaded. d. The driver will be loaded without incident, and the device will function normally. Feedback The correct answer is: A warning indicating that the publisher of the driver can't be verified and the driver will not be loaded..

When viewing logs in the Event Viewer, what symbol is used to indicate that log is an error log entry?

Select one: a. A yellow triangle with a black exclamation point in the middle b. A red circle with a white X in the middle c. A blue circle with a white exclamation point in the middle d. A red circle with a white exclamation point in the middle. Feedback The correct answer is: A red circle with a white exclamation point in the middle.

What Windows Server role can be used to specifically help safeguard information through the use of encryption, user authentication, and security certificates?

Select one: a. Active Directory Certificate Services b. Active Directory Rights Management Services c. Active Directory Domain Services d. Active Directory Federation Services Feedback The correct answer is: Active Directory Rights Management Services

What Windows Server 2016 role installs the Identity Management for UNIX service?

Select one: a. Active Directory Domain Services b. Host Guardian Services c. Active Directory Certificate Services d. Network Controller Services Feedback The correct answer is: Active Directory Domain Services

What PowerShell command will install the DNS role on a Windows Server 2016 server?

Select one: a. Add-WindowsFeature DNS b. Install-NewRole DNS c. Deploy-Role DNS d. Get-WindowsRole DNS Feedback The correct answer is: Add-WindowsFeature DNS

The Layer Two Tunneling Protocol uses what set of standards to provide encryption and security for a tunnel?

Select one: a. Advanced Encryption Standard (AES) b. Microsoft Point-to-Point Encryption (MPPE) c. IP Security (IPSec) d. Point-to-Point Protocol (PPP) Feedback The correct answer is: IP Security (IPSec)

What type of Windows Server 2016 container relies on process and user-mode isolation, which involves a base-level sharing of the operating system kernel?

Select one: a. App level containers b. Hyper-V containers c. Windows server containers d. Partition level containers Feedback The correct answer is: Windows server containers

What statement regarding IIS web server management is accurate?

Select one: a. Application pools ensure isolation between applications. b. The Sites folder is used to manage a single web site, or other web sites running on other IIS servers. c. The IIS SMTP server can be used to send e-mail, but cannot receive. d. The IIS SMTP server cannot be used to store e-mail messages. Feedback The correct answer is: Application pools ensure isolation between applications.

When using the GPT method of partitioning disks, where is the partition information stored?

Select one: a. At the first sector and track of the hard disk. b. In each partition using main and backup tables. c. In the boot partition. d. In the last sector and track of the hard disk. Feedback The correct answer is: In each partition using main and backup tables

What happens when two devices end up with conflicting IRQ assignments?

Select one: a. Both devices become inoperable until new IRQs are assigned. b. The conflicting devices will both pick a new random IRQ. c. Both devices will share the same IRQ at reduced performance. d. Both devices will share the same IRQ with no penalties to performance. Feedback The correct answer is: Both devices become inoperable until new IRQs are assigned.

What Windows feature provides a scripting language and includes command-line tools in the form of "cmdlets" that can be used for automation?

Select one: a. Bourne Again Shell b. Visual Basic Script interface c. PowerShell d. DOS Batch file processor Feedback The correct answer is: PowerShell

What type of DNS resource record associates a particular TCP/IP service to a server along with the domain of the server and its protocol?

Select one: a. CNAME b. SOA c. NS d. SRV Feedback The correct answer is: SRV

When selecting authentication types for an RAS server, what is considered to be the most secure authentication type?

Select one: a. Challenge Handshake Authentication Protocol b. Password Authentication Protocol c. Extensible Authentication Protocol d. Microsoft Challenge Handshake Authentication Protocol v2 Feedback The correct answer is: Extensible Authentication Protocol

What is NOT a requirement for the use of DirectAccess?

Select one: a. Client computers must be running Windows 10 or later. b. A security group that contains the accounts of participating computers. c. IPv6 must be enabled on the server and on any clients. d. Applications must be IPv6 aware. Feedback The correct answer is: Client computers must be running Windows 10 or later.

When viewing memory information within Task Manager, what section represents the memory that holds the operating system kernel and device drivers that cannot be paged out?

Select one: a. Committed Memory b. Paged pool c. Non-paged pool d. Protected Memory Feedback The correct answer is: Non-paged pool

When using the protected users global group, what is not a valid security restriction imposed on the group?

Select one: a. Connections to systems that do not utilize this global group may not succeed. b. Only computers running Windows 7 or higher can be made member computers. c. Only higher-level encryption methods compatible with Kerberos security, such as Advanced Encryption Standard (AES) can be used. d. Group members cannot use weaker forms of authentication, such as NTLM, CredSSP, or digest authentication. Feedback The correct answer is: Only computers running Windows 7 or higher can be made member computers.

You are deploying VPN services behind a router that is not RFC 1541 compliant. What will you need to do to ensure that clients receive IPs from the DHCP server on the network?

Select one: a. Create static reservations on the DHCP server, and add the MAC addresses of the VPN clients. b. Use a DHCP assist client to request addresses using unicast packets instead of broadcast packets. c. Forward the UDP ports 67 and 68 through the router to allow DHCP to work. d. Utilize a DHCP relay agent to forward broadcasts to the client devices. Feedback The correct answer is: Utilize a DHCP relay agent to forward broadcasts to the client devices.

What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a disk?

Select one: a. Current Disk Queue Length b. Current Waiting Jobs c. Avg. Disk Transfer Wait Period d. % Disk Time Feedback The correct answer is: Current Disk Queue Length

What term is used to describe the number of bytes of memory a process has designated for use and that are promised to a designated portion of the page file?

Select one: a. Dedicated memory b. Provisioned memory c. Committed memory d. Promised memory Feedback The correct answer is: Committed memory

What application pool is created by default when you install the Web Server role?

Select one: a. DefaultAppPool b. WebAppPool c. IIS-Pool d. DefaultWebPool Feedback The correct answer is: DefaultAppPool

What RAS capability allows an organization to publish applications to be accessible to users outside of the organization, while still maintaining those applications on the organization's servers?

Select one: a. DirectAccess b. Web Application Proxy c. Virtual Private Networking d. AppGateway Feedback The correct answer is: Web Application Proxy

Not answered Points out of 1.00 Flag question Question text What statement regarding Active Directory objects that can be members of a domain local group is NOT accurate?

Select one: a. Domain local groups in the same domain can be members of the group. b. Global groups in any domain in a tree or forest, as long as a transitive or two-way trust relationship is maintained, can be a member of the group. c. Universal groups in any domain in a tree or forest can be a member of the domain local group, without requiring a trust relationship. d. user accounts in the same domain can be members of the group. Feedback The correct answer is: Universal groups in any domain in a tree or forest can be a member of the domain local group, without requiring a trust relationship.

When using Windows Server 2016 Device Specific Module (DSM), what configuration model allows you to cycle through functional paths in order?

Select one: a. Dynamic Least Queue Depth b. Weighted Path c. Round Robin d. Failback Feedback The correct answer is: Round Robin

What key should be pressed as soon as the computer boots in order to enter Safe Mode?

Select one: a. ESC b. F5 c. F8 d. Del Feedback The correct answer is: F8

You are troubleshooting an issue on your network where users can access the DNS server, but DNS record information is not being processed. What should you do to troubleshoot the issue?

Select one: a. Ensure that Dynamic DNS is enabled and configured correctly, and check manually added DNS records for accuracy. b. Ensure DNS server and DNS client services are started and set to automatically start when the server boots. c. Ensure users have permissions to read the DNS records by ensuring the domain has the "Authenticated Users" group set to "Read" permission. d. Reload the DNS server database, and then reload the zones affected. Feedback The correct answer is: Ensure DNS server and DNS client services are started and set to automatically start when the server boots.

Why should event auditing policies be used sparingly?

Select one: a. Event auditing can trigger access warning messages for users. b. Event auditing can provide an attacker with valuable information regarding the structure of a network's security policies. c. Event auditing can fill the Security event log and consume considerable resources. d. Event auditing can affect the access control list security for protected objects. Feedback The correct answer is: Event auditing can fill the Security event log and consume considerable resources.

What is the native file system utilized by Windows Server 2016?

Select one: a. FAT32 b. NTFS c. ReFS d. ext3 Feedback The correct answer is: NTFS

What option, enabled by default on a shared printer's "Sharing" tab in Properties, is used to force clients to prepare print jobs and spool them locally prior to sending to the printer?

Select one: a. Force client spooling b. Prevent shared pooling c. Render print jobs on client computers d. Perform pre-formatting on client side Feedback The correct answer is: Render print jobs on client computers

What Registry root key has information about the current hardware profile?

Select one: a. HKEY_CLASSES_ROOT b. HKEY_USERS c. HKEY_CURRENT_USER d. HKEY_CURRENT_CONFIG Feedback The correct answer is: HKEY_CURRENT_CONFIG

You are attempting to recover from an issue that is preventing you from logging in to your Windows Server 2016 system, and are about to utilize the Last Known Good Configuration boot option. Where is this configuration information stored in the Registry?

Select one: a. HKEY_CLASSES_ROOT\System\CurrentControlSet b. HKEY_LOCAL_MACHINE\System\PreviousConfig c. HKEY_CLASSES_ROOT\System\PreviousConfig d. HKEY_LOCAL_MACHINE\System\CurrentControlSet Feedback The correct answer is: HKEY_LOCAL_MACHINE\System\CurrentControlSet

What Registry key contains information about the desktop setup for the account presently signed in to the server console?

Select one: a. HKEY_USERS b. HKEY_LOCAL_MACHINE c. HKEY_CURRENT_CONFIG d. HKEY_CURRENT_USER Feedback The correct answer is: HKEY_CURRENT_USER

What statement regarding the use of Microsoft Hyper-V is accurate?

Select one: a. Hyper-V supports only Windows based operating systems. b. Hyper-V supports only 64-bit operating systems. c. Hyper-V requires the use of a server cluster. d. Hyper-V supports both Windows and Linux operating systems. Feedback The correct answer is: Hyper-V supports both Windows and Linux operating systems.

What remote access tunneling protocol encapsulates data within HTTP packets for transit across the Internet?

Select one: a. IPSec b. SSTP c. PPTP d. L2TP Feedback The correct answer is: SSTP

Under what conditions can a global group be converted to a universal group?

Select one: a. It can be converted regardless of nested memberships. b. It can be converted as long as it is not nested in a domain group. c. It can be converted as long as it is not nested in a local group. d. It can be converted as long as it is not nested in another global group or in a universal group. Feedback The correct answer is: It can be converted as long as it is not nested in another global group or in a universal group.

What does a trace report in the Data Collector Sets tool contain?

Select one: a. It contains all instances triggered by a counter. b. It contains all counter activity for a given interval. c. It contains all instances. d. It contains only instances when traced events occur. Feedback The correct answer is: It contains only instances when traced events occur.

What does the Internet Information Services (IIS) role do?

Select one: a. It enables the server to function as a DNS server. b. It enables the server to act as a web server. c. It provides domain connected clients with routing information. d. It enables the use of the Secure Copy protocol. Feedback The correct answer is: It enables the server to act as a web server.

What does the % Privileged Time counter represent?

Select one: a. It is the amount of time privileged processes are using memory resources. b. It is the amount of time spent by the CPU for system activities in privileged mode. c. It is the amount of time privileged processes have utilized a disk. d. It is the amount of time a privileged user has been logged in. Feedback The correct answer is: It is the amount of time spent by the CPU for system activities in privileged mode.

What does the Processor Queue Length counter measure?

Select one: a. It measures the number of execution threads waiting for access to a CPU. b. It measures the number of instructions being processed at any given moment by the CPU. c. It measures the number of jobs the processor is waiting to handle due to contention for other resources. d. It measures the number of processes actively running across the system. Feedback The correct answer is: It measures the number of execution threads waiting for access to a CPU.

What is the purpose of a State of Authority record?

Select one: a. It provides the authoritative alias for a computer name. b. It provides information about secondary DNS servers and off-site primary servers. c. It identifies the authoritative DNS server for the current zone. d. It identifies SSL certificates in use on the domain. Feedback The correct answer is: It identifies the authoritative DNS server for the current zone.

When should an organization consider using Microsoft Azure Active Directory?

Select one: a. It should be used when a user needs remote access from another location outside the domain. b. It should be used when deploying Internet accessible services, such as FTP or DNS. c. It should be considered if the organization subscribes to Office 365 services, or other compatible web services. d. It should be used when using IIS as a web server for customer logins. Feedback The correct answer is: It should be considered if the organization subscribes to Office 365 services, or other compatible web services.

What statement correctly describes the pathping diagnostic command?

Select one: a. It shows the number of hops and other routing information on the path to the specified server or host. b. It displays information about the TCP/IP session from that computer. c. It polls another TCP/IP node showing the path through routers along the way, including packet loss. d. It polls another TCP/IP node to verify you can communicate with it. Feedback The correct answer is: It polls another TCP/IP node showing the path through routers along the way, including packet loss.

What is the role of the Netlogon service?

Select one: a. It supports shared objects, logon services, print services, and remote procedure calls. b. It maintains logon services such as verifying users who are signing in to the server or a domain. c. It keeps information about the networks the server connects to and communicates network information to applications on the server. d. It enables network communications and access by clients over the network via the SMB protocol. Feedback The correct answer is: It maintains logon services such as verifying users who are signing in to the server or a domain.

What feature provided at the Windows Server 2012 domain functional level creates a secure channel or tunnel between a client seeking authentication for a computer service and the server providing secure access keys for secure communications?

Select one: a. Kerberos Hardening Policy (KHP) b. Secure Tunneling Authentication Protocol (STAP) c. Tunneled Authentication Security (TAS) d. Flexible Authentication Secure Tunneling (FAST) Feedback The correct answer is: Flexible Authentication Secure Tunneling (FAST)

you have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints?

Select one: a. Layer Two Tunneling Protocol b. Secure Socket Tunneling Protocol c. Point-to-Point Tunneling Protocol d. Point-to-Point Protocol Feedback The correct answer is: Secure Socket Tunneling Protocol

What type of DNS resource record is used to identify a server that is authoritative for a zone?

Select one: a. MX record b. PTR record c. SOA record d. NS record Feedback The correct answer is: SOA record

What printer share permission gives the ability to have complete access to a printer share, including the ability to change permissions, turn off sharing, configure printer properties, and delete the share?

Select one: a. Manage Documents b. Print c. Manage printer properties d. Manage this printer Feedback The correct answer is: Manage this printer

What protocol can be used by a switch to automatically team NICs into a single logical connection?

Select one: a. Multilink Control Protocol b. Link Aggregation Control Protocol c. Channelized Link Teaming Protocol d. NIC Bonding Protocol Feedback The correct answer is: Link Aggregation Control Protocol

What printer data type utilizes the ANSI standard to represent characters, numbers, and symbols?

Select one: a. NT EMF b. TEXT c. RAW d. RAW (FF Auto) Feedback The correct answer is: TEXT

What statement regarding NTFS features is NOT accurate?

Select one: a. NTFS does not maintain an index of files. b. NTFS is a journaling file system. c. NTFS supports the use of file compression. d. NTFS supports the POSIX standard. Feedback The correct answer is: NTFS does not maintain an index of files.

What is NOT a true statement to keep in mind when designing an OU structure?

Select one: a. Nested OUs should be used sparingly to maintain simplified administration. b. Active directory works more efficiently when OUs are set up horizontally. c. Microsoft recommends nesting OUs at least four levels deep. d. Creation of OUs involves more processing resources because each request through an OU requires CPU time. Feedback The correct answer is: Microsoft recommends nesting OUs at least four levels deep.

What Remote Desktop Services role related feature helps to prevent man in the middle attacks by requiring authentication before RDS connections are established?

Select one: a. Network Level Authentication b. Network Link Approval c. Network Authentication Service d. Network Pre-Authentication Protocol Feedback The correct answer is: Network Level Authentication

What Windows Server 2016 service is used to keep a listing of computers and domain resources to be accessed?

Select one: a. Network List Service b. Server c. Computer Browser d. Active Directory Domain Services Feedback The correct answer is: Computer Browser

When using the Windows Server Update Services role, what is the term used to describe a server that regularly obtains updates from Microsoft for local deployment on the network?

Select one: a. Non-authoritative update server b. Upstream server c. Tertiary update server d. Downstream server Feedback The correct answer is: Upstream server

When using msconfig to change the startup type, what startup selection loads basic devices and services only, and has no configurable options?

Select one: a. Normal startup b. Diagnostic startup c. Limited startup d. Selective startup Feedback The correct answer is: Diagnostic startup

What process represents the Windows kernel and system process on a running Windows 2016 Server installation?

Select one: a. NtKrnl b. lsass.exe c. kernel.exe d. System Feedback The correct answer is: System

What Microsoft standard consists of a set of database access rules intended to provide a standard doorway to database data?

Select one: a. Open Database Connectivity (ODBC) b. Microsoft Database API (MDAPI) c. Data Source Database Connector (DSDC) d. Windows Database Access Layer (WDAL) Feedback The correct answer is: Open Database Connectivity (ODBC)

What statement regarding the Password Authentication Protocol is accurate?

Select one: a. PAP requires encrypted authentication between servers and clients. b. PAP supports the use of smart cards and token cards. c. PAP is set as the default authentication protocol when RAS is installed. d. PAP can perform authentication, but does not require it. Feedback The correct answer is: PAP can perform authentication, but does not require it.

What separator page file is used to print a Printer Control Language (PCL) separator page on a printer that handles PCL and PostScript?

Select one: a. Pclscript.sep b. Pscript.sep c. Sysprtj.sep d. Pcl.sep Feedback The correct answer is: Pcl.sep

What VPN tunneling protocol enables forwarding on the basis of MAC addressing?

Select one: a. Point-to-Point Protocol b. Layer Two Tunneling Protocol c. Secure Socket Tunneling Protocol d. Point-to-Point Tunneling Protocol Feedback The correct answer is: Layer Two Tunneling Protocol

What statement regarding the use of printer pooling is accurate?

Select one: a. Pooled printers must all use the same port type. b. Pooled printers can use any printers available, provided drivers are available. c. Pooled printers must be identical in order to be used in a pool. d. Pooled printers reduce print volume by spreading jobs across the pool. Feedback The correct answer is: Pooled printers must be identical in order to be used in a pool.

What tool is used to centralize local and shared printer control in one place, providing advanced management control?

Select one: a. Print Management tool b. Printer Control Facility c. Devices and Printers Utility d. Print Server Tool Feedback The correct answer is: Print Management tool

What statement regarding the use of print job priorities is accurate?

Select one: a. Print jobs are assigned a priority of 50 by default. b. A print job with a priority of 1 is considered a high priority job. c. Print jobs are assigned a priority of 99 by default. d. A print job with a priority of 99 is considered a high priority job. Feedback The correct answer is: A print job with a priority of 99 is considered a high priority job.

What role service available through Remote Desktop Services enables clients to use a web browser or the Start menu to view a list of RemoteApp programs and to start RemoteApp programs on the RDS server?

Select one: a. Remote Desktop HTTP Access b. Remote Desktop Gateway c. Remote Desktop Web Access d. Remote Desktop Connection Broker Feedback The correct answer is: Remote Desktop Web Access

What set of tools allows you to manage multiple servers from one Windows Server 2016 server?

Select one: a. Remote Server Administration Tools b. Windows Mobile Admin Tools c. Windows Remote Control Admin Tools d. Microsoft Branch Administrator Feedback The correct answer is: Remote Server Administration Tools

What RDS feature enables a client to run an application without loading a remote desktop on the client computer?

Select one: a. RemoteApp b. ThinApp c. AppPackage d. RDS NetApp Feedback The correct answer is: RemoteApp

What option from the Advanced Boot Options menu allows you to access system recovery and restore tools as well as diagnostics?

Select one: a. Repair Your Computer b. Safe Mode c. System Restore d. Recovery Mode Feedback The correct answer is: Repair Your Computer

What client can be used on UNIX and Linux systems to access SMB based shares?

Select one: a. Samba b. WinShareterm-36 c. SMBd d. Microsoft SMB Client for UNIX Feedback The correct answer is: Samba

What logs should you check in Event Viewer if you suspect that a service failure might be due to the Windows Firewall configuration?

Select one: a. Setup logs b. Forwarded events logs c. System logs d. Admin logs Feedback The correct answer is: Admin logs

What is not one of the possible ordering methods for referrals in a DFS namespace?

Select one: a. Sort by priority b. Lowest Cost c. Exclude targets outside of the client's site d. Random order Feedback The correct answer is: Sort by priority

What option should you use on a printer's Advanced properties page if pages are intermixing from printouts?

Select one: a. Start printing after last page is spooled b. Hold mismatched documents c. Keep printed documents d. Print spooled documents first Feedback The correct answer is: Start printing after last page is spooled

Under what msconfig tab can you change the default system startup type?

Select one: a. Startup b. Boot c. Tools d. General Feedback The correct answer is: General

What Windows Server 2016 feature implements software defined storage and is intended to make storage more versatile by making it easier to add storage, access storage, and use new storage capabilities?

Select one: a. Storage Spaces Direct b. StorageApp c. Software Storage Management d. Windows Dynamic Storage Feedback The correct answer is: Storage Spaces Direct

When a printer is shared, what statement accurately reflects the permissions applied to the share by default?

Select one: a. The Administrator account has only the Manage this printer and Manage documents permissions. b. The ALL APPLICATION PACKAGES special group has Manage this printer permissions. c. The everyone group has print permissions. d. The Creator Owner is limited to print permissions. Feedback The correct answer is: The everyone group has print permissions.

In the Windows Backup window, what information is covered by a backup including "system state" data?

Select one: a. The Boot and Recovery volumes. b. Operating system only. c. Operating system and boot files, and extra components such as roles and features installed. d. Operating system and boot files only. Feedback The correct answer is: Operating system and boot files, and extra components such as roles and features installed.

When the System File Checker utility restores a corrupted Windows file, where does it get the uncorrupted version from?

Select one: a. The C:\Windows\System32 folder b. The C:\Windows\Drivers folder c. The C:\Windows\.hidden\sysfiles folder d. The C:\Windows\System\backup folder Feedback The correct answer is: The C:\Windows\System32 folder

You are attempting to use Remote Desktop from a Windows Vista computer to a Windows Server 2016 install, but are unable to do so. You have verified that other computers running newer versions of the Windows operating system on the same network are able to remote desktop to the server. What is most likely the issue?

Select one: a. The Vista computer is not capable of using IPSec communication with Remote Desktop. b. The Windows Vista Remote Desktop client must be updated. c. The server has a firewall entry that prohibits older versions of Windows from using Remote Desktop with the server. d. Network Level Authentication is turned on in Remote Desktop settings. Feedback The correct answer is: Network Level Authentication is turned on in Remote Desktop settings.

What statement regarding the Windows Server Backup tool is NOT accurate?

Select one: a. The Windows Server Backup tool only backs up to NTFS and not FAT volumes. b. The Windows Server Backup tool can't perform a backup to a tape. c. The Windows Server Backup tool can't restore backups made from pre-Windows Server 2008 that use ntbackup.exe. d. The Windows Server Backup tool can't perform a backup to an external drive. Feedback The correct answer is: The Windows Server Backup tool can't perform a backup to a tape.

What happens if an encrypted file on an NTFS partition is moved to a FAT or FAT32 partition?

Select one: a. The file transfer does not occur, because FAT cannot store encrypted files. b. The file is moved, but is only visible to Windows systems that can see EFS files. c. The file encryption is maintained on the new location. d. The file is decrypted and placed onto the FAT volume. Feedback The correct answer is: The file is decrypted and placed onto the FAT volume.

Why do newer versions of the Windows client operating systems reduce the TCO for a network running Windows Server 2016?

Select one: a. The latest Windows operating systems are not as expensive to purchase licenses for as older workstations. b. The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016. c. The older Windows operating systems are no longer supported by Windows Server 2016, and often require third party management plugins to be added to Server 2016. d. The older Windows operating systems require security software in order to be secured on the network. Feedback The correct answer is: The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016.

What statement regarding ownership of a file or folder is NOT accurate?

Select one: a. The owner of the folder can modify all permissions on the folder. b. Ownership of individual files and folders can be transferred by anyone with the Take Ownership permission. c. The account that first creates the file / folder has ownership until transferred. d. An administrator does not have the ability to take ownership of a file / folder unless granted permission to do so. Feedback The correct answer is: An administrator does not have the ability to take ownership of a file / folder unless granted permission to do so.

What is the general rule for configuring the initial size of a paging file?

Select one: a. The paging file should be half the amount of RAM installed. b. The paging file should be 2 times the amount of RAM installed. c. The paging file should be 1.5 times the amount of RAM installed. d. The paging file should be the exact same size as the amount of RAM installed. Feedback The correct answer is: The paging file should be 1.5 times the amount of RAM installed.

You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to accomplish the upgrade?

Select one: a. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. b. The Windows Server 2016 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. c. The server can't be upgraded to Server 2016, as no upgrade path exists. You must perform a clean install. d. The server should be updated to the latest service pack for 2008 R2, then upgraded to Server 2012, after which the server can be upgraded to Server 2016. Feedback The correct answer is: The server should be updated to the latest service pack for 2008 R2, then upgraded to Server 2012, after which the server can be upgraded to Server 2016.

What happens if a client device connects to a shared printer and discovers that the print driver is not current on the client device?

Select one: a. The shared printer is inaccessible until the driver is updated. b. The client will prompt the user to update the driver or continue using the old one. c. The shared printer is available, but at reduced performance / subject to the limitations of the outdated driver. d. The client will update the driver used for the printer automatically. Feedback The correct answer is: The client will update the driver used for the printer automatically.

You are troubleshooting a server and have found that that the processor usage is frequently over 85%, even when under normal loads. What should be done to rectify the problem?

Select one: a. The system's priority should be switched from Programs to Services. b. The processor should be upgraded. c. The critical processes on the server should be set to realtime priority. d. The memory available in the system should be increased. Feedback The correct answer is: The processor should be upgraded. Jump to...

What happens if a user attempts to sign in while the global catalog server for the domain is offline?

Select one: a. The user will be allowed to sign in only to the local computer. b. The user will be allowed to sign in to the network with cached credentials. c. The user will not be allowed to log in. d. The user will be allowed to log in, but group membership information will not be loaded. Feedback The correct answer is: The user will be allowed to sign in to the network with cached credentials.

While using your Windows Server 2016 install, you receive a 0x0000000A IRQL Not Less or Equal stop message. What is most likely the issue?

Select one: a. There is an issue with the file system. b. The system is infected with a virus. c. There is a hardware resource conflict. d. A memory module is failing. Feedback The correct answer is: There is a hardware resource conflict.

What is a user who has "List folder contents" permissions allowed to do?

Select one: a. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. b. They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. c. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. d. They can traverse folders, view file contents, view attributes and permissions, and execute files. Feedback The correct answer is: They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

You have several UNIX and Linux computers in your network and need to ensure that they can use shared printers through Windows Server 2016. What role service should you install in Print and Document Services to accomplish this?

Select one: a. UNIX Print Services b. WinPrint for UNIX c. LPD service d. Samba Shared Printers Feedback The correct answer is: LPD service

What is NOT an attribute that must be defined for each Active Directory account?

Select one: a. User's full name b. Account holder's e-mail address c. Sign-in name d. Domain Feedback The correct answer is: Account holder's e-mail address

What Server 2016 role enables the use of a File Transfer Protocol service?

Select one: a. Web Server (IIS) role b. Network File Access role c. Remote Access role d. File and Storage Services role Feedback The correct answer is: Web Server (IIS) role

What is the minimum forest functional level should you use if you wish to make use of the protected users security group?

Select one: a. Windows Server 2008 R2 b. Windows Server 2008 c. Windows Server 2016 d. Windows Server 2012 R2 Feedback The correct answer is: Windows Server 2012 R2

What domain functional level removes compatibility for Network Access Protection?

Select one: a. Windows Server 2008 R2 b. Windows Server 2012 c. Windows Server 2012 R2 d. Windows Server 2016 Feedback The correct answer is: Windows Server 2016

You are attempting to install Windows Server 2016 on a SCSI based disk, but the installation program does not find the disk. What is the most likely cause?

Select one: a. Windows Server 2016 does not support SCSI based hard drives. b. The BIOS does not recognize the SCSI controller and has not enabled the device. c. The drive itself is configured as a slave by cable position, rather than master. d. Windows Server 2016 requires a driver for working with the SCSI controller. Feedback The correct answer is: Windows Server 2016 requires a driver for working with the SCSI controller.

What type of device includes web services and can use protocol based messaging to inform clients of their capabilities?

Select one: a. XPS Enhanced enabled devices b. Web Services for Devices (WSD) enabled devices c. Simple Network Management Protocol enabled devices d. LPT Extended devices Feedback The correct answer is: Web Services for Devices (WSD) enabled devices

The templates used by the Data Collector Sets tool are stored using what data format on the local computer?

Select one: a. YAML b. Markup c. XML d. HTML Feedback The correct answer is: XML

You are attempting to create a new universal group but find that the radio button in the Create New Object - Group dialog box is deactivated. What is the issue?

Select one: a. You are trying to create a universal group in an OU without the permission to do so. b. You are attempting to create a universal group within another universal group. c. You are operating in a domain with a Windows 2000 domain functional level. d. You are not creating the group on the global catalog server. Feedback The correct answer is: You are operating in a domain with a Windows 2000 domain functional level.

What is not a valid requirement for joining a computer to an Active Directory domain?

Select one: a. You will need a DNS name for the domain to be joined. b. You must have an authorized user account in the domain. c. One domain controller and a DNS server that can resolve the domain name must be online. d. You must have Internet connectivity and be capable of reaching microsoft.com Feedback The correct answer is: You must have Internet connectivity and be capable of reaching microsoft.com

What symbol cannot be used in an account name in Windows Server 2016?

Select one: a. _ b. - c. ! d. : Feedback The correct answer is: :

What kind of group is used for e-mail or telephone lists, to provide quick, mass distribution of information?

Select one: a. distribution groups b. domain local groups c. universal groups d. global groups Feedback The correct answer is: distribution groups

What type of encryption is used by the Encrypting File System feature in Windows?

Select one: a. hashing b. symmetric c. asymmetric d. both symmetric and asymmetric Feedback The correct answer is: both symmetric and asymmetric

What command should be used to flush the DNS cache information on a Windows Server 2016 install with DNS role?

Select one: a. ipconfig /flushdns b. net sh flush dns c. Dnscmd /ClearCache d. dns /flush Feedback The correct answer is: Dnscmd /ClearCache

What command line utility can be used to verify TCP and UDP connectivity to services, as well as display TCP/IP sessions?

Select one: a. netstat b. ping c. ipconfig d. sockstat Feedback The correct answer is: netstat

What command prompt command can be used to partition a disk and mange multiple partitions on a system?

Select one: a. parted b. chkdsk c. diskpart d. format Feedback The correct answer is: diskpart

You are troubleshooting a network issue on your server, and suspect the issue exists beyond your gateway / router, in your provider's network. What utility could you use to show routing information between your server and an external remote host?

Select one: a. ping b. tracert c. nslookup d. arp Feedback The correct answer is: tracert

What term is used to describe the Windows Server 2016 ability to run a program in an area of memory separate from areas used by other programs?

Select one: a. preemptive multitasking b. ordered multitasking c. cooperative multitasking d. precognitive multitasking Feedback The correct answer is: preemptive multitasking

You are working on a fresh install of Windows Server 2016 Core and need to set the date and time. What command can you use to do this?

Select one: a. rundll32,datetime b. Set-Time c. control timedate.cpl d. datetime Feedback The correct answer is: control timedate.cpl

You are currently using the Windows Server 2016 installation DVD to provide a command prompt for accessing your server's C:\ drive. You have been given a compressed archive containing a needed driver to restore functionality to your server. What command available on the DVD can you use to uncompress the archive?

Select one: a. unzip b. untar c. extract d. expand Feedback The correct answer is: expand

By default, Windows file sharing utilizes what protocol?

Server Message Block (SMB)

After deleting an account, what happens to the associated GUID?

The GUID will be permanently deleted and never re-used.

After configuring SNMP traps for a system, you discover that traps are not being sent out. What is most likely the issue?

The SNMP Trap service has not been started.

After using the chkdsk utility via a command prompt running from the Windows installation DVD, you receive a message that says "Failed to transfer logged messages to the event log with status 50". What does this message mean?

The chkdsk run has completed, but does not have the ability to write to the event log in this mode.

After experiencing an unexpected reboot, you receive the 0x0000002E Data Bus Error stop message. What is most likely the issue?

The system has defective memory.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure?

The user's account has been locked due to frequent failed password attempts.

A folder target in a DFS namespace is in what format?

Universal Naming Convention (UNC) format

What command should be used to flush the DNS cache information on a Windows Server 2016 install with DNS role?

What command should be used to flush the DNS cache information on a Windows Server 2016 install with DNS role? Select one: a. ipconfig /flushdns b. net sh flush dns c. Dnscmd /ClearCache d. dns /flush Feedback The correct answer is: Dnscmd /ClearCache

What authentication standard is utilized for Windows Server 2016 if Active Directory is not installed?

Windows NT LAN Manager version 2

Microsoft's Point-to-Point Encryption uses encryption keys that have varying length of what size? Select one:

a. 32 bits to 96 bits b. 128 bits to 1024 bits c. 40 bits to 128 bits d. 64 bits to 196 bits Feedback The correct answer is: 40 bits to 128 bits

What protocol is used by Storage Spaces Direct for rapid communication between storage nodes?

a. Fibre Channel Protocol b. Server Message Block v3 c. iSCSI d. Network File System Feedback The correct answer is: Server Message Block v3

In order to utilize SSTP, what is the minimum supported Windows version that must be installed for the client? Select one:

a. Windows XP b. Windows 7 c. Windows 8 d. Windows Vista Feedback The correct answer is: Windows Vista

What happens when you move a file with NTFS permissions to a

different NTFS volume? Select one: a. The file retains the permissions it had prior to the move. b. The file permissions are merged with the destination parent's permissions. c. The file loses all permissions, and must be assigned new permissions. d. The file inherits the permissions of the parent folder to which it is moved. Feedback The correct answer is: The file inherits the permissions of the parent folder to which it is moved.

When a computer or network device requests IPv6 address from a DHCP it is called _____________.

stateful autoconfiguration

According to Active Directory Guidelines it is recommended that you do not build more than ___ level of OUs (optimally, no more than one or two levels).

ten


संबंधित स्टडी सेट्स

Logistics Chapter 1 SB Questions

View Set

Lab 12: Dehydration of Cyclohexanol

View Set

Chapter 31 - Listening Guide Quiz 21: Mozart: Eine kleine Nachtmusik, III

View Set

Mesoamerican Art History Final Exam

View Set

Chapter 1 : General California Insurance Law

View Set

Information Assurance Final (Ch 8-14)

View Set