CTEC 305 FINAL review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Kristofer creates a PowerShell script to automatically execute a set of tasks creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute.

$count

What is the IP address that is assigned to the network loopback interface?

127.0.0.1

Which of the following is a requirement for storage spaces direct?

A 10 GB Ethernet network interface with remote-direct memory access(RDMA) support is a must.

Sam an administrator, sends out an HR policy file to Vicky, Mohammmad, Charlie and Renna. They save the HR policy file on their home directories under a shared....

A new copy of Renna's file is created and associated with the same file name.

Jenro installed the Windows Admin Center on a Windows Server 2019 System called SERVERX. He intends to manage other servers using SERVERX. If SEVERX has a web server software installed using port 443, which of the following must be true?

A. Jerno can connect to the Windows Admin Center only by appending the port number to the URL.

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You download the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

A. change the boot order in the BIOS

Linwood is the IT manager of a small organization. Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

A. cloud-based server.

Which of the following organizations should consider using Azure active directory?

An organization that subscribes to Office 365 services.

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

Any answer about auditing is correct for this question

After an RODC gets stolen along with a few other computers, Shania, the System administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the reset all passwords for computer accounts that were cached on this Read-only domain controller option.

Any computers that were not stolen will need to rejoin the domain.

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and recieving adquate power supply. What is the most likely explanation for this issue?

C. Computers contain a limited number of IRQ lines.

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements, Don needs to set up a virtual lab with twenty windows operating systems on a 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files.

C. Don should use thin provisioning

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored?

C. E:\VMs\Virtual Machines

Identify the true statement about type 2 hypervisors

C. They run multiple Operating systems on a single host.

Rapheal has successfully installed the essentials edition of Windows Server 2019 on his computer. He's completing some post-installing configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why?

COR-WEB-12 because it contains allowed characters and is shorter than 15 characters.

Which of the following statements about directory partitions is true?

Changes to a domain on a domain controller are only replicated to domain controllers within the same domain.

Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation.

Checkpoints.

Rishab is looking for ways to manage duplicate file contents on his organization's shared drive. He enables data depublication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?

Click set deduplication schedule

Barry is a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores to the rive. Which of the following steps will help Barry limit employee's space usage?

Configuring User Quotas.

Tara, an administrator has added storage devices to the storage pool and selected the RAID level for the virtual disk using server manager. She wishes to allocate more space than required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data.

Create several Thin-Provisioned virtual disks

Rhonda's company gas a rack containing one email server, one file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda who is working from home tries sending an email to a colleague but the email is not sent. Which of the following is most likely the cause of this?

D. The blackout took out the interent, So Rhonda can't reach the email server.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the safely remove hardware option. What should Ivan do?

Disable caching and flushing

What is driver signing and how does it affect drivers that are not signed in Windows Server 2019?

Drivers that aren't signed will cause an error and they cannot be used.

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all activitiy within the folder assets?

Edit the Default Domain Policy object to enable auditing functionality.

Merjem, a PHD student is writing her thesis. She takes regular backup of her files and data. When taking backup, she choose the faster backup performance option in the Optimize Backup Performance WINDOW. Which of the following is true of the backup process in the given scenario?

Every backup only backs up data that has been modified since the previous backup.

If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

FALSE

Alaska, a System administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among locations where the files have not been copied?

FAT32 on a Windows Filesystem

A limitation of Windows Powershell is that it cannot be used to install or remove Windows roles.

False.

Fareeda, a system administrator, is configuring security settings for a generation 2 virtual machine called VM1. She enables the Trusted Platform Module(TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks.

Fareeda enabled shielding in the security settings for VM1.

What is the term for domain and forest functions that must be coordinated from a single domain controller?

Flexible single master operations

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Felipe requests the system administrator, Lucida, to change the font settings on the shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which registry root key should Lucida access to change the font size.

HKEY_Current_User

What is the self-healing feature of NTFS, and how does it work?

If the partition is damaged than NTFS can gather up data and "heal" itself on a volume of the disk.

What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?

It can be used to create a new site object.

Which of the following is true of Storage Server 2019?

It cannot be purchased from Microsoft directly.

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and makes changes if necessary. However, the colleague can only view the contents. Denji does not have the right to grant the required permissions.

Modify

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure of the NTFS system is being used. The same cannot be said for a FAT32 filesystem. What do you think is the difference?

NTFS is a journaling filesystem while FAT32 is not.

Madison is using the Backup schedule wizard from the actions pane of the windows server backup tool. He selects the backup configuration as custom and specifies the time's to be backed up. While adding the items to be backed up, he happens to select the system state option. What does this option create a backup of?

Operating System Settings

Shae is using a Windows Server 2019 Operating System. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PNP)

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied.

Rebbecca is configuring a RAID with three storage devices. If she saves a file, the file is divided into three sections, with each section written to sperate storage devices concurrently, in a third of the amount of time it would take to save a file on one storage device. Which of the following RAID levels is Rebecca using?

RAID 0

Which of the following RAID level configurations is not supported by Windows Server 2019?

RAID Level 2

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters full control shared folder permissions.

Right-Click the folder, highlight the sharing tab. and click the advanced sharing button.

Which of the following statements is true of SAN devices?

SAN devices are functionally like an external USB drive.

You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task?

Set-ADDomain -Identity domainA.com -DomainMode Windows2012R2Domain

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers. DC1, DC2 and DC3. DC1 contains a copy of the global catalog and three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow?

She should create the Domain Naming Master role on DC1.

Adir suspects that some of the files on the Windows server are corrupt. She cannot wait for the end of the business day to check the files or overwrite any corupt files. Adir can either use the System file checker or Sigverif? Which tool should Adair use and why?

She should use Sigveif.

Minato has created multiple virtual machines. He is using the virtual switch manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this to optimize performance across the network?

Single-root I/O virtualization

Candace works as a system administrator at Capia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the standard edition of windows server 2019 and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are store on SSDs. What feature should candace enable to improve the effiency of the server?

Storage Tiering

Which of the following statements regarding the use of system and user environment variables is accurate?

System variables are always set first.

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario?

The checkpoint file that is used to reverse the changes will be deleted from the system.

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice?

The guest operating system on the virtual machine is a 32-bit version of Windows 7

Calvin has installed Windows Server 2019 on his personal computer to take part in the training program. During one of his lab exercises, his computer crashes. Upon investigation he finds that the server has not created a crash dump file. What is most likely the reason that Calvin's computer failed to create a dump file?

The paging file id disabled on the computer.

You are attempting to upgrade a server from windows server 2008 R2 to windows server 2019 standard edition. What must be done in order to accomplish the upgrade?

The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 after which the server can be upgraded to Server 2019.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure?

The user's account has been locked because of frequent failed password attempts.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions and execute files, but cannot view file contents.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. What does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system.

Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.

True

Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.

True

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console and Hyper V PowerShell cmdlets.

True

The subnet mask cannot be modified once a scope is created.

True

cmdlets are case-insensitive, so Get-Host and get-host are equivalent

True

Azure Active Directory can be configured to trust an Organization's active directory forest, or mirror it using a synchronization service.

True.

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running windows 10, but a few systems are running windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege access management. What should you do next?

Update all the domain controllers running Windows Server 2012 to Windows Server 2016.

Orana works for an organization that sets up several virtual machine on a day-to-day basis to be deployed for various clinet. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use?

Virtual Machine Templates

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She is looking for a way to test the web-application accross different Operating Systems on her own computer. Which of the following features should she use?

Virtualization

Eileen is a web app developer. All the apps that Eileen builds run Linux containers on the cloud. She currently uses a Windows 7 Operating System. Why should Eileen consider upgrading to Windows 10?

Windows 10 has a subsystem for Linux

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

a. The server will be dedicated to web services and accessed via the Internet.

Thandiwe is using a server running the Windows Server 2019 Operating System. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv

b. Get-HotFix

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up.

b. Natalie did not enable the archive attribute on the folder.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

b. The folder inherits the share permissions but loses the NTFS permissions.

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine.

b. The guest operating system on the virtual machine is a 32-bit version of Windows 7.

Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?

b. iSCSI initiator

What is the IP address that is assigned to the network loopback interface?

c. 127.0.0.1

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp."

c. Add KettleApp as a keyword in the folder's properties.

Malaika uses the Edge Browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entries is the server?

c. The responding computer

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process.

c. Virtual machine templates

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

c. Windows Server Catalog

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.

d. NTFS is a journaling filesystem, while FAT32 is not.

What is the advantage of using production checkpoints over standard checkpoints?

d. Production checkpoints cause fewer problems than standard checkpoints when applied.

Tamara wants to install Server Core on a virtual machine on her windows server 2019 computer. She tries installing but fails. Which of the following is most likely to have caused the installation failure?

d. Tamara's computer has 30 GB free hard disk space.

Alina is using Windows Powershell on a windows server 2019 system for the first time She wants a list of all cmdlets in Powershell, so she types the following command.... Why does Alina use the pipe symbol (|) in this command?

d. To send the output for Get-Command to more, which displays the output page by page.

Asmara a system administrator, is performing routine maintenance checks on the Windows Servers in her organization. As part of these checks, she is required to verify that drivers and systems files on each server are not corrupted.

d. sfc/scannow

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, Foreign Security principals, Managed Service Accounts and user.

false

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.

false

Decision constructs such as IF and Switch allow you to perform a task multiple times.

false

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering.

false

If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

false

Live migration cannot be enabled if the Hyper-V host operating system is joined to the domain.

false

The DFS replication role needs to be installed to configure folder quotas and file screens.

false

The Windows 10 Education edition supports Hyper-V but not nested virtualization

false

Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the administrators group.

false

You need multiple boot images on a WDS server, one for each operating system.

false

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

false.

Trimming erases sections of the volatile memory chips on an SSD that no longer contains data consolidating the existing data into fewer memory locations.

false.

Which of the following is a term given to the software component in the Operating System that connects to the SAN device via iSCSI?

iSCSI initator


Set pelajaran terkait

Developmental psych Cognition and Language Development

View Set

English Semester 1 Final-Julius Caesar

View Set

prepU Chapter One Health Assessment

View Set

statistic 1.3: data collection and experimental design

View Set

7 - Health Insurance Underwriting

View Set