CTS1390 Midterm SG

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Deploy with Group Policy

A print device, Printer_2AC, is installed on SEVERX within your organization. The printer must be automatically added to each computer added to the domain. Which of the following options can be used for this purpose?

The user's account has been locked because of frequent failed password attempts.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure?

Windows Admin Center

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?

msDFSR-Topology because it has a member object for each member.

Enoch is a system administrator who is configuring DFS replication. One of the replication groups has six servers. What topology should Enoch use and why?

By using Custom Printer Filters

Enoch's organization has an email account configured for his print server on an email server. How can he configure the Print Management console to email printer notification to an email address, or run a script?

Write extended attributes

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

Petra.T will be allowed to log in to the system with cached credentials.

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?

Remove the computer name SERVERX

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do?

It manages the files and folders on the network, replicates the files between servers, and consolidates the files.

Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.

You first head to the Active Directory Administrative Centre. Afterwards, you click on the domain name and selected the Deleted objects. Then you right click the container and restore the deleted objects.

Explain the process of restoring a deleted user account object using the Active Directory Administrative Center.

It when you add a computer to the directory before joining.

Explain the use of prestaging.

It would work like a junction point.

Explain with an example how access to a DFS namespace works when two or more shares are specified for a target.

Windows Deployment Services

Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use?

Any computers that were not stolen will need to rejoin the domain.

After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario?

Two

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?

FAT32 on a Windows 7 system

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

Distribution groups

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution?

When new domain controllers are added to this network, they will be added to NewYorkSite by default.

Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario?

E:\VMs\Virtual Machines

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored?

VM1's virtual hard disk files will be moved to the destination server.

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?

She should create the Infrastructure Master role on DC1.

Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog. Which of the following is a best practice that Arpita should follow?

Bidirectional printing

As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose?

You use the Get-DFSReport cmdlet to see which files are the problem.

As the system administrator, you have enabled DFS replication. After a while, users complain that they are facing synchronization issues with a file. When troubleshooting, you find that several users are using the file simultaneously. What steps will you take to resolve this issue?

sfc /scannow

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

Configuring user quota

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?

Set the printer to only print after jobs are spooled.

Bellamy, an administrator, identifies that one of the printers on the network is having an issue where long print jobs are mixing pages from other print jobs. What should Bellamy do to resolve this issue?

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system?

Bypass

WindowsServer2019VMTemplate

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

Account

Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change?

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue?

Computers contain a limited number of IRQ lines.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention

Deion intends to use this virtual machine in a nested virtualization configuration.

Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision?

Modify

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?

Domains, Forests, Trees

Describe the three main container objects within an Active Directory database.

The three switches are external, private, and internal. External connects to the physical network. Internal does not connect to the physical network. The private switch allows communication between VMs.

Describe the three virtual switches that Hyper-V uses with virtual machines.

Standard takes a ss of VM and memory state. Production are points in images that can be restored.

Describe the two checkpoint mechanisms provided by Windows Server 2019.

CSSP- Delegates credentials of user on remote server. Kerberos- Default Active Directory authentication without signing

Describe the two protocols that can be used by servers to authenticate live migration.

Fareeda enabled shielding in the security settings for VM1.

Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true?

The checkpoint file that is used to reverse the changes will be deleted from the system.

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario?

He change the bridgehead server to one with a faster network interface.

Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance?

Configure passive screening

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

Full control

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file?

To allow Hyper-V to start the host operating system

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable?

$count

Freya changed the physical disk's settings to take it offline.

Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true?

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.

Get-HotFix

She enabled replication on SERVERY.

Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete?

Transport Server

Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature?

Raw and Text

Harper uses the Print Processor button to modify the default format used by print APIs for the documents stored in the spool folder. What are the different data types that she can use in formatting a print file?

Edit the Default Domain Policy object to enable auditing functionality

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?

Hiroshi should create site objects and specify timed intervals for replication using site link objects.

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue?

Use the print management console to open the MMC and right click Printer -> Add a printer.

How can you add a new printer to a print server within the Print Management tool using the default search option?

It corrects errors in transmission.

How does TCP provide reliable end-to-end delivery of data?

Checkpoints

Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use?

Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu

Identify the correct process that automatically adds SMB shared printers to computers that join a domain.

Rendering

Identify the process that coverts the documents within the spool folder to a format understandable by the print device.

Storage scalability.

If Active Directory did not provide centralized user authentication using Kerberos, what would be the implications for NFS?

cipher.exe

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

True

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets.

Add KettleApp as a keyword in the folder's properties.

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?

On VM2

Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

Disable file caching and flushing

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?

Hard reset the printer.

Jasper is printing a document. However, he encounters a printing problem that allows him to print only one character per page. Suggest a solution to Jasper to overcome the printing problem.

Delete the RODC computer account

Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take?

Minisha is a member of the Enterprise Admins group in both organizations.

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true?

Add branch office user accounts to the Allowed RODC Password Replication Group

Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next?

It uses a minimal color interface that is similar to the one provided by Server Manager.

Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center?

MSmark is a computer name and not Mark's user account name.

Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?

The guest operating system on the virtual machine is a 32-bit version of Windows 7.

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice?

Print Server - Managing mutiple printers abd servers. Distributed Scan server - Receives scanned documents from Network Scanners Internet Printing - Website to manage print jobs on the server. LPD Service - Uses LPR to print to shared printers.

List and explain the different Print and Document Services components that are available while installing the Print and Document Services server role?

SAB

Madison is configuring Live Migration within Hyper-V Manager for a server. The bandwidth on the server's network is limited. What configuration options would you advise Madison to use?

The responding computer

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

Updated or reinstalled the printer driver on the print server

Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone?

Live migration

Maurice is the system administrator of an IT company. The company provides virtual machines on hire to other firms. Recently, a client asked for a virtual machine that has the least downtime. Which of these Hyper-V features, replication, live migration, or checkpoints should Maurice use for this requirement?

The virtual machine will have a 127 GB dynamically expanding hard disk.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?

Single-root I/O virtualization

Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable?

Natalie did not enable the archive attribute on the folder.

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.

Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.

SMB

Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used.

The index attribute

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​ Which of the following attributes should Nora deactivate to exclude the data files from searches? ​

Set printers to start printing only after the pages are spooled.

One of the printers on your network is having an issue whereby long print jobs are mixing pages together from other print jobs. What can you do to resolve the issue?

Virtual machine templates

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use?

Another group has the Deny box checked for Read access.

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

Performance

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?

Q

Download Virtual machine and run the windows server on it.

Rafiq uses Windows 10 Professional. He has enrolled in a Windows Server course. How can he practice the lab exercises on his system?

Install Windows Deployment services.

Rajesh has configured the WDS server with the appropriate boot and install images. He configures the client computers to enable them to boot via the network interface. He is prompted to begin installation on the client computers. The boot image is downloaded from the WDS server. What are the next steps that Rajesh must perform to complete the installation process?

COR-WEB-12 because it contains allowed characters and is shorter than 15 characters.

Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why?

She should create the Domain Naming Master role on DC1.

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow?

Windows PowerShell

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing the task?

The server will be dedicated to web services and accessed via the Internet.

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

The WDS service is not yet configured.

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate?

Group Policy

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario?

It is slow because there are a lot of users accessing the filesystem.

Serena configures user quotas on a regularly accessed filesystem with hundreds of users. Some users complain that their quotas are exhausted even though they have not created any files on the system, while other users complain that the filesystem is slower than other filesystems. How would you explain this?

Pause Printing

Several users access the same shared printer in Lia's organization. A colleague tells her that the paper tray needs to be refilled. She uses the Printer menu to manage the print jobs and refill the paper tray. Which option do you think she would have chosen in the Printer menu if the documents within the print queue resumed printing after the refilling of the paper tray?

It's the same as encrypting a file.

Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to "Encrypt data access." Is this the same as encrypting a file or folder?

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first?

Test-NetConnection

What is the term for programs and system software that can query WMI?

WMI consumers

Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?

At least 7 characters. Non-Alphabetic characters. 0 through 9 digits.

What are the Windows Server 2019 default password requirements?

The permissions are copied.

What are the effects on file and folder permissions when a file or folder is created, copied, or moved?

BeginPrint, EndPrint, PrintPage, QueryPageSettings, Print

What are the events that occur in a system before a document is successfully printed?

Pscript.sep, Sysprint.sep, Sysprtj.sep, Pcl.sep.

What are the four different separator page files that can be used with Windows Server 2019?

To raise the forest functional level, you need administrative permissions to access the properties and raise the domain functional level.

What are the necessary conditions and permissions required to raise domain or forest functional levels?

MAC address caching, IPSec task offload, Virtual Machine Queue

What are the optional network interface components available under Hardware Acceleration or Advanced Features when modifying the network adapter settings for a virtual machine?

Universal- All users and groups from any domain in the forest Global- All users and groups from the same domain but universals Local- All users from any domain and universals in the forest.

What are the three Active Directory group scopes and their restrictions regarding the objects that the groups can contain and the domains within the forest that can access them?

All files are available offline to users , specific files will be available offline, no files from the shared folders are available offline.

What are the three ways in which a shared folder can be cached?

Boot.wim and Install.wim.

What are the two Windows Imaging Format (WIM) files used in Windows Deployment Services?

System Control and Discretionary control.

What are the two different types of ACLs used by Windows Server 2019?

The file is decrypted and placed onto the FAT32 volume.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

It will create an account in the domain.

What happens when you join a computer to an Active Directory domain?

Production checkpoints cause fewer problems than standard checkpoints when applied.

What is the advantage of using production checkpoints over standard checkpoints?

It made to help improve security using authentication requests.

What is the purpose of a Read-only Domain Controller?

It automatically detects errors and fix them by itself. It detects corruptions in the file system and automatically repairs them.

What is the self-healing feature of NTFS, and how does it work?

It lets you customize Windows 10 such as change personal and privacy settings.

What purpose is served by the Out-of-Box Experience (OOBE) wizard during rapid server deployment?

Add manufacturer-supplied printer drivers for the associated print device

Which printer server configuration task is performed before shared printers are added within the Print Management tool?

Print Server

While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected?

Hard reset your printer.

While printing a document, what should be done if no documents are getting printed from the printer?

It is faster and cheaper.

Why do large organizations use rapid server deployment?

Listed the network interface at the top of the boot order

Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed?

Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next?

Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task?

Advanced

Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose?

Read

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

To send the output from Get-Command to More, which displays the output page-by-page

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?

The paging file is disabled on the computer.

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file?

Storage tiering

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server?

Computers contain a limited number of IRQ lines.

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue?

Test-NetConnection

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first?

Virtualization

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following should she use?

Bypass

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system?

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?

Disable file caching and flushing

Don should use thin provisioning.

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files.

Windows 10 has Windows Subsystem for LInux

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10?

Decision constructs such as If and Switch allow you to perform a task multiple times.

False

HKEY_CURRENT_USER

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size?

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size?

HKEY_CURRENT_USER

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

They can run multiple operating systems on a single host.

Identify the true statement about Type 2 hypervisors.

Universal Group Membership Caching

If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?

Janice has enabled nested virtualization on the Windows 10 operating system.

Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true?

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Q

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?

$count

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable?

A cloud-based server

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

Run these web applications in containers

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

Run these web applications in containers.

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

USB

Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system?

Nadira powered off VM1, ran a PowerShell command, and powered on VM1.

Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization?

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PnP)

The blackout took down the Internet, so Rhonda can't reach the email server.

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue?

SERVERX is the domain controller for the Active Directory

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which of the following may be a reason for this?

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this?

SERVERX is the domain controller for the Active Directory.

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Satish's computer does not have an optical disk drive.

Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true?

Plug and Play (PnP)

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Performance

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

Which of the following statements regarding the use of system and user environment variables is accurate?

System environment variables are always set first.

What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

Tamara's computer had 30GB free hard disk space

Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure?

Get-HotFix

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file?

The paging file is disabled on the computer.

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?

To send the output from Get-Command to More, which displays the output page-by-page

Walter Wells spends a considerable amount of money encrypting Linux virtual machines.

Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?

The folder inherits the share permissions but loses the NTFS permissions.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The print jobs are divided into smaller parts and sent to the print device sequentially.

What happens when a print job exceeds the print device storage capacity?

It a group of computers in a network. A domain affects it's members access to resources.

What is a domain, and how does it affect computers and users that are members of the domain?

A subnet mask 128 bit number that is split into two. Ex: 255.255.255.0

What is a subnet mask in the context of IPv4? Explain with an example.

127.0.0.1

What is the IP address that is assigned to the network loopback interface?

Flexible Single Master Operations

What is the term for domain and forest functions that must be coordinated from a single domain controller?

WMI consumers

What is the term for programs and system software that can query WMI?

Tags help identify servers and can be searched using the Search dialog box

What is the use of adding tags to servers in the Windows Admin Center?

It can be used to create a new site object.

What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?

Start printing after last page is spooled

What option should you use on a printer's Advanced properties page if pages from different jobs are mixed?

Sysprint.sep

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document?

Windows Server Catalog

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Data Execution Prevention

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Cancel all print jobs

Which of the following actions cannot be performed by a user with Print permission?

Suspend-PrinJob

Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer?

LDAP

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

NT EMF

Which of the following is the default format used to store documents received by the GDI API for modern print devices?

It cannot be purchased from Microsoft directly.

Which of the following is true of Storage Server 2019?

Custom filters

Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems?

Document List

Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected?

Distributed File System (DFS) replication

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

List in the directory

Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window?

An organization that subscribes to Office 365 services

Which of the following organizations should consider using Azure Active Directory?

Manage Server

Which of the following print server permissions allows users to configure print server settings within the Print Management tool?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Which of the following statements about directory partitions is true?

It is a computer that requests for resources from another computer on the network

Which of the following statements is true of a client on a computer network?

An administrator can take ownership of a file or folder without being granted the permission to do so.

Which of the following statements is true of the ownership of a file or folder?

It represents the oldest Windows Server version that can be used on a domain controller.

Which of the following statements regarding a domain functional level is accurate?

System environment variables are always set first.

Which of the following statements regarding the use of system and user environment variables is accurate?

The Advanced tab

Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options?

Windows System Image Manager

Which of the following tools can be used to create an unattended answer file?

The Windows Search Service

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?

Windows Admin Center

The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade?

HKEY_CLASSES_ROOT

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

Change the boot order in the BIOS.

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

sfc/scannow


Set pelajaran terkait

ISC(2) CAP: RMF Roles & Responsibilities

View Set

Ch 38 ass of dig and gas fun 😜

View Set

Chapter 1: Mass Communication, Culture, and Media Literacy

View Set

español direct object nouns and pronouns

View Set

Disease of the Nasal Cavity, Sinuses, Pharynx, and Larynx

View Set