Enterprise computing midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable?

$count

What is the IP address that is assigned to the network loopback interface?

127.0.0.1

Generation 2 virtual machine

A Hyper-V virtual machine that emulates newer hardware and performs faster than a Generation 1 virtual machine

generation 1 virtual machine

A Hyper-V virtual machine that emulates older hardware.

What are PowerShell providers? List some examples.

A PowerShell plug-in that manages a certain area of the system. A good example is filesystem provider

Hyper-V

A Type 1 hypervisor created by Microsoft.

What is a root key and which are the five root keys that exist in the Windows Server 2019 Registry?

A root key is a primary or highest level catergory of data contained in the Windows registry. The five root keys are HKEY_LOCALMACHINE HKEY_CURRENT_USER HKEY_USERS HKEY_CLASSES_ROOT HKEY_CURRENT_CONFIG

cloud servers

A server that is located within a data center on the Internet.

domain controllers

A server within a domain that authenticates other computers and provides for centralized management.

Non-Volatile Memory Express (NVMe)

An SSD technology that provides fast transfer speeds within a small form factor.

Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options.

COR-WEB-12 because it contains allowed characters and is shorter than 15 characters

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD.

Change the boot order in BIOS

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead.

Cloud based server

Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue?

Computers contain a limited number of IRQ lines.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?

Disable file caching and flushing

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs.

Don should use thin provisioning.

A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.

False

The Windows 10 Education edition supports Hyper-V but not nested virtualization.

False

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.

Get-HotFix

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup.

HKEY_CLASSES_ROOT

AMD-V

Hardware-assisted virtualization support available in some AMD processors.

Intel VT

Hardware-assisted virtualization support available in some Intel processors.

Rafiq uses Windows 10 Professional. He has enrolled in a Windows Server course. How can he practice the lab exercises on his system?

He can go practice them on a Virtual Machine or find a website that'll let him practice it (like MindTap)

What are the interrupt request (IRQ) line and Input/Output (I/O) address resources on a computer used for?

IRQ: channel for communication on the processor I/O: An area of memory dedicated for the transfer of information to and from a hardware device

When using the Best Practices Analyzer (BPA) to verify server roles, what are the three levels of severity for problems?

Information: a recommended change Warning: The role complies under current operating conditions, but this may change if the operating conditions change Error: role can't fulfill its purpose and problems can be expected

Which of the following statements is true of a client on a computer network?

It is a computer that requests for resources from another computer on the network.

Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true?

Janice has enabled nested virtualization on the Windows 10 operating system.

What is the difference between multitasking and multithreading?

Multitasking is the ability to run two or more programs at once while multithreading is the ability of programs being able to run a lot of program code blocks at once. The main difference is that one is the computer code doing multiple things at once, but they're sometimes harder to notice while the other is the computer doing things that you can see it doing.

Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions.

Nadira powered off VM1, ran a PowerShell command, and powered on VM1.

What are the components of the WMI infrastructure?

Namespaces: represent/organize different WMI data Providers: identify specific areas of the system Classes: individual types of data

Explain the nested virtualization feature of Hyper-V.

Nested Virtualization is where you run a virtual machine inside of another virtual machine. In Hyper-V this would implement a more complex virtualization structure that suits your needs and it'll also be good for learning and testing things without harm to your computer.

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PnP)

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be.

Run these web apps in containers

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this?

SERVERX is the domain controller for the Active Directory.

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails.

Tamara's computer has 30 GB free hard disk space.

Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first?

Test-NetConnection

After you begin the installation process, how do you ensure that you install the full Windows Server and not just the Server Core?

That you don't use the Windows Server Configuration Wizard on it (that's how you install the server core).

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent.

The blackout took down the Internet, so Rhonda can't reach the email server.

windows containers

The components that allow Docker to provide containers on the Windows Server 2019 operating system.

kernel

The core component of an operating system that executes processes on the computer hardware.

host operating system

The operating system used to host a Type 2 hypervisor.

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file?

The paging file is disabled on the computer.

single-sign-on

The process whereby users authenticate once to a domain controller to prove their identity to other computers within the same domain.

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

The responding computer

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns.

The server will be dedicated to web services and accessed via the Internet.

hypervisor

The software component that provides for virtualization.

cloud

The worldwide collection of publicly accessible servers on the Internet.

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host.

What is the advantage of using Hyper-V containers?

They provide additional performance and security to apps in your Windows Server that run in containers

What is the use of loop constructs within PowerShell scripts?

To do a task constantly until a specific goal is met.

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?

To send the output from Get-Command to More, which displays the output page-by-page

Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.

True

Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.

True

The System File Checker is useful in recovering system files that have been corrupted because of a hardware power problem or power failure.

Trye

networks

Two or more computers joined together via network media and able to exchange information.

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer.

Virtualization

What is the term for programs and system software that can query WMI?

WMI consumers

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system.

Windows 10 has Windows subsystem for Linux

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties.

Windows Powershell

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?

Windows admin center

server

a computer on a network that shares resources to other computers

blade servers

a server that can be housed within a single rackmount server.

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system?

bypass

Type 1 hypervisor

hypervisor that runs directly on computer hardware.

on-premises server

server located in an organization

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure.

2

Unified Extensible Firmware Interface (UEFI)

A BIOS standard that is used on modern computers.

remote differential compression (RDC)

A DFS replication feature that only replicates changes made to files.

Shielded Virtual Machines

A Hyper-V feature that allows virtual machine hard disk files to be encrypted.

protected network

A Hyper-V feature that automatically moves a virtual machine that is part of a cluster to another computer within the cluster in the event of an underlying system failure.

shielding

A Hyper-V feature that encrypts the contents of a virtual hard disk file.

File System Freeze (fsfreeze)

A Linux service that is used to back up open files.

PowerShell providers

A PowerShell plug-in that can be used to manage a particular area of the system or Windows PowerShell.

PowerShell profile script

A PowerShell script that is automatically executed when you open Windows PowerShell.

WQL (WMI Query Language)

A SQL database-like format that you can use within Windows PowerShell to access WMI.

broadcast

A TCP/IP communication destined for all computers on a network.

kerberos

A UNIX authentication protocol. Also, the protocol used by computers within an Active Directory domain.

Network File System (NFS)

A UNIX file sharing protocol.

line printer daemon

A UNIX protocol that is used to print documents to a print server.

install image

A WIM image that contains the files that comprise an operating system.

WMI providers

A WMI component that provides a set of WMI classes that identify specific areas of the system.

WMI namespaces

A WMI component that provides a type of access to the system.

Windows Admin Center

A Web-based graphical management tool available for Windows Server.

Print Management

A Windows Server 2019 tool that can be used to manage and monitor print servers within an organization.

Storage Spaces Direct

A Windows Server feature that allows the combined storage within a cluster to be made available as a single volume to users on the network.

storage spaces

A Windows Server feature that allows you to create and manage volumes from multiple storage devices

Storage Migration Service

A Windows Server feature that allows you to move data between servers and the cloud.

storage replicas

A Windows Server feature that allows you to replicate data between different Windows Server systems.

windows deployment services

A Windows Server role that can be used to install operating systems on computers that boot from the network.

Data Execution Prevention (DEP)

A Windows component that monitors memory usage and prevents malicious programs from accessing other programs on the system.

desired state configuration

A Windows feature that allows you to configure computers based on a template.

flushing

A Windows feature that removes file caching information from memory after the information has been written to a physical storage device.

file caching

A Windows feature that uses memory to speed the transfer of information to and from physical storage devices.

security log

A Windows log file that stores auditing events.

processor scheduling

A Windows performance setting that specifies how processor resources are allocated to programs.

Volume Shadow Copy Service (VSS)

A Windows service that is used to back up open files.

pages

A block of information that is written to memory.

boot image

A bootable WIM image that contains a Windows installation program.

capture image

A bootable WIM image that contains a modified installation program designed to create a WIM installation image from an installed operating system.

windows registry

A central database that stores most hardware and software settings on a Windows system.

interrupt request line

A channel of communication used between a hardware device and a processor.

metacharacters

A character that has special meaning within PowerShell.

escape characters

A character that represents a text separator, such as a newline or tab.

standard checkpoint

A checkpoint provided by Hyper-V that additionally captures the running state of programs.

production checkpoint

A checkpoint provided by a backup service within a guest operating system

production checkpoints

A checkpoint provided by a backup service within a guest operating system.

cmdlets

A command within Windows PowerShell.

shell

A command-line interface.

docker

A common software that allows operating systems to host containers.

Internet Service Provider (ISP)

A company that provides Internet access.

logical processes

A component (or core) within a physical processor that acts as a standalone processor.

group policy

A component of Active Directory that provides centralized management of Windows computers within a domain.

active directory certificate services

A component of Active Directory that provides centralized management of encryption certificates within a domain.

Windows Subsystem for Linux (WSL)

A component of Windows 10 and Windows Server 2019 that allows you to run Linux applications on the Windows kernel.

entry

A component of the Windows Registry that stores hardware, software, or user settings.

client

A computer on the network that requests resources or services from another computer on a network.

print client

A computer that prints to a shared printer.

print clients

A computer that prints to a shared printer.

print server

A computer that shares one or more printers

printer pool

A configuration that consists of a printer that prints to more than one print device of the same model.

Hyper-V container

A container that is provided a separate copy of the Windows Server 2019 kernel via components provided by Hyper-V.

Keyboard-Video-Mouse (KVM) Switch

A device often used on server racks that allows a single keyboard, mouse, and monitor to be shared by all of the rackmount servers.

switch

A device that allows computers to communicate on a wired network.

Wireless Access Point (WAP)

A device that allows wireless devices to communicate on a wireless network.

uninteruptible power supply (UPS)

A device that contains battery storage and is used to supply power to computers in the event of a power outage.

print job

A document that has been formatted to the specifications of a print device.

What is a domain, and how does it affect computers and users that are members of the domain?

A domain is a grouping of computers that authenticate to a central database of users stored on special servers. With it you can protect computers and the network because it only gives people access to things they're allowed to have access to.

live migration

A feature of Hyper-V that allows you to move a running virtual machine from one Hyper-V host to another.

Nested Virtualization

A feature of Hyper-V that allows you to run virtual machines within other virtual machines.

multicast

A feature of IP that allows data to be transmitted to a group of destination computers simultaneously.

command chaining

A feature of MS-DOS and Windows PowerShell that allows you to run multiple commands on the same command line, one after another.

output redirection

A feature of MS-DOS and Windows PowerShell that allows you to save the output of a command to a file.

Encrypting File System (EFS)

A feature of NTFS that allows for the encryption of individual files and folders.

checkpoints

A feature of many hypervisors that allows you to restore a virtual machine to a previous point in time.

snapshots

A feature of many hypervisors that allows you to restore a virtual machine to a previous point in time.

IPsec task off-loading

A feature of network interfaces that allows IPsec calculation to be performed by the physical network interface instead of the operating system.

port mirroring

A feature of physical and virtual switches that sends a copy of all network traffic to a specific network interface for inspection.

internet explorer enhanced security configuration

A feature on Windows Server that prevents the Internet Explorer Web browser from connecting to websites that are not within its trusted sites list.

storage tiers

A feature that allows an operating system to store more frequently accessed data on faster storage devices within a volume that spans multiple storage devices.

branch office direct printing

A feature that allows print servers to redirect print job requests from print clients within a remote office directly to a network-attached print device within the remote office.

azure backup

A feature that allows you to back up on-premises data to Microsoft's Azure cloud.

azure update managment

A feature that allows you to manage Windows updates from Microsoft's Azure cloud.

azure site recovery

A feature that allows you to provide services within Microsoft's Azure cloud in the event of an on-premises server failure.

storage pinning

A feature that allows you to specify the physical location of different types of data within a volume that spans multiple storage devices.

Automatic Private IP Addressing (APIPA)

A feature that automatically configures a network interface using an IPv4 address on the 169.254.0.0 network, or an IPv6 address on the FE80 network.

DHCP Guard

A feature that prevents a virtual machine from accepting IP configuration from an unknown DHCP server on the network.

router guard

A feature that prevents a virtual machine from accepting route information from an unknown router on the network.

file screens

A feature that prevents users from storing files of certain types within a folder on an NTFS filesystem.

file group

A file category that is used by file screens.

paging file

A file on a Windows system that provides virtual memory.

active screening

A file screen configuration that is strictly enforced.

passive screening

A file screen configuration that provides warnings only.

powershell console file

A file that can be used to store customizations for a Windows PowerShell session, such as background color and font size.

named pipe

A file that represents a persistent connection to a process

iso image file

A file that stores a virtual filesystem that can be written to a removable media device such as a DVD or USB flash drive.

windows imaging format

A file-based image format that contains the installation files used to install a Windows operating system.

journaling

A filesystem feature that allows for quick file recovery following a power failure.

Data Deduplication

A filesystem feature that ensures that duplicate files are only stored once on the physical storage device.

DFS staging folder

A folder that stores files and file changes that are replicated to other systems using DFS.

Component Object Model (COM)

A framework that allows Windows apps to communication with each other and the operating system.

burnaware

A free software program that can be used to write the contents of an ISO image to a DVD.

rufus

A free software program that can be used to write the contents of an ISO image to a bootable USB flash drive.

methods

A function that can be performed on an object within Windows PowerShell.

registry editor

A graphical MMC tool that can be used to edit the Windows Registry.

file explorer

A graphical file browsing tool within Windows.

windows explorer

A graphical file browsing tool within Windows.

event viewer

A graphical log viewer tool within Windows operating systems.

Microsoft Management Console (MMC)

A graphical management console that provides a series of snap-ins that can be used to manage components of Windows.

server manager

A graphical management tool included within Windows Server.

Windows Presentation Foundation

A graphical subsystem that Windows applications can use to provide a user interface.

group policy management editor

A graphical tool that can be used to configure the settings within a Group Policy object.

Windows PowerShell Integrated Scripting Environment (ISE)

A graphical tool that can be used to create and test PowerShell scripts.

hyper-v manager

A graphical tool that can be used to install, manage, and interact with Hyper-V virtual machines.

group policy management

A graphical tool that can be used to manage Group Policy

windows system image manager

A graphical utility that can be used to create an unattended answer file.

services tool

A graphical utility that can start, stop, restart, and configure services on a Windows system.

DFS replication group

A group of servers that synchronize the file contents within a folder

Trusted Platform Module (TPM)

A hardware component within a computer BIOS that contains encryption keys and related information.

Second-Level Address Translation (SLAT)

A hardware-assisted virtualization technology available in modern processors that coordinates the use of memory between virtual machines and physical memory.

Domain Name Space (DNS)

A hierarchical namespace used for host names

fully qualified domain name (FQDN)

A host name that follows DNS naming convention.

Type 2 hypervisor

A hypervisor that runs as a program within an operating system.

Boot Protocol (BOOTP)

A legacy protocol that is used to automatically obtain IP configuration from a server on the network.

user datagram protocol / Internet protocol

A less-reliable, but faster version of the TCP/IP protocol.

client access license (CAL)

A license for a network connection to a server.

Multiple Activation Key (MAK)

A license key that can be activated on the Internet for a set number of Windows computers.

Generic Volume License Key (GVLK)

A license key that is purchased for use within an organization and often embedded into the installation media.

comment

A line within a PowerShell script that is not executed, but instead used to document the purpose or key features of PowerShell script contents.

targets

A link to another shared folder on the network.

system access control list (SACL)

A list of groups and users that are audited when they use certain permissions to access a resource.

Discretionary Access Control list (DACL)

A list of groups and users that have been assigned permissions to a resource, such as a folder or file.

workgroup

A logical grouping of computers on a network that implement peer-to-peer networking.

domain

A logical grouping of computers on a network that provides centralized management and single sign-on.

key

A major section within the Windows Registry. For example, HKEY_LOCAL_ MACHINE.

windows server configuration wizard

A management tool included within Server Core that can be used to manage server settings.

encryption algorithm

A mathematical procedure for encrypting data.

small footprint

A minimal operating system installation.

privileged mode

A mode that is given the highest priority on a system.

windows search service

A modern file indexing service that can be installed on Windows systems.

BranchCache

A modern replacement for offline file caching that provides additional features and performance.

computer name

A name that you specify on a Windows computer that is used to generate the computer's host name and NetBIOS name.

peer-to-peer networking

A network design in which each computer manages access to its own resources independently.

LANs

A network in which the computers are all in close physical proximity.

proxy servers

A network server that accepts Internet requests from other computers on the same LAN and obtains the desired resource on their behalf.

demilitarized zone

A network that uses network-based firewalls to protect access to the servers that are contained within.

perimeter network

A network that uses network-based firewalls to protect access to the servers that are contained within.

Resilient File System (ReFS)

A new file system used on Windows Server systems that has additional reliability features and support for Storage Spaces.

classless inter-domain routing notation

A notation that is often used to represent an IP address and its subnet mask.

type cast

A notation that is used to indicate the type of data that should be stored within a variable or constant.

group ID (GID)

A number assigned to a UNIX group account.

User ID (UID)

A number assigned to a UNIX user account.

exit status

A number that is returned by a command that indicates whether it executed successfully or not.

packets

A package of data formatted by a network protocol.

Windows Assessment and Deployment Kit (ADK)

A package of utilities that can be used to aid in the deployment of Windows systems.

web services discovery

A packet that is used by WSD-enabled printers to advertise printer availability and status information.

smart paging file

A paging file that is used by a virtual machine should available memory become exhausted.

subkey

A part of the Windows Registry that exists within a key

shared folder permission

A permission that grants or denies a connection to a shared folder.

print device

A physical device that prints a print job onto paper.

Pass-through disk

A physical hard disk or SSD that is used exclusively by a virtual machine for storage.

line printer request

A port type that is used when printing to a shared printer using LPD.

virtual LANs

A portion of a switch that is treated as an independent switch. Each VLAN on a switch has a unique VLAN number to identify it.

XML Paper Specification (XPS)

A print API and associated document format that is supported by modern Windows systems and print devices.

Graphics Device Interface (GDI)

A print API that is supported by legacy and modern Windows systems.

shared printer

A printer that is shared to other systems on the network.

bidirectional printing

A printing feature that allows print devices to communicate status information to print servers and print clients in addition to receiving print jobs.

protected process

A process that is isolated from other processes on a system.

clustering

A process whereby several different servers can respond to client requests as a single entity.

physical processor

A processor that is represented by a single piece of hardware.

attributes

A property of an object within Windows PowerShell.

Dynamic Host Configuration Protocol (DHCP)

A protocol that is used to automatically obtain IP configuration from a server on the network.

internet printing protocol

A protocol that is used to print documents to a print server using HTTP or HTTPS.

internet control message protocol version 6

A protocol used by computers to obtain an IPv6 configuration from a router on the network

HP JetDirect

A protocol used for printing to network-attached printers using TCP.

Internet Control Message Protocol (ICMP)

A protocol used on the Internet to provide error messages and network-related information.

teredo

A protocol used to encapsulate IPv6 packets within an IPv4 network.

key

A random string of bits that can be used alongside an encryption algorithm.

ip version 6

A recent version of IP that is used by some hosts on the Internet. It uses a 128-bit addressing scheme.

active directory based activation role

A role that can be installed on a domain controller to provide automatic activation for computers that are joined to the same Active Directory domain

subnet mask

A series of four 8-bit numbers that determine the network and host portions of an IP address.

internet protocol address

A series of four 8-bit numbers that represent a computer on a network.

audit policy

A series of settings within a Group Policy that can be used to configure auditing.

File Server Resource Manager (FSRM)

A server role and associated graphical tool that can be used to implement additional features on a Windows file server, such as folder quotas and file screens.

windows server azure network adapter

A service that allows you to integrate on-premises servers with servers and services hosted within Microsoft's Azure cloud.

key management services

A service that runs on a Windows Server computer that allows for activation of other computers on an organization's network.

power plans

A set of power settings that you can choose to use for a Windows system.

protocol

A set of rules of communication used between computers on a network.

Kubernetes

A set of software components that can be used to centrally manage containers within a cloud or on-premises environment.

Windows Management Instrumentation (WMI)

A set of specifications and frameworks that can be used to view and manage Windows operating system settings.

attributes

A setting within a folder or file that provides a particular filesystem feature.

DFS namespace

A shared folder that contains links to other shared folders on the network.

Windows PowerShell

A shell included within Windows operating systems that has scripting features and can be used to perform system management.

alias

A shortcut to a cmdlet within Windows PowerShell.

aliases

A shortcut to a cmdlet within Windows PowerShell.

functions

A shortcut to a series of commands within Windows PowerShell.

threads

A single unit of execution within a process.

octets

A single, 8-bit section of an IPv4 address.

server core

A small footprint Windows Server installation option that does not provide a graphical desktop.

nano server

A small footprint Windows Server installation option that provides a bare minimum set of services for running Web apps and a small number of server services.

variables

A small location in memory that stores a piece of information used by a program, such as Windows PowerShell.

print driver

A software component that allows the Print Spooler service to format and render jobs for a particular print device model.

virtual switch

A software component that allows virtual machines to communicate on a virtual network.

print processor

A software component within Windows that provides for the formatting of documents within a spool folder.

print processors

A software component within Windows that provides for the formatting of documents within a spool folder.

N-tier

A software design in which clients must pass through several different systems or applications before obtaining access to data.

Application Programming Interface (API)

A software interface that allows applications to access functions provided by an operating system.

virtual processors

A software-defined logical processor within a virtual machine.

editions

A specific version of Windows Server that contains a unique set of features designed for a particular environment.

Portable Document Format (PDF)

A standard file format for text and graphical images that can be read by most software applications.

post script

A standard printing and imaging technology that uses PDL to describe the appearance of a printed page.

decision constructs

A statement that can be used to modify how commands are processed within a PowerShell script.

loop construct

A statement that can be used to repetitively process commands within a PowerShell script.

Storage Area Network (SAN)

A storage array that is accessed by one or more servers on a server rack.

Solid State Drive (SSD)

A storage device that is comprised of non-volatile memory chips.

folder quotas

A storage limit that applies to a folder on an NTFS filesystem.

user quotas

A storage limit that applies to a user or group on an NTFS filesystem.

What is a subnet mask in the context of IPv4? Explain with an example.

A subnet mask tells you which part of your IP address is the Network ID and which part is the Host ID. For example with a subnet mask of 255.255.0.0 and an IP address of 192.168.090.156 the subnet mask can tell us that the Network ID is 192.168 and the Host ID is 090.156. In other words the first half of the subnet mask is the Network ID and the last half is the Host ID.

containers

A subset of an operating system that provides a unique service on the network.

Preboot Execution Environment (PXE)

A technology that allows a network interface to boot an operating system or operating system installation program from a server on the network.

single-root I/O virtualization (SR-IOV)

A technology that allows a network interface to provide a separate communication channel for each virtual machine that uses it.

Network Adress Translation (NAT)

A technology that allows a router to obtain Internet resources on behalf of computers on the network.

NIC teaming

A technology that allows multiple network interfaces to function as a single unit for load balancing and fault tolerance.

Plug and Play (PnP)

A technology that allows new hardware devices to be configured automatically for use within an operating system.

web services for devices

A technology that is used by some networkattached print devices to allow print clients and print servers to easily locate the print device on the network.

virtual machine queue

A technology that optimizes traffic sent between a virtual machine and a hypervisor.

Non-Uniform Memory Access (NUMA)

A technology used on multi-processor systems that allows memory to be shared between processors directly for greater performance and scalability.

rights

A term that refers to a privilege that grants access to the Windows operating system.

Quality of Service (QoS)

A term that refers to any technology that manages or limits the flow of data.

Software Defined Networking (SDN)

A term that refers to the software components and frameworks that provides network functionality for virtual machines and containers.

Internet of Things

A term that refers to the worldwide collection of small Internet-connected devices.

PowerShell script

A text file with a .ps1 extension that contains PowerShell cmdlets and control structures for later execution.

rackmount servers

A thin form factor used to house server hardware that is installed in a server rack.

best practices analyzer

A tool built into Server Manager that scans a server or role for configuration that does not follow Microsoft best practices

Virtual Desktop Infrastructure (VDI)

A tool built into Server Manager that scans a server or role for configuration that does not follow Microsoft best practices.

system file checker

A tool that can be used to detect damaged, overwritten, or unsigned Windows files and replace them with the proper version.

File Signature Verification tool (Sigverif)

A tool that can be used to search for unsigned system and device driver files.

ADSI edit

A tool that can be used to view objects and attributes within the Active Directory database.

devices and printers utility

A tool within the Windows Control Panel that allows you to add and manage hardware devices and printers.

Device Manager Utility

A tool within the Windows Control Panel that allows you to manage all hardware device settings on a Windows system.

WMI classes

A type of data referenced by WMI.

Asymetric Encryption

A type of encryption that uses two keys. One key is used to encrypt data, while the other key is used to decrypt data.

symmetric encryption

A type of encryption where a single key is responsible for both encrypting and decrypting data.

preemptive multitasking

A type of multitasking in which each process is isolated from the other processes on the system.

Media Access Control (MAC) address

A unique 48-bit hexadecimal number that manufacturers add to each physical network interface they manufacture.

NetBIOS Name

A unique name for a Windows computer that is broadcast to other computers on the LAN.

local user account

A user account that is stored within the SAM database on a Windows system.

recovery agent

A user or group that can be used to access EFS-encrypted files.

system preparation tool

A utility that can be used to remove unique information from an operating system prior to duplication.

array variable

A variable that contains multiple, distinct values.

constants

A variable whose value cannot be changed after creation.

differencing disk

A virtual hard disk file that references another virtual hard disk file that contains an operating system. Any changes made to a virtual machine that uses a differencing disk are stored within the differencing disk only.

virtual machine template

A virtual machine that is copied to create additional virtual machines.

device naming

A virtual network interface feature that allows the underlying physical network adapter name to be shown within the virtual machine.

guest operating system

A virtual operating system that is run on a hypervisor.

virtual machines

A virtual operating system that is run on a hypervisor.

internal virtual switch

A virtual switch that allows virtual machines to communicate amongst themselves and the host operating system.

private virtual switch

A virtual switch that allows virtual machines to communicate amongst themselves.

external virtual switch

A virtual switch that allows virtual machines to communicate with the underlying physical wired or wireless network.

windows server catalog

A website that lists hardware devices that are supported by Windows operating systems.

Azure Active Directory

Active Directory services provided by Microsoft's Azure cloud.

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp."

Add KettleApp as a keyword in the folder's properties.

loopback IP address

An IP address that refers to the local computer only.

access-based enumeration (ABE)

An SMB feature that only displays shared folders that users have Read share and NTFS/ReFS permission to.

offline file caching

An SMB shared folder feature that allows users to download copies of files and programs to a cache on their local computer for reliable modification.

unattended answer file

An XML-formatted text file that contains default selections to be used during a Windows installation.

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so.

input/output address

An area of memory dedicated for the transfer of information to and from a hardware device.

virtual memory

An area of physical storage that is used to store information normally found in physical memory.

public key

An asymmetric encryption key that can be used by other users, software, or computers on the network. It is often used to encrypt data.

private key

An asymmetric encryption key that is not shared to other entities. It is often used to decrypt data that was encrypted using the matching public key.

Credential Security Support Provider (CredSSP)

An authentication protocol used by applications that relays local user credentials to a remote system.

self-signed certificate

An encryption certificate that is digitally signed by the computer that created it, instead of a trusted third-party Certification Authority.

certification authority

An entity that issues public key certificates to users and computers.

security principa

An entity, such as a group or user, that can be listed within a DACL or SACL.

hyprid cloud

An environment that integrates services that run on-premises to services within the cloud.

Universal PnP (UPnP)

An extension of PnP that can be used to automatically configure hardware, services, and network protocols.

appsocket

An improved version of the HP JetDirect protocol used for printing to network-attached printers using TCP.

object

An item representation within Windows PowerShell.

advanced threat protection

An optional component of Microsoft Defender that can be used to provide cloud-based inspection for malware and network traffic.

separator page

An optional first page of a print job that provides the name of the document and the user that submitted the print job.

Server Core App Compatibility Feature on Demand (FOD)

An optional package that can be installed on Server Core to provide additional frameworks required for certain applications.

Which of the following organizations should consider using Azure Active Directory?

An organization that subscribes to Office 365 services

index

An organized list of files and folders on a system.

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access.

Another group has the Deny box checked for Read access.

After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option.

Any computers that were not stolen will need to rejoin the domain.

What are the two Windows Imaging Format (WIM) files used in Windows Deployment Services?

Boot.wim: has a bootable installation program Install.wim: has the OS files that are copied to the hard disk or SSD during the installation process

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory.

Deion intends to use this virtual machine in a nested virtualization configuration.

Describe the three main container objects within an Active Directory database.

Domains: Represents an active directory domain Organizational Units (OU): similar to a folder on a file system Sites: Represents a physical location within your organization

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs.

E:\VMs\Virtual Machines

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them.

Edit the Default Domain Policy object to enable auditing functionality

system environment variables

Environment variables that apply to all users on the system.

user environment variables

Environment variables that apply to the current user on the system.

Describe the three virtual switches that Hyper-V uses with virtual machines.

External: an underlying physical switch Internal: a virtual network where VMs and the host OS can connect Private: a virtual network where only VMs can connect

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder.

FAT32 on a Windows 7 system

If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

False

Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks.

Fareeda enabled shielding in the security settings for VM1.

Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine.

Freya changed the physical disk's settings to take it offline.

What purpose is served by the Out-of-Box Experience (OOBE) wizard during rapid server deployment?

Generates a new computer name and other unique identifiers including specifying regional options, accepting the Windows license agreement, and specifying a new administrator password

Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites.

He change the bridgehead server to one with a faster network interface.

Enoch is a system administrator who is configuring DFS replication. One of the replication groups has six servers. What topology should Enoch use and why?

Hub and Spoke because it's good for three or more people

Madison is configuring Live Migration within Hyper-V Manager for a server. The bandwidth on the server's network is limited. What configuration options would you advise Madison to use?

I'd suggest that she limit the number of simultaneous VM moves and use a separate IP network for the live migration traffic. Due to her low bandwidth

Unicast

IP communication that is destined for a single computer.

Explain the process of restoring a deleted user account object using the Active Directory Administrative Center.

If you have the recycling bin open do the following: Go to deleted objects folder under your domain object Select the deleted user account object Click restore

environment variable

Information that is stored in memory that is used by programs to locate settings and other information.

Which of the following statements regarding a domain functional level is accurate?

It applies to domain controllers, clients, and other servers that are present in the domain.

What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?

It can be used to create a new site object.

Why do large organizations use rapid server deployment?

It makes it a lot easier to install VMs on multiple computers, because with this you install it on one computer then it does it on others too.

What is the purpose of a Read-only Domain Controller?

It provides secure domain authentication

Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center.

It uses a minimal color interface that is similar to the one provided by Server Manager.

What are the optional network interface components available under Hardware Acceleration or Advanced Features when modifying the network adapter settings for a virtual machine?

It's device naming which allows the name of the underlying physical network adapter to be shown within the virtual network adapter.

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to "Encrypt data access." Is this the same as encrypting a file or folder?

Kind of it blocks access from SMB packets instead of a file or folder

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP

Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers.

Listed the network interface at the top of the boot order

Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it.

MSmark is a computer name and not Mark's user account name.

dynamic memory

Memory that is allocated as needed, and NOT contiguous (side-by-side), specifically during the implementation of a linked list style data structure, which also includes binary trees and graphs.

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources.

Minisha is a member of the Enterprise Admins group in both organizations.

Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.

Namespaces: gives a location from where users can access the different shared folders within their organization. Replication: can synchronizes different folder contents between different servers.

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up.

Natalie did not enable the archive attribute on the folder.

Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database.

On VM2

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline.

Petra.T will be allowed to log in to the system with cached credentials.

locally attached print devices

Print devices that are connected to the computer using a physical cable, such as parallel, serial, or USB.

network attached print devices

Print devices that have a network interface (e.g., Ethernet, Wi-Fi, Bluetooth) and accept print jobs from computers on the network.

locally attached printer

Printers that print to a locally attached print device.

network attached printers

Printers that print to a network-attached print device.

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied.

WMI consumers

Programs, such as Windows PowerShell, that can query WMI.

Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission.

Read and execute

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool.

Remove the computer name SERVERX

custom filters

Search filters that are available within the Print Management tool that can list printers and printer drivers that match predefined criteria.

You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2.

Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY.

She enabled replication on SERVERY.

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed.

She should create the Domain Naming Master role on DC1.

Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog.

She should create the Infrastructure Master role on DC1.

Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network.

Single-root I/O virtualization

Describe the two checkpoint mechanisms provided by Windows Server 2019.

Standard: Use Hyper-V to provide checkpoint functionality and save the state of running programs within the snapshots directory Production: Use the backup service provided by the guest operating system to perform checkpoint functionality but do not save the state of running programs

virtual machine bus

The Hyper-V component that provides communication between virtual and physical devices.

default gateway

The IP address of the router on the network used to send packets to remote networks.

Active Directory

The Microsoft components and software that are used to provide single sign-on and centralized management of computers on a network.

alias provider

The PowerShell provider that is used to manage aliases within Windows PowerShell.

certificate provider

The PowerShell provider that is used to manage encryption certificates within Windows.

environment provider

The PowerShell provider that is used to manage environment variables within Windows.

filesystem provider

The PowerShell provider that is used to manage filesystems on storage devices. It is the default PowerShell provider.

function provider

The PowerShell provider that is used to manage functions within Windows PowerShell.

registry provider

The PowerShell provider that is used to manage the HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER keys within the Windows Registry.

variable provider

The PowerShell provider that is used to manage variables within Windows PowerShell.

Internet Information Services (IIS)

The Web server software included in Windows Server.

internet printing client

The Windows feature that provides the ability to print to shared printers using IPP.

LPR port monitor

The Windows feature that provides the ability to print to shared printers using LPD

multitasking

The ability to run multiple processes simultaneously on a system.

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made.

The checkpoint file that is used to reverse the changes will be deleted from the system.

transport server

The component of WDS that responds to PXE requests and sends WIM image data to computers on the network.

WINrm

The component of Windows that allows remote management from other systems using Windows PowerShell.

WMI infrastructure

The components within Windows that provide WMI.

deployment server

The core component of WDS. It provides all WDS functionality that is not related to transporting packets across the network.

Common Internet File System (CIFS)

The default file sharing protocol used by Windows systems.

Server Message Block (SMB)

The default file sharing protocol used by Windows systems.

enhanced metafile

The default format that the GDI uses when storing documents within a spool folder.

What are the three ways in which a shared folder can be cached?

The default option allows users to right-click files and programs within the shared folder and select Make available offline to ensure that a copy is downloaded to a cache folder on their local computer. When the user disconnects from any shared folder any modified folders in the cache folder are then uploaded to the shared folder If two or more users attempt to cache the same file, they have the option of choosing whose version to use or of saving both versions.

client for NFS

The feature that allows a Windows system to connect to a shared folder using NFS.

Describe the two protocols that can be used by servers to authenticate live migration.

The first one is to move the virtual machine. This is where the VM configuration files and hard disk files would be moved to the destination server The other one is to move the virtual machine's storage. This is where you only move the hard disks to the destination server.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions.

print queue

The folder that stores documents and print jobs during the printing process.

spool folder

The folder that stores documents and print jobs during the printing process.

Page Description Language (PDL)

The format used by PostScript printers to describe the appearance of a printed page.

Printer Control Language (PCL)

The format used by most non-PostScript printers to describe the appearance of a printed page.

Universal Naming Convention (UNC)

The format used to specify the location of shared folders on Windows systems.

DFS management

The graphical management tool used to manage DFS on Windows Server systems.

windows deployment services tool

The graphical utility that is used to configure WDS.

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine.

The guest operating system on the virtual machine is a 32-bit version of Windows 7.

Out of Box Experience (OOBE)

The initial setup wizard that is run following a Windows installation.

certificate store

The location on a Windows system that stores encryption certificates.

gateway server mode

The mode that the Windows Admin Center functions within when installed on a Windows Server 2016 or 2019 system.

transfer control protocol / internet protocol

The most common network protocol used on the Internet. It provides for reliable communication.

ip version 4

The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes.

input/ouput operations per second

The number of storage requests sent to and from a storage device per second.

host ID

The portion of an IP address that denotes the host.

network ID

The portion of an IP address that denotes the network

driver signing

The process by which a device driver is digitally signed by a trusted third party, such as Microsoft.

ANDing

The process by which binary bits are compared to calculate the network and host IDs from an IP address and subnet mask.

Redundant Array of Independent Disks (RAID)

The process of combining the storage spaces of several hard disk drives into one larger, logical storage unit.

rendering

The process of converting a document within a spool folder into a format that a print device can understand.

publishing

The process of creating Active Directory objects that represent network resources, such as shared folders.

rapid server deployment

The process of installing one or more server operating systems within a short period of time.

MAC address spoofing

The process of modifying the MAC address on a physical or virtual network adapter.

authentication

The process of proving your identity to a computer (often with a user name and password).

tracing

The process of reading through an existing script to understand its contents.

sandboxing

The process of running separate Web apps within separate containers.

Virtualization

The process of running several separate operating systems concurrently on a single computer.

piping

The process of sending output from one command to another within Windows PowerShell using the pipe symbol on your keyboard ( | ).

Thin Provisioning

The process of using a virtual hard disk file that dynamically expands as needed up to a maximum size.

thick provisioning

The process of using a virtual hard disk file that has a fixed size.

Capacity Planning

The process used to determine hardware and software requirements based on the current and future needs of users within an organization.

queuing

The process whereby a print API stores a document within a spool folder.

spooling

The process whereby a print API stores a document within a spool folder.

failover

The process whereby a server within a cluster assumes the role of another server within the cluster that has failed.

Basic Input/Output System (BIOS)

The program stored on the hardware of a computer that is used to start an operating system after the computer is powered on.

Remote Desktop Protocol (RDP)

The protocol used by the Remote Desktop Connection app on Windows computers when accessing a graphical desktop on another Windows computer.

Hyper-V Extensible Virtual Switch

The protocol within network interface properties that allows the network interface to be shared by multiple virtual machines that are connected to the associated external virtual switch.

metadata

The section of a folder or file that stores permissions, attributes, and other information regarding the folder or file.

DFS replication

The server role that allows Windows Server systems to synchronize folder contents with other Windows Server systems on the network.

server for NFS

The server role that provides NFS file sharing capability within Windows Server.

DFS namespaces

The server role that provides the ability to create a DFS namespace on Windows Server systems.

print and document services

The server role within Windows Server 2019 that provides the Print Management tool as well as the IPP and LPD printer sharing protocols.

windows indexing service

The service on Windows systems that builds an index of files for fast searching.

print spooler

The service on Windows systems that provides nearly all print functionality.

printer

The software representation of a print device on a Windows system.

Microsoft Azure

The suite of cloud services that are provided by Microsoft.

attack surface

The sum total of all avenues that attackers can potentially use to obtain access to a system.

New Technology File System (NTFS)

The traditional file system used on Windows Server systems.

Explain the use of prestaging

The use of prestaging is that it eliminates the need to move the computer account after the account is made

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in.

The user's account has been locked because of frequent failed password attempts.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time.

The virtual machine will have a 127 GB dynamically expanding hard disk.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

What are the Windows Server 2019 default password requirements?

They must be 6 characters or longer Can't contain the account name or portions of the users real name You also have to follow a mininum of three of the following rules: Numbers Uppercase letters Lowercase letters Symbols like #$!

What is the System File Checker tool, and how does it work?

This is software on your computer that scans system files for integrity if it finds a file that's damaged or overwritten replaces it with the proper version.

What is the self-healing feature of NTFS, and how does it work?

This is when software encounters a damaged disk area and NTFS heals it without taking down the server. It heals it by generating a work thread that repairs data from the damaged area.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.

To allow Hyper-V to start the host operating system

Remote Server Administration Tools (RSAT)

Tools that you can download to a Windows 10 PC to allow for the remote administration of Windows Server systems on a network.

Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests.

Transport server

If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?

Universal Group Membership Caching

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management.

Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process.

VM templates

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage."

VM1's virtual hard disk files will be moved to the destination server.

Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane.

WDS service not yet configured

Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16.

When new domain controllers are added to this network, they will be added to NewYorkSite by default.

Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines.

Windows Deployment Services

Which of the following tools can be used to create an unattended answer file?

Windows System Image Manager

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks.

WindowsServer2019VMTemplate

What happens when you join a computer to an Active Directory domain?

You can share the resources in that domain with the other people in the domain after they're verified.

What are the necessary conditions and permissions required to raise domain or forest functional levels?

You must be logged in as a member of the domain members group in active directory to raise a domain functional level To raise a forest functional level you must be a member of the enterprise admins group

Rajesh has configured the WDS server with the appropriate boot and install images. He configures the client computers to enable them to boot via the network interface. He is prompted to begin installation on the client computers. The boot image is downloaded from the WDS server. What are the next steps that Rajesh must perform to complete the installation process?

add an install image

Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation.

checkpoints

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute.

cipher.exe

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive.

configure active screening

Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive.

configuring user quota

routers

device capable of transferring packets from one network to another.

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

distributed file system (DFS) replication

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.

false

Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.

false

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

false

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

false

You need multiple boot images on a WDS server, one for each operating system.

false

Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group.

full control

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization.

group policy

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

performance

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?

q

A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?

read

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​

the index attribute

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

the windows search service

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

true

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets.

true

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes.

write extended attributes


Set pelajaran terkait

Frankenstein Chapter 1-21 Final Test

View Set

(Mastering Biology) The Cell Cycle

View Set

APUSH Chapter 7: The Jefferson Era

View Set