exam 3 microsoft server

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the CIDR equivalent for 255.255.255.224?

/27

Which of the following options would you use with the ipconfig command to purge the DNS Resolver cache?

/flushdns

You are the network administrator for a large organization. You have a Windows 10 machine that needs to prevent any user from copying unencrypted files from the Windows 10 machine to any removable disk. How do you accomplish this task?

Within a Local Group Policy, set the BitLocker Drive Encryption.

Which of the following IP addresses are Class A addresses? Each correct answer represents a complete solution. Choose all that apply.

10.14.100.240 65.102.17.9

Which of the following addresses would you use with the PING command-line utility to test the loopback address of the local computer?

127.0.0.1

You are the network administrator for a small organization that has decided to switch the company's TCP/IP subnet mask. The organization has chosen to use 255.255.255.240. What is the increment for subnet ranges in a 240 subnet mask?

16

Which of the following represents the APIPA address range?

169.254.x.x

You are the network administrator for an organization with two sites, as shown in Figure A. You need to install a new Windows 10 machine into site 1. Which TCP/IP address can you assign to the new Windows 10 machine?

192.168.2.41

Your home computer network is protected by a firewall. You've configured your Windows 10 home computer to use Windows Mail. After you configure your email accounts, you discover that you are unable to send email messages from Windows Mail. Your email provider uses POP3 and SMTP. What port should you open on the firewall?

25

A subnet range of 16 is represented by which of the following subnet masks?

255.255.240.0

You are the network administrator for Stellacon. Your network consists of 200 Windows 10 computers, and you want to assign static IP addresses rather than use a DHCP server. You want to configure the computers to reside on the 192.168.10.0 network. What subnet mask should you use with this network address?

255.255.255.0

What is the total number of unique hosts per network available in a Class B network?

65,534

You are the network administrator for your organization. Your organization has deployed Azure RemoteApp collections by configuring a custom template image. This image is going to contain Microsoft Office 365 ProPlus. Your organization needs to guarantee that multiple employees can run Office 365 ProPlus from the image all at the same time. What do you need to include in your configuration file?

<Property Name="SharedComputerLicensing" Value = "1"/>

Which of the following is not a component of Active Directory?

AD ES

You are the administrator of a large company. You believe that your network's security has been compromised. You do not want hackers to be able to repeatedly attempt user logon with different passwords. What security policy will you configure to accomplish this?

Account Lockout Policy

Your network's security has been breached. You are trying to redefine security so that a user cannot repeatedly attempt user logon with different passwords. To accomplish this, which of the following items in the Local Security Policy box should you define?

Account Lockout Policy

Your network administrator has provided you with a new laptop with Windows 10 installed on it. You're using Internet Explorer. When typing search phrases into the Instant Search box, you discover that search results are being displayed only for Amazon.com. You want search phrases to search the Web, not just Amazon.com. What should you do?

Add additional web-based search providers in the IE's Manage Add-ons section.

You administer Windows 10 Enterprise desktop computers that are members of an Active Directory domain. You want to create an archived copy of user profiles that are stored on the desktops. You create a standard domain user account to run a backup task. What should you do to grant the backup task user account access to the user profiles?

Add the backup task account to the Backup Operators group on every computer.

By default, which of the following accounts is not prompted for confirmation when performing a task that requires privilege escalation?

Administrator

Who can manage mandatory profiles on Windows 10 computers?

Administrators

Which of the following is used to test the corporate applications for User Account Control (UAC) related issues? This

Application Compatibility Toolkit

You have a Windows 10 computer that is located in an unsecured area. You want to track usage of the computer by recording user logon and logoff events. To do this, which of the following auditing policies must be enabled?

Audit Account Logon Events

You are the Active Directory administrator for your company. A Windows 10 computer has been purchased for the Finance department, and you want to monitor it for unauthorized access. You configure the Audit Object Access policy to audit both success and failure events. However, when you look at the security event log a few days later, you do not see any entries related to file access. What is the most likely reason for this behavior?

Auditing has not been enabled for the appropriate files and folders.

Which of the following is a Microsoft's subscription-based Active Directory?

Azure

You are the network administrator for a large organization with many laptop users who go on the road. The organization would like to start moving away from users connecting by VPN to get data. It has decided to start moving the entire IT department to the cloud. Which of the following can the organization start using?

Azure Active Directory

______________ is an Apache Hadoop server located in the cloud.

Azure HDInsight

Which of the following services allows cloud-based applications to communicate with each other?

BizTalk

You are a help desk technician for your company. You're configuring Microsoft Edge, and you want to ensure that cookies stored on the computer are not accessible to any website. Which setting should you configure to accomplish your goal?

Block all cookies

Which of the following options can be used to resolve NetBIOS names to IP addresses? Each correct answer represents a complete solution. Choose all that apply.

Broadcast request WINS server

You are the network manager for a large organization. You've decided to implement Hyper-V and set up all servers as virtual machines. You want to see how much data each department is using for the Hyper-V virtual machines. How do you monitor virtual machine usage?

By using Hyper-V Resource Metering

A salesperson in your company purchases a new laptop with Windows 10 installed. She asks you to configure it for her. You create a standard local user account for her. Which of the following tasks can she perform by default?

Change time-zone settings

You are the network administrator for your company. Your service provider has assigned you the network address 192.168.154.0. You have been granted the entire range to use. What class of address have you been assigned?

Class C

You are the network administrator for a midsize company that uses Windows Server 2012 R2 and Windows 10. All Windows 10 machines receive their IP address from DHCP. You have a Windows 10 machine and need to identify its IPv6 address. How can you accomplish this task? (Choose all that apply.)

Click Details from the network connection status. Type ipconfig /all at the command prompt.

You are the network administrator for a large organization. You have deployed a software package to all of the Windows computers in your domain. You want to set up a GPO so that some employees have no access to the application. How do you accomplish this?

Configure AppLocker

You are a system administrator for a department that has Windows 10 Enterprise computers in a domain configuration. You deploy an application to all computers in the domain. You need to use a group policy to restrict certain groups from running the application. What should you do?

Configure AppLocker.

You're managing Windows 10 Enterprise computers that are members of an Active Directory domain. Recently, several domain user accounts have been configured with super-mandatory user profiles. A user reports that she has lost all her personal data after a computer restart. What should you do to configure the user's computer to prevent possible user data loss in the future?

Configure Folder Redirection by using the domain group policy.

You have a Windows 10 Enterprise computer at your workplace that is joined to an Active Directory domain. You log in with your domain account at your workplace and with your Microsoft account at your home. You need to access Windows 10 Enterprise apps from your work computer by using your Microsoft account. What will you do to ensure that you are able to achieve this by logging on only once?

Connect your Microsoft account to your domain account on your work computer.

You are hired by friends to set up a network in their home. They have four Windows 10 devices in their home that are all connected by a router. There is currently no network in place. They want to be able to share audio and video files among their family members. How can you set up the network? (Choose two.)

Create a HomeGroup. All audio and video files should be moved to the media library and accessible through HomeGroup.

You have a Windows 10 machine that multiple users access. All users have the rights to use USB removable devices, but you need to deny one user access to USB removable devices. How do you accomplish this?

Create a removable storage access policy through an LGPO.

You are the administrator for a large organization with multiple Windows Server 2012 R2 domain controllers and multiple domains. You have a Windows 10 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 10 computer can use except for the Sales group. How do you stop the Sales group from accessing this one application?

Create an executable rule from the Application Control Policy.

Which of the following options can be used to configure TCP/IP? Each correct answer represents a complete solution. Choose all that apply.

DHCP APIPA Static IP addressing

You are the network administrator for your organization. Your organization has started using App-V. You notice that laptop users are still able to access App-V applications even when they are not connected to the network. You want to stop this from happening. What do you do?

Disable the Disconnected Operation Mode.

You're running a Windows 10 professional machine. You need to install a copy of Windows 7 on the machine for testing of applications and training. What is the best way to accomplish the task?

Enable Hyper-V and create a Windows 7 virtual hard disk.

You are the administrator of a large organization. Your company has developed an application for your employees. You need to deploy the internally developed application to all employees while minimizing the costs. What's the best way to do that?

Enable application sideloading.

You are the system administrator for Stellacon Corp. You have a computer that is shared by many users. You want to ensure that when users press Ctrl+Alt+Del to log on, they do not see the name of the last user. What will you do to configure this?

Enable the Interactive logon: Do not display last user name policy.

Your company, Stormwind, requires that you implement security and you have been asked to define and implement a security policy. You have configured password policies so that users must change their passwords every month. Users are not allowed to use any of their previous 24 passwords. Which password policy would you implement if you want to prevent users from reusing passwords?

Enforce Password History

You are an IT consultant for mid-sized business. One of your clients wants to start using Virtual Smart Cards on its Windows 10 Enterprise laptops and tablets. You need to ensure that the client laptops and tablets support Virtual Smart Cards. What should you do?

Ensure that each laptop and tablet has a Trusted Platform Module (TPM) chip of version 1.2 or greater.

Which of the following Group Policy settings is not available for LGPO?

Folder redirection

You work for uCertify.com. Your company has 20 portable client computers that run Windows 10 Enterprise. The network connection on the client computers is depicted in the following table: None of the computers can discover other computers or devices, regardless of which connection they use. What should you do on the client computers to configure the connections so that the computers can discover other computers or devices only while connected to the NetWire or NetWiFi connections? Each correct answer represents a part of the solution. Choose three.

For the HotSpot connection, select No, don't turn on sharing or connect to devices. Change the NetWire connection to public. Turn on network discovery for the Public profile.

You work for uCertify.com. You manage Windows 10 Enterprise computers that are members of an Active Directory domain. Your company has a list of approved Windows Store apps that are allowed for download and installation. You've created a new AppLocker Packaged apps rule for this. You need to test the new AppLocker Packaged apps rule before you implement it for the entire company. What should you do?

From Group Policy, enforce the new AppLocker policy in Audit Only mode.

You are the system administrator for a large organization. You have a Windows 10 machine that all users can access. There is a folder on the Windows 10 machine called Apps. You need to set up auditing on this folder. How do you accomplish this task?

From the Local Group Policy, enable Audit Object Access.

You have a Windows 10 Enterprise computer named Machine1 that is a member of an Active Directory domain named ucertify.com. You have a line-of-business universal app named TestApp. TestApp is developed internally and you need to ensure that you can run TestApp on Machine1. The solution must meet the following requirements: Minimize costs to deploy the app. Minimize the attack surface on Machine1. What should you do?

From the Update & Security setting on Machine1, enable the Sideload apps setting.

Which of the following command-line utilities should you use to see what group policies have been applied to the Windows 10 computer and user's account?

GPResult.exe

Which tab of the user's Properties window contains the information including the full name and a description?

General

A database of all Active Directory objects in a forest with only a subset of the object attributes is known as:

Global Catalog.

You have recently hired John as an assistant for network administration. You have not decided how much responsibility you want John to have. In the meantime, you want John to be able to restore files on Windows 10 computers in your network, but you do not want John to be able to run the backups. What is the minimum assignment that will allow John to complete this task?

Grant John the Restore Files and Directories user right.

A built-in account that allows a user to access a computer even if the user does not have a unique username and password is known as:

Guest

__________ is a server virtualization tool that allows you to move physical machines to virtual machines and manage them on a few physical servers.

Hyper-V

Which built-in local group is used by Internet Information Services?

IIS_IUSRS

You are the network administrator for a large organization that uses Windows Server 2012 R2 and Windows 10. You have decided to set up a tunnel between two locations. You want to set the tunnel up so that it uses IPv6. What protocol can you use that allows for IPv4 and IPv6 on your network and to use IPv6 with the tunneling?

ISATAP

You are the network administrator for your organization. You are asked by your manager to modify the associations of a few file extensions that are associated with Internet Explorer. How can you accomplish this task?

In Control Panel, open Default Programs and then click Set Associations. Set the proper file extensions.

Your company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind's IT Manager, would like to test the AppLocker policy before implementing it. How can Jeff test the AppLocker policy?

In the Group Policy Manager, enforce the new AppLocker policy in Audit-Only mode.

A user cannot access a server in the domain. After troubleshooting, you determine that the user cannot access the server by name but can access the server by IP address. What is the most likely problem?

Incorrectly defined DNS server

You're configuring a new Windows 10 computer for a new employee. You configure the new user with a standard user account. Which of the following functions will the new employee be allowed to perform? Each correct answer represents a complete solution. Choose all that apply.

Install a printer. Configure WPA keys. Modify the desktop settings.

You have a Windows 10 system that is having issues connecting to other machines on the network. You want to see the TCP/IP details to make sure that the user is using DHCP and that the assigned IP address is accurate. What command-line utility and switch can you use to do this?

Ipconfig /all

Which of the following statements is true of the built-in administrator account in Windows 10?

It is disabled by default in Windows 10.

Which of the following specifies the order in which group policies are applied?

Local computer, site, domain, OU

You are setting up a machine for a home user who does not know much about computers. You do not want to make the user a local administrator, but you do want to give this user the right to change Windows Updates manually. How can you configure this?

Modify the LGPO for Windows Update to allow the user to make changes manually.

You are the network administrator for a midsize company that uses both desktops and laptops. All laptops use Windows 10 and have been connected to a wireless access point. You disable the SSID, and now your laptops can no longer connect to the access point. What do you need to do to allow the laptops to connect?

Modify the wireless network connection settings on the laptops.

Which of the following commands would you use to send a name release packet to the WINS server and then start a refresh?

NBTSTAT -RR

Which of the following key features of Hyper-V provides an array of device support as well as performance and security improvements?

New Architecture

Which of the following statements are true of the creation of a group in Windows 10? Each correct answer represents a complete solution. Choose all that apply.

Only members of the Administrators group can create users on a Windows 10 computer. Group names can contain spaces.

Which of the following statements are true of mandatory profiles? Each correct answer represents a complete solution. Choose all that apply.

Only members of the Administrators group can manage mandatory profiles. They can be used only with roaming profiles.

Which of the following tabs of the Internet Options window defines the level of access that third-party cookies have to the browser?

Privacy

You have a Windows 10 Enterprise computer named Comp1 that hosts a virtual machine named VM1 on a Hyper-V platform. VM1 runs Windows 10 Enterprise that connects to a private virtual network switch. What should you do to remotely execute Windows PowerShell cmdlets on VM1 from Comp1?

Run the Invoke-Command cmdlet and specify the -VMName parameter.

You are the network administrator for a large organization. You are in charge of implementing company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user's browsing session. How do you accomplish this?

Run the browsers in InPrivate sessions.

You are the network administrator for a large organization that has decided to use IPv6 and DHCP. You want to set up the network so that all Windows 10 systems using IPv6 get all of their information through DHCP including IP address and default gateway. How would you set up the network?

Set up a stateful network.

You are the network administrator for a large organization that needs to deploy an application to all employees. The application was built in-house and is not Windows Store signed. What will you use so that you can still load the application onto users' machines?

Sideloading

You are the network administrator for your company. Recently, one of your users in the Accounting department using Internet Explorer 11 has reported that they were unsure whether a banking website was legitimate or not. You want to configure a utility that will verify whether a website is known to be fraudulent. Which utility should you configure?

SmartScreen Filter

If you want that a user enters an administrator password to perform administrative tasks, what type of user account should you create for the user?

Standard user account

You are the network administrator for a small organization that has decided to implement Microsoft Active Directory. Your organization is worried because the budget does not allow them to purchase new hardware for the Active Directory installation. The server room has a UNIX server it uses for file and DNS access. What option can you tell them about that will allow the organization to have Active Directory?

Subscribe to Azure Active Directory.

You are the network administrator for a large organization. A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user has the rights to access the internal site due to the fact that all users and computers are part of a domain and the internal website uses Integrated Windows Authentication. How do you make sure that the user is automatically authenticated when they connect?

The Local sites URL should be added to the Local Intranet zone.

Which of the following is a rule for creating usernames in Windows 10?

The username can be no longer than 20 characters.

Which of the following is intended to prevent unintentional or unauthorized changes to a computer?

UAC

Which type of IPv4 address uniquely identifies a computer or device on a network? This

Unicast

You have set up a new wireless network for one of your clients. Your manager wants to ensure that only certain designated wireless laptops can connect to the new network to prevent misuse. What should you do meet his requirement?

Use MAC address control.

You are the network administrator for a large organization. You have installed Hyper-V on a server called ServerA, and you have set up four new VM servers. You want to run PowerShell commands for the VM servers from ServerA. How do you do this?

Use the Invoke-Command cmdlet and specify the VMName parameter.

You are the administrator of an organization who has decided to use Microsoft Azure Active Directory cloud-based services. You have set up a corporate subscription for Microsoft Office 365. Each employee gets a mailbox stored in Office 365 and also an email for the corporate network. After buying out another company, you need to add a third email address to each user. How can you do this?

Use the Set-Mailbox cmdlet from the Azure Active Directory Module for PowerShell.

Which of the following options can be configured through the Profile tab of a user's Properties window? Each correct answer represents a complete solution. Choose all that apply.

User profile path Logon script Home folder

You are the network administrator at uCertify.com. The computers on the company's network run Windows 10 Enterprise. All the computers on the network are members of an Active Directory domain. The company recently proposed a new security policy that prevents users from synchronizing applications settings, browsing history, favorites, and passwords from the computers with their Microsoft accounts. What should you do to enforce this security policy on the computers?

Using Group Policy Object, configure the Accounts: Block Microsoft accounts Group Policy setting to Users can't add or log on with Microsoft accounts.

You are the network administrator for a midsize company that uses both desktops and laptops. All laptops use Windows 10 and have been connected to a wireless access point that is configured to use Advanced Encryption Standard (AES) security. There is no preshared password key being used. You need to connect a new Windows 10 laptop to the access point. How would you set up the security setting on the laptop?

WPA2-Enterprise

You're configuring a Windows 10 computer that is going to be used by your children. You've configured access restrictions using the Parental Controls feature of Windows 10. Which of the following can be configured by setting Parental Controls?

When your children can access the computer Which websites your children can view Which programs your children can access

In which editions of Windows 10 can you enable UAC? (Choose all that apply.)

Windows 10 Home edition Windows 10 Education edition Windows 10 Professional edition Windows 10 Enterprise edition

You are the network administrator for a small organization. Your organization has implemented Windows 10 on all client machines. You want to implement another line of security on the Windows 10 machines so unauthorized users or malicious software can't access them. What should you implement?

Windows Firewall

You are the administrator for a large training company. You have decided that everyone needs to configure the Password Must Meet Complexity Requirements policy. Users are not sure what they can use. You decide to send an email out showing people examples of what types of passwords they can use. Which of the following passwords meet the minimum complexity requirements? (Choose all that apply.)

aBcdEfG1! 123456789nA

Your company has 80 client computers that run Windows 10 Enterprise. A new company policy requires that all client computers have static IPv6 addresses. Which netsh command should you run to assign static IPv6 addresses to the client computers? This

add address

You are the network administrator for a Fortune 500 company. The Accounting department has recently purchased a custom application for running financial models. To run properly, the application requires that you make some changes to the computer policy. You decide to deploy the changes through a Local Group Policy setting. You suspect that the policy is not being applied properly because of a conflict somewhere with another Local Group Policy setting. What command should you run to see a list of how the group policies have been applied to the computer and the user?

gpresult

Which of the following is not a TCP/IP management and diagnostic command?

icacls

You have a DNS server that contains corrupt information. You fix the problem with the DNS server, but one of your users is complaining that he is still unable to access Internet resources. You verify that everything works on another computer on the same subnet. Which command can you use to fix the problem?

ipconfig /flushdns

You have two DHCP servers on your network. Your computer accidentally received the wrong IP and DNS server configuration from a DHCP server that was misconfigured. The DHCP server with the incorrect configuration has been disabled. What commands could you use to troubleshoot your computer's DHCP configuration? Each correct answer represents a part of the solution. Choose two.

ipconfig /release ipconfig /renew


Set pelajaran terkait

Test 1 Review - Chapter 17 Investments

View Set

human development final textbook quiz questions

View Set

premise/conclusion ; definitions

View Set

International Economic Concepts of Trade and Globalization

View Set

sociology race and ethnicity quiz 2

View Set

Social Implications_ Impact of computers on the society

View Set

Chapter 32 Obstetrics and Neonatal Care

View Set

FTCE Practice Test Family and Consumer Science

View Set