Final NetAdmin Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What chkdisk flag allows chkdsk to go directly to a corrupted spot identified by the Spot Verifier service? /spotfix /resume /corrupted /fixbad

/spotfix

You are configuring a RAID-5 array with five disks, each disk is 3TB in size. What will be the total usable size of the RAID-5 volume? 3 TB 6 TB 12 TB 15 TB

12 TB

What is the IP address that is assigned to the network loopback interface? 224.0.0.255 192.168.1.1 1.1.1.1 127.0.0.1

127.0.0.1

Without the aid of APICs or special Intel features, what is the maximum number of IRQ lines available to a system? 8 21 15 32

15

What is the minimum amount of RAM required in order to support Windows Server 2016 with a GUI desktop? 2 GB 512 MB 4 GB 1 GB

2 GB

The Class A network is defined by what subnet mask? 255.0.0.0 255.255.255.0 255.255.255.255 255.255.0.0

255.0.0.0

What symbol cannot be used in an account name in Windows Server 2016? ! - : _

:

What is needed for an SNMP management system to be able to poll and receive data from an SNMP agent? A community name An allowed entry in an SNMP ACL. The SNMP Agent's SNMP ID. A valid username and password

A community name

What statement regarding DNS implementation is accurate? A centralized organization will likely have more domains than a decentralized organization. DNS servers should not be placed across site links DNS servers should be placed in public networks for Active Directory domain use. A domain should ideally have two or more DNS servers to take advantage of load balancing and multimaster relationships, as well as fault tolerance.

A domain should ideally have two or more DNS servers to take advantage of load balancing and multimaster relationships, as well as fault tolerance.

What statement regarding the use of print job priorities is accurate? Print jobs are assigned a priority of 99 by default. A print job with a priority of 1 is considered a high priority job. A print job with a priority of 99 is considered a high priority job. Print jobs are assigned a priority of 50 by default.

A print job with a priority of 99 is considered a high priority job

What is an ideal scenario for the installation and use of Windows Server Core or Nano Server? A server within an organization will be dedicated to web services and will be accessed via the Internet. A small business needs a server that will be managed by a novice administrator that fulfills other roles in the company. An organization needs a server that will not be dedicated for a specific function, but will serve multiple functions. A network administrator requests a server installed with a version of Windows Server capable of configuration through wizards.

A server within an organization will be dedicated to web services and will be accessed via the Internet.

You are administrator for an Active Directory domain and have been tasked with improving response time for resolving DNS queries for resources in a second company owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead? A glue zone A forward zone A reverse zone A stub zone

A stub zone

What is NOT an attribute that must be defined for each Active Directory account? Domain User's full name Account holder's e-mail address Sign-in name

Account holder's e-mail address

What tab under a user's account properties allows you to define the hours at which the user is able to log on to the domain? Organization tab Profile tab Account tab Access tab

Account tab

What PowerShell command will install the DNS role on a Windows Server 2016 server? Get-WindowsRole DNS Add-WindowsFeature DNS Deploy-Role DNS Install-NewRole DNS

Add-WindowsFeature DNS

What statement regarding ownership of a file or folder is NOT accurate? The owner of the folder can modify all permissions on the folder. An administrator does not have the ability to take ownership of a file / folder unless granted permission to do so. The account that first creates the file / folder has ownership until transferred. Ownership of individual files and folders can be transferred by anyone with the Take Ownership permission.

An administrator does not have the ability to take ownership of a file / folder unless granted permission to do so.

What is the smallest Active Directory container or object with which a GPO can be linked? A group A computer An organizational unit A user

An organizational unit

In the Windows Backup window, what type of backup item option creates a binary image of the operating system and all files that can be used for a full restore? Bare metal recovery System state Whole system System reserved

Bare metal recovery

Two way communications between printer server and software applications require what functionality? Serial communication printing Bidirectional printing Printer data transfer protocol compatibility Printer SNMP functionality

Bidirectional printing

What happens when two devices end up with conflicting IRQ assignments? Both devices will share the same IRQ at reduced performance. Both devices will share the same IRQ with no penalties to performance. Both devices become inoperable until new IRQs are assigned. The conflicting devices will both pick a new random IRQ.

Both devices become inoperable until new IRQs are assigned.

The act of spooling a print job helps free up what resource on the print server? Active memory utilization Paged memory space CPU utilization Hard drive storage

CPU utilization

What is NOT a requirement for the use of DirectAccess? Client computers must be running Windows 10 or later. IPv6 must be enabled on the server and on any clients. A security group that contains the accounts of participating computers. Applications must be IPv6 aware.

Client computers must be running Windows 10 or later.

What DNS feature ensures that records in all DNS zones use cryptographic digital signing? DNS Lock Down (DNS LD) DNS security extension (DNSSEC) DNS Crypto DNS Secure Socket Layer (DNSSSL)

DNS security extension (DNSSEC)

What application pool is created by default when you install the Web Server role? WebAppPool DefaultWebPool DefaultAppPool IIS-Pool

DefaultAppPool

After installing Routing and Remote Access, a default remote access policy is created. What is the default access permission defined in this policy? Grant access for members of the Network Operators group Deny access Grant access Grant access for administrators

Deny access

Disk duplexing is the same as what type of disk redundancy? Disk high-level striping Disk mirroring Disk leveling Disk striping with parity

Disk mirroring

What NIC teaming load-balancing method uses flowlets to reduce large-sized traffic into smaller elements for faster data transfer? Dynamic Address hash Packet flow Hyper-V port

Dynamic

You are troubleshooting an issue on your network where users can access the DNS server, but DNS record information is not being processed. What should you do to troubleshoot the issue? Ensure users have permissions to read the DNS records by ensuring the domain has the "Authenticated Users" group set to "Read" permission. Ensure DNS server and DNS client services are started and set to automatically start when the server boots. Ensure that Dynamic DNS is enabled and configured correctly, and check manually added DNS records for accuracy. Reload the DNS server database, and then reload the zones affected.

Ensure DNS server and DNS client services are started and set to automatically start when the server boots.

When selecting authentication types for an RAS server, what is considered to be the most secure authentication type? Microsoft Challenge Handshake Authentication Protocol v2 Challenge Handshake Authentication Protocol Password Authentication Protocol Extensible Authentication Protocol

Extensible Authentication Protocol

What communications technology utilizes packet switching and virtual connection techniques to transmit at rates from 56 Kbps to 45 Mbps? Cable modem Frame relay Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL)

Frame relay

What statement regarding the use of Group Policies is accurate? Group policy cannot be set for non-OU folder containers. Group Policies can only be set for a site or domain. Group policy objects are local only. When Group Policy is updated, old policies are cached.

Group policy cannot be set for non-OU folder containers.

What Registry key contains information about the desktop setup for the account presently signed in to the server console? HKEY_CURRENT_CONFIG HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE

HKEY_CURRENT_USER

What is NOT one of the tasks that the Devices and Printers utility can be used for? Installing new non-PnP hardware and hardware drivers. Troubleshooting problems you might be having with existing hardware. Identifying resource conflicts between devices. Invoking the operating system to use PnP to detect new hardware.

Identifying resource conflicts between devices.

When using the GPT method of partitioning disks, where is the partition information stored? In the boot partition. In each partition using main and backup tables. At the first sector and track of the hard disk. In the last sector and track of the hard disk.

In each partition using main and backup tables.

You are troubleshooting a DHCP server, and discover that it is creating excessive network traffic handling DHCP requests. What solution will resolve the issue with minimum resource expenditure? Reduce the DHCP lease period for the scopes configured on the server. Create additional scopes on the DHCP server. Deploy a second DHCP server with the same scope and load balance requests. Increase the DHCP lease period for the scopes configured on the server.

Increase the DHCP lease period for the scopes configured on the server.

What is the primary disadvantage of using compressed files and folders? Increased backup times Increased RAM utilization Increased disk space usage Increased CPU utilization

Increased CPU utilization

You are attempting to access the BIOS screen of a computer to assess the BIOS's capabilities and to determine the BIOS version. What key is NOT a typical key pressed to enter the BIOS? F1 Del F2 Insert

Insert

What does the Internet Information Services (IIS) role do? It provides domain connected clients with routing information. It enables the server to function as a DNS server. It enables the use of the Secure Copy protocol. It enables the server to act as a web server.

It enables the server to act as a web server.

What is the purpose of a State of Authority record? It provides the authoritative alias for a computer name. It provides information about secondary DNS servers and off-site primary servers. It identifies the authoritative DNS server for the current zone. It identifies SSL certificates in use on the domain.

It identifies the authoritative DNS server for the current zone.

When using web-based printing, how is the remote procedure call made? It is encapsulated by IPP and is transported via HTTP. It is made as a regular HTTP request. It is encapsulated by IPP and uploaded via FTP. It is encapsulated by IPP and sent via e-mail.

It is encapsulated by IPP and is transported via HTTP.

What does the % Privileged Time counter represent? It is the amount of time a privileged user has been logged in. It is the amount of time privileged processes have utilized a disk. It is the amount of time spent by the CPU for system activities in privileged mode. It is the amount of time privileged processes are using memory resources.

It is the amount of time spent by the CPU for system activities in privileged mode.

What happens to the NTFS permissions applied to a folder when the folder is moved to a different folder in the same volume? It loses its permissions entirely, and inherits permissions from the new parent folder. The user is prompted to decide whether to keep permissions or inherit permissions. It keeps its permissions, but also inherits the permissions from the parent folder. It keeps its previous permissions settings in the new folder.

It keeps its previous permissions settings in the new folder.

What is the role of the Netlogon service? It enables network communications and access by clients over the network via the SMB protocol. It supports shared objects, logon services, print services, and remote procedure calls. It keeps information about the networks the server connects to and communicates network information to applications on the server. It maintains logon services such as verifying users who are signing in to the server or a domain.

It maintains logon services such as verifying users who are signing in to the server or a domain.

When should an organization consider using Microsoft Azure Active Directory? It should be used when a user needs remote access from another location outside the domain. It should be used when using IIS as a web server for customer logins. It should be considered if the organization subscribes to Office 365 services, or other compatible web services. It should be used when deploying Internet accessible services, such as FTP or DNS.

It should be considered if the organization subscribes to Office 365 services, or other compatible web services.

What does the "Enforce user logon restrictions" option do when configuring Kerberos? It enforces the account password configuration options defined in Group Policy during the login phase. It forces a user to be subject to logon restrictions defined in the user's properties under Active Directory Users and Computers. It forces the application of user configuration options defined by Group Policy. It turns on Kerberos security.

It turns on Kerberos security.

User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer, but finds he has no access. Upon investigating, you discover the Accounting group has Full Control over Folder A, but the Contractor group has been denied all access to the folder. What Jsmith's effective access? Because the two groups have opposite levels of access, the two cancel out and Jsmith is left with only read permissions. Jsmith's membership in the Contractor group allows him to edit files in the folder only after he takes control of the folder using the Accounting group permissions. Jsmith's membership in the Contractor group means that he has been denied all access to the folder. Jsmith's membership in the Contractor group limits him to read and execute permissions.

Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

What VPN tunneling protocol enables forwarding on the basis of MAC addressing? Layer Two Tunneling Protocol Point-to-Point Tunneling Protocol Secure Socket Tunneling Protocol Point-to-Point Protocol

Layer Two Tunneling Protocol

What is NOT one of the three items that must be present on a Windows Server 2016 install in order for the server to function as a web-based print server? Print and Document Services role with the Internet Printing role service installed Internet Printing Client Web Server role (IIS) Line Printer Daemon role

Line Printer Daemon role

What protocol can be used by a switch to automatically team NICs into a single logical connection? NIC Bonding Protocol Channelized Link Teaming Protocol Link Aggregation Control Protocol Multilink Control Protocol

Link Aggregation Control Protocol

What enables Linux clients to access a Linux virtual machine in Hyper-V? Linux Integration Services (LIS) Linux Operations (LO) Linux Client Access (LCA) Linux Remote Desktop (LRD)

Linux Integration Services (LIS)

What Active Directory Domain Services role feature can be used to replace passwords with a two-step authentication process that combines verifying a device is enrolled in the domain and that the device has a personal identification number? LDAP Identity Management ADS TwoAuth Microsoft Passport LDAP TwoStep

Microsoft Passport

What permissions should you assign a group if you want the group to have the ability to read, add, delete, execute, and modify files, but not to be able to delete subfolders and their file contents, change permissions, or take ownership? Read and execute Modify Read and write Full control

Modify

How are changes made within Active Directory maintained on different domain controllers? The configurations will copy to each domain controller one at a time. The primary domain controller on the network must be notified of the changes, after which other secondary DCs will pull changes from the master. Multimaster replication is used to replicate changes to other DCs. The domain controllers must manually sync their configurations.

Multimaster replication is used to replicate changes to other DCs.

What statement regarding NTFS features is NOT accurate? NTFS supports the POSIX standard. NTFS does not maintain an index of files. NTFS supports the use of file compression. NTFS is a journaling file system.

NTFS does not maintain an index of files.

What would be the reason to utilize the Windows NT LAN Manager version 2 (NTLMv2) over Kerberos? NTLMv2 provides compatibility with all versions of Windows, including legacy systems. NTLMv2 can be used in conjunction with Read-Only Domain Controllers. NTLMv2 provides a performance benefit over Kerberos. NTLMv2 provides advanced encryption through AES.

NTLMv2 provides compatibility with all versions of Windows, including legacy systems.

What Group Policy option can be used to force off users who have not logged off after hours, using logon hour controls? Network security: Enforce logon hours Network security: Force logoff when logon hours expire Account policy: Disallow user sessions when logon hours expire Account policy: Log off users when logon hours

Network security: Force logoff when logon hours expire

What Microsoft standard consists of a set of database access rules intended to provide a standard doorway to database data? Microsoft Database API (MDAPI) Data Source Database Connector (DSDC) Windows Database Access Layer (WDAL) Open Database Connectivity (ODBC)

Open Database Connectivity (ODBC)

What statement regarding the Password Authentication Protocol is accurate? PAP can perform authentication, but does not require it. PAP requires encrypted authentication between servers and clients. PAP is set as the default authentication protocol when RAS is installed. PAP supports the use of smart cards and token cards.

PAP can perform authentication, but does not require it.

What statement regarding the placement of the paging file is accurate? Server performance is improved by placing the paging file in the boot partition. In a system with multiple drives available, the paging file should be configured on only one drive. Paging files should be placed on stripe set RAID volumes to improve the performance of the drives. Paging files should be placed on the main disk in a mirrored set, not the backup disk

Paging files should be placed on the main disk in a mirrored set, not the backup disk.

What Windows feature provides a scripting language and includes command-line tools in the form of "cmdlets" that can be used for automation? PowerShell Visual Basic Script interface Bourne Again Shell DOS Batch file processor

PowerShell

Once a printer is shared, what permissions are given to the ALL APPLICATION PACKAGES special group? Print Print and Manage documents Manage documents Print, Manage this printer, and Manage Documents

Print and Manage documents

What type of applications or programs might not work with Data Execution Prevention (DEP) enabled? Programs that utilize dynamic code generation. Programs that execute during the boot sequence that are not from Microsoft approved publishers. Programs that require real time processing. Programs that utilize multiple executable files.

Programs that utilize dynamic code generation

When using Rights Management Services security, documents are encrypted using an AES key and what other additional key? RSA DSA ECRSA ECDSA

RSA

What is NOT one of the requirements that must be met prior to the installation of Windows Deployment Services? Active Directory Domain Services must be installed on a network server, and the target Windows Deployment Services server must be a member or domain controller in the domain. ReFS must be used as the file system on the Windows Deployment Services server A DNS server must be configured and on the network A DHCP server must be configured on the network

ReFS must be used as the file system on the Windows Deployment Services server

You have been tasked with implementing a server infrastructure that allows clients to use virtual machine and session-based desktops to access and run applications on servers. What role should you install for this purpose? Volume Activation Services Network Controller Services Remote Access Services Remote Desktop Services

Remote Desktop Services

What RDS feature enables a client to run an application without loading a remote desktop on the client computer? RemoteApp AppPackage RDS NetApp ThinApp

RemoteApp

How do you make a user profile a mandatory profile, preventing all changes? Change the permissions on the Ntuser.dat file to read only. Check the "mandatory profile" box under the user account's properties. Rename the Ntuser.dat file to Ntuser.man in the user's profile directory. Create the Manual.ini file in the user profile's directory.

Rename the Ntuser.dat file to Ntuser.man in the user's profile directory.

What security feature created by Microsoft enables the ability to define security rights for documents, spreadsheets, e-mail, and other types of files created by applications, going beyond what is possible with ACLs and the Windows Firewall? Windows Secure Access Control Windows Rights Assignment Service Rights Management Services Permissions and Rights Assessment Service

Rights Management Services

When using Windows Server 2016 Device Specific Module (DSM), what configuration model allows you to cycle through functional paths in order? Round Robin Failback Weighted Path Dynamic Least Queue Depth

Round Robin

What statement regarding the Secure Socket Tunneling Protocol is NOT accurate? SSTP is viewed as more secure that PPTP or L2TP because it encrypts using a 128-bit key. SSTP authenticates users with 2048-bit key certificates. SSTP uses Transport Layer Security for secure communications. SSTP encapsulates data packets in HTTP.

SSTP is viewed as more secure that PPTP or L2TP because it encrypts using a 128-bit key.

You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints? Layer Two Tunneling Protocol Point-to-Point Tunneling Protocol Secure Socket Tunneling Protocol Point-to-Point Protocol

Secure Socket Tunneling Protocol

What option should you use on a printer's Advanced properties page if pages are intermixing from printouts? Start printing after last page is spooled Keep printed documents Hold mismatched documents Print spooled documents first

Start printing after last page is spooled

What Windows Server 2016 feature implements software defined storage and is intended to make storage more versatile by making it easier to add storage, access storage, and use new storage capabilities? Storage Spaces Direct StorageApp Software Storage Management Windows Dynamic Storage

Storage Spaces Direct

What process represents the Windows kernel and system process on a running Windows 2016 Server installation? System NtKrnl kernel.exe lsass.exe

System

You are configuring a Windows Server 2016 VPN server using L2TP and NAT. What is NOT one of the ports that needs to be opened on the firewall for this configuration to work? TCP 1723 UDP 500 UDP 1701 UDP 4500

TCP 1723

What printer data type utilizes the ANSI standard to represent characters, numbers, and symbols? NT EMF TEXT RAW (FF Auto) RAW

TEXT

You are experiencing problems on your Windows Server 2016 installation. Specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? The HKEY_CURRENT_CONFIG key The HKEY_USERS key The HKEY_LOCAL_MACHINE key The HKEY_CLASSES_ROOT key

The HKEY_CLASSES_ROOT key

When using dynamic disks, what is the volume that contains the \Windows folder called? The logical volume The essential volume The boot volume The system volume

The boot volume

What happens if a client device connects to a shared printer and discovers that the print driver is not current on the client device? The client will update the driver used for the printer automatically. The shared printer is inaccessible until the driver is updated. The shared printer is available, but at reduced performance / subject to the limitations of the outdated driver. The client will prompt the user to update the driver or continue using the old one.

The client will update the driver used for the printer automatically.

If a computer is not equipped with a TPM chip, how can a computer make use of BitLocker Drive Encryption? The computer will require a USB flash drive that contains a personal identification number used to start the computer and secure the drive . The computer will require a password on a cold start up to ensure that the drive contents are accessed by authorized users. The computer will require the use of a smart card reader that can be used to authenticate the user. The computer will utilize BitLocker encryption, but security will be provided at the software level as opposed to the hardware level.

The computer will require a USB flash drive that contains a personal identification number used to start the computer and secure the drive.

What happens when you move a file with NTFS permissions to a different NTFS volume? The file loses all permissions, and must be assigned new permissions. The file retains the permissions it had prior to the move. The file permissions are merged with the destination parent's permissions. The file inherits the permissions of the parent folder to which it is moved.

The file inherits the permissions of the parent folder to which it is moved.

After a print file is generated by an application, what is the next step in printing to a network printer? The graphics device interface (GDI) integrates information about the print file with information received from the printer driver. The print file is spooled on the remote print server. The remote print provider uses four processes to receive and process the print file: router, print provider, print processor, and print monitor. The print file is formatted with control codes to implement special graphics, font, and color characteristics.

The graphics device interface (GDI) integrates information about the print file with information received from the printer driver.

What statement regarding support of Plug and Play is not accurate? The kernel requires a special flag to enable PnP. The feature must be built into the device. The PnP feature must be enabled in the BIOS. Most devices universally support Plug and Play.

The kernel requires a special flag to enable PnP.

Why do newer versions of the Windows client operating systems reduce the TCO (Total Cost of Ownership) for a network running Windows Server 2016? The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016. The older Windows operating systems are no longer supported by Windows Server 2016, and often require third party management plugins to be added to Server 2016. The older Windows operating systems require security software in order to be secured on the network. The latest Windows operating systems are not as expensive to purchase licenses for as older workstations.

The latest Windows operating systems provide more automated installation, configuration, desktop, and management policy features compatible with Server 2016.

How is the priority at which a process runs normally set? The process priority is normally set in the program code of the application. If not specified, it is run at normal priority. The process priority is always set to normal, unless the administrator intervenes. The process priority is always determined by the system, and is always set to normal. The process priority is dynamic and is adjusted by the system depending on the needs of the process.

The process priority is normally set in the program code of the application. If not specified, it is run at normal priority.

A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure? The computer is having issues communicating with the domain and is attempting to use cached credentials. The user is in a new OU and lacks log on permissions to the computer used. The global catalog server has not replicated the user's account information to the rest of the domain. The user's account has been locked due to frequent failed password attempts.

The user's account has been locked due to frequent failed password attempts.

According to Microsoft, what is the minimum number of DCs that should be present in any organization using Active Directory? Two Six Four Three

Two

When configuring Windows Firewall exceptions, what is NOT one of the items that can be added as an exception? TCP and UDP ports Network interfaces IPv4 and IPv6 addresses Users

Users

What statement regarding the use of virtual memory in Windows Server 2016 is accurate? Virtual memory usage involves a hit to performance. Virtual memory is by default disabled. Virtual memory usage is required by the operating system. Virtual memory is static, and cannot grow while in use.

Virtual memory usage involves a hit to performance.

What service replaces the older Indexing Service to provide indexed search results? Windows Search DB Clippy Search Microsoft Indexed Query Windows Search Service

Windows Search Service

Where can the most up-to-date list of compatible hardware available for Windows Server 2016 be found? Various hardware vendor web pages Windows Hardware Check App Microsoft Hardware Compatibility List Windows Server Catalog website

Windows Server Catalog website

What utility is used to create an unattended answer file for unattended installation? Windows Unattended Installation Utility Windows Deployment Tool Windows System Image Manager Windows Automated Answer Generator

Windows System Image Manager

You are attempting to create a new universal group but find that the radio button in the Create New Object - Group dialog box is deactivated. What is the issue? You are trying to create a universal group in an OU without the permission to do so. You are operating in a domain with a Windows 2000 domain functional level. You are attempting to create a universal group within another universal group. You are not creating the group on the global catalog server.

You are operating in a domain with a Windows 2000 domain functional level.

What is not a valid requirement for joining a computer to an Active Directory domain? You will need a DNS name for the domain to be joined. One domain controller and a DNS server that can resolve the domain name must be online. You must have Internet connectivity and be capable of reaching microsoft.com You must have an authorized user account in the domain.

You must have Internet connectivity and be capable of reaching microsoft.com

What command can be run to perform a check of the C: drive and fix any errors found with the file system? fsck C:\ -f fsverify --force C:\ chkdsk /f C:\ checkfs C:\

chkdsk /f C:\

What command can be used to encrypt / decrypt files from the command line? encrypt crypto cipher crypt-file

cipher

What kind of group is used for e-mail or telephone lists, to provide quick, mass distribution of information? global groups domain local groups universal groups distribution groups

distribution groups

When considering GPO precedence between local GPO, default domain GPO, domain controller GPO, site GPO and OU GPOs, what GPOs are applied first? default domain GPOs local GPOs site GPOs OU GPOs

local GPOs

What term is used to describe the Windows Server 2016 ability to run a program in an area of memory separate from areas used by other programs? ordered multitasking preemptive multitasking precognitive multitasking cooperative multitasking

preemptive multitasking

What mode does the operating system kernel run in, that protects it from problems created by malfunctioning programs and processes? privileged mode protected mode admin mode root mode

privileged mode


Set pelajaran terkait

Phrasal Verbs with PUT (Match/TF Study Set)

View Set

Chapter 8 Application Deployment and Management

View Set

IS Security Tools and Techniques Exam 2 Review Questions

View Set

Economics and Personal Finance study set

View Set

Anatomy Final (review: Exam 1 of 4)

View Set

Exam 3: Drug discovery: finding a lead

View Set

IST 220 CHAPTER 5: ETHERNET (802.3) SWITCHED LANs

View Set

Child Development II Exam #2 (Chap 4-7)

View Set

Earth Science Chapter 25 Homework

View Set