ITN 200 Midterm Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True or False. You can convert a Security group type to Distribution group type without any effect on the permissions given to the group when it comes to accessing a network resource. a. TRUE b. FALSE

FALSE

Creating OUs within the Active Directory database is also called prestaging. a. True b. False

False

In the following example, three loops will be executed.$args = "one","two","three","four"foreach ($i in $args) {write $i -foregroundcolor magenta} a. True b. False

False

PowerShell console files use the .ps1 extension. a. True b. False

False

Replication must be enabled on your Hyper-V host before you are able to copy the contents of a virtual machine to a target Hyper-V host. a. True b. False

False

Servers that exist within a data center that is publicly accessible on the Internet are referred to as on-premises servers. a. True b. False

False

The View effective access tab within the Advanced Security Settings window for a folder or file can be used to view the groups that have access to a particular folder or file. a. True b. False

False

Which of the following basic NTFS/ReFS permissions allows you to delete a file? (Choose all that apply.) a. Full control b. Modify c. Write d. Read and execute

Full control Modify

Which of the following tools can be used for creating user accounts in an Active Directory domain? a. Credential Manager b. Ocsetup.exe c. Microsoft Management Console d. Control.exe

Microsoft Management Console

You wish to grant a specific user the ability to view the read-only attribute on files within a particular folder on the system, but do not wish to grant any other access. What advanced permission should you assign to this user? a. Traverse folder/execute file b. Read attributes c. Read extended attributes d. Read permissions

Read attributes

Which of the following NFS shared folder permissions allows computers to access an NFS shared folder and modify content? a. Full Control b. Change c. Read-Write d. Modify

Read-Write

What should be your first course of action when you see a device marked Unknown within Device Manager? a. Install the manufacturer-provided driver package on the system and reboot. b. Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted. c. Right-click the Unknown device within Device Manager and choose Uninstall device. Reboot your system afterwards. d. Right-click the Unknown device within Device Manager and choose Properties. Note whether there is a resource conflict.

Right-click the Unknown device within Device Manager and choose Update driver. Supply the manufacturer-provided driver files if prompted

You have created a template user account within Active Directory Users and Computers. What must you do to create additional user accounts based on this template user account? a. Create a new user account and select the template user account when prompted b. Create a new user account and specify the name of the template user account in the User Principle Name text box c. Right-click the template user account, and click Copy d. Right-click the template user account, and click Import

Right-click the template user account, and click Copy

Which Event Log present information about user logons and logoffs in a Windows domain network? a. System b. Application c. Setup d. Security

Security

Which of the following Windows logs stores auditing events? a. System b. Application c. Security d. Auditing

Security

Which of the following can be used to set the compress attribute for an NTFS file? (Choose all that apply.) a. Set-ItemProperty b. cipher.exe c. compress.exe d. compact.exe

Set-ItemProperty compact.exe

Which of the following statements are true when adding a folder in a DFS namespace root? [Choose all that apply]. a. A folder added under a namespace root does not necessarily have a folder target. b. A folder added under a namespace root can have a folder target. The folder target will serve content to end-users. c. A folder added under a namespace root must have a folder target as this is mandatory. d. A folder added under a namespace root builds the folder structure and hierarchy of the DFS namespace.

A folder added under a namespace root does not necessarily have a folder target A folder added under a namespace root can have a folder target. The folder target will serve content to end-users A folder added under a namespace root builds the folder structure and hierarchy of the DFS namespace

Which of the following tools within the navigation pane of the Windows Admin Center can be used to perform capacity planning? a. Performance b. Services c. System Insights d. Azure hybrid services

System Insights

Which of the following features can be configured within Control Panel? (Choose all that apply.) a. File caching and flushing b. Environment variables c. Power options d. Startup and recovery options

All of the above

Which of the following tasks are typically performed following a Windows Server 2019 installation? (Choose all that apply.) a. Verify the correct time and time zone information b. Activate the Windows Server 2019 operating system c. Configure the appropriate computer name and domain membership d. Set IP configuration on network interfaces

All of the above

After creating a production checkpoint of a virtual machine, you would like to revert the virtual machine to the state it was in prior to the checkpoint. What should you select within the Actions pane of Hyper-V Manager after selecting your checkpoint within the Checkpoints pane? a. Apply b. Revert c. Delete d. Delete Subtree

Apply

Before installing Active Directory on a Windows Server system to function as an additional domain controller within a forest, you must first ensure that the Windows Server is configured to contact a DNS server that contains the appropriate service records for the forest. a. True b. False

True

Both NFS and SMB shared folders can be published to Active Directory. a. True b. False

True

Guest operating systems require VMBus drivers to support the virtualized hardware within a Generation 2 virtual machine. a. True b. False

True

If a global catalog cannot be placed within a branch office site, you can enable UGMC on the site to ensure branch office domain controllers provide fast authentication. a. True b. False

True

You must be a member of the Enterprise Admins group in order to add a trust relationship. a. True b. False

True

Which of the following operating systems are supported for use within a Generation 2 virtual machine? (Choose all that apply.) a. 32-bit versions of Windows 7 b. 64-bit versions of Windows Server 2008 c. Ubuntu 14.04 d. FreeBSD 9.1

Ubuntu 14.04 FreeBSD 9.1

Which default folder under a domain within Active Directory Users and Computers contains the Administrator user account and Domain Admins group? a. Builtin b. Default c. Users d. ForeignSecurityPrinciples

Users

Which of the following can be used to a Namespace root server from a Windows client? [Choose two that apply]. a. \\Namespace server\rootfoldername b. \\Rootfoldername\foldertarget c. \\DomainName\rootfoldername d. \\DNS\foldertarget

\\Namespace server\rootfoldername \\DomainName\rootfoldername

Complete the following Windows PowerShell command that will add a Windows computer to an Active Directory Domain. Add-Computer -DomainCredential practicelabs\administrator -DomainName practicelabs.com a. -DomainCredential b. -DomainAdministrator c. -DomainAccount d. -DomainUserAccount

-DomainCredential

Which of the following occurs when you encrypt a file using EFS within a domain environment? (Choose all that apply.) a. An asymmetric private key is generated and used to encrypt the file contents b. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key c. A symmetric encryption key is generated and used to encrypt the file contents d. A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent's public key

A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with your public key A symmetric encryption key is generated and used to encrypt the file contents A copy of the symmetric encryption key is stored within the file metadata and asymmetrically encrypted with recovery agent's public key

A folder called DailySales is used by a security group called Data Entry for recording the daily transactions of a retail store. The following table describes the share folder and NTFS permissions for DailySales. You want every member of the Data Entry security group to be able to modify his own file that he posted in the DailySales folder. What is efficient way to meet this requirement? a. Add Creator Owner security group into NTFS permission and grant it Allow - Modify permission. b. Grant Data Entry security group Allow - Modify permission. c. Grant each member user account in the Data Entry security group Allow - Modify permission. d. Grant Data Entry security group Allow - Full Control permission.

Add Creator Owner security group into NTFS permission and grant it Allow - Modify permission

A folder called App2 contains applications that are accessed over the network. The following table describes the share folder and NTFS permissions for App2. John is a member of Engineering and Research. What is John's effective permission when he connects to App2 folder? a. Allow - Read, Write b. Allow - Read & Execute, Write c. Allow - Read d. Allow- Full Control

Allow - Read & Execute, Write

Refer to the screenshot. Which of the following statements are true when the following audit policy is enabled? [Choose three that apply]. a. An event will be logged when a user successfully creates a file. b. An event will be logged when an administrator changes Active Directory when a user object is created. c. An event will be logged when the file system is accessed. d. An event will be logged when a user successfully creates a folder.

An event will be logged when a user successfully creates a file An event will be logged when the file system is accessed An event will be logged when a user successfully creates a folder

Your organization maintains a shared folder called PrivateHR that only the HumanResources-G and Domain Admins groups have access to. You wish to audit each time a member of the HumanResources-G group successfully modifies or deletes a file within this folder. What must you do? (Choose all that apply.) a. Configure an audit entry within the SACL of the PrivateHR folder that allows the Modify permission for the HumanResources-G group b. Configure the audit attribute on the PrivateHR folder c. Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group d. Enable success auditing for the system using an audit policy

Configure an audit entry within the SACL of the PrivateHR folder that audits the Modify permission for the HumanResources-G group Enable success auditing for the system using an audit policy

Your domain consists of two separate physical locations. Each location contains several domain controllers, and you have noticed that domain controller replication traffic consumes a large amount of your Internet bandwidth. What can you do within Active Directory Sites and Services to ensure that replication occurs outside of business hours? (Choose all that apply.) a. Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object. b. Create subnet objects for each site. Ensure that the properties of each subnet object contains a schedule that excludes business hours. c. In the properties of a site link object, configure a replication schedule that excludes business hours. d. Modify the NTDS Site Settings for each site to include a replication schedule that excludes business hours.

Create a site object for each physical location and ensure that domain controller objects are placed within the correct site object In the properties of a site link object, configure a replication schedule that excludes business hours.

You have a large number of users that access the same files within a shared folder that is replicated to another shared folder on the network using DFS replication. Users often report problems with missing content in the files that they access within the shared folder, and that changes take a long time to propagate from one shared folder to the other. What two actions can you take to address these issues? (Choose two answers.) a. Add a shared folder on a third file server to the replication group b. Disable remote differential compression (RDC) on the connections within the replication group c. Increase the size limit of the DFS staging folder for each member of the replication group d. Modify the replication group settings to use a Full mesh topology for replication

Disable remote differential compression (RDC) on the connections within the replication group Increase the size limit of the DFS staging folder for each member of the replication group

What term is used to refer to a logical grouping of computers that participate in Active Directory single sign-on? a. Group Policy b. Domain c. Domain controller d. Azure Active Directory

Domain

Which of the following group scopes can contain objects from any domain within the forest? (Choose all that apply.) a. Global b. Domain local c. Distribution d. Universal

Domain local Universal

What are the two types of Namespace that can be created when configuring the New Namespace wizard in DFS? a. Domain Controller-based and Workgroup-based b. Active Directory-based and Workgroup-based c. Domain-based and Stand-alone d. Active Directory-based and Stand-alone based

Domain-based and Stand-alone

You read that Security logs created in Event Viewer in Windows Servers impose a considerable impact on disk space utilization. Audit object access policy was recently enabled as a policy on the corporate network. Which of the following measures can you apply to ensure that events recorded in Security logs do not consume too much disk space? [Choose two that apply]. a. Enable auditing only on selected folders. b. Configure Audit object access policy setting to use Success and Failure. c. Enable auditing on the entire system drive. d. Configure Audit object access policy setting to Failure.

Enable auditing only on selected folders Configure Audit object access policy setting to Failure

True or False. A DFS client software must be installed first to enable a Windows desktop to connect to the DFS namespace root. TRUE FALSE

FALSE

True or False. A Windows Server 2016 that was installed in Desktop Experience mode can be converted to Server Core mode. a. TRUE b. FALSE

FALSE

Both Generation 1 and Generation 2 virtual machines support Secure Boot. a. True b. False

False

The Active Directory Recycle Bin can be enabled using the Active Directory Domains and Trusts tool. a. True b. False

False

The Sigverif tool can be used to verify and repair corrupt system files. a. True b. False

False

Windows Server 2019 supports up to 64 physical processors and 128 logical processors. a. True b. False

False

You are configuring a DFS replication group to synchronize folder contents between four file servers. To minimize the network bandwidth used by DFS replication, you should choose a Full mesh topology for your replication group. a. True b. False

False

Which functions does the global catalog provide? (Choose all that apply.) a. Fast object searching b. Time synchronization c. Universal group membership d. Domain authentication using UPNs

Fast object searching Universal group membership Domain authentication using UPNs

Which of the following features are provided by the File Server Resource Manager server role? (Choose all that apply.) a. File screens b. Access-based enumeration c. Folder quotas d. User quotas

File screens Folder quotas

You would like to provide a central shared folder that users can access to view all other shared folders within the organization. What must you do? (Choose all that apply.) a. Install the DFS Namespaces role and configure a DFS namespace b. Configure a replication group c. Add targets to the DFS namespace for each shared folder d. Install the DFS Replication role on each file server

Install the DFS Namespaces role and configure a DFS namespace Add targets to the DFS namespace for each shared folder

Which of the following PowerShell cmdlets can be used to move or seize a FSMO role? a. Move-FSMORole b. Move-ADDirectoryServerOperationMasterRole c. Transfer-ADOperationMasterRole d. Set-DirectoryServerOperationMaster

Move-ADDirectoryServerOperationMasterRole

You wish to add a copy of the global catalog to a domain controller within Active Directory Sites and Services. For which object must you right-click and select Properties? a. Server b. NTDS Settings c. NTDS Site Settings d. Site link

NTDS Settings

Which of the following FSMO roles are stored on one domain controller within each domain? (Choose all that apply.) a. Schema Master b. PDC Emulator c. RID Master d. Domain Naming Master

PDC Emulator RID Master

Which of the following tools can be used for monitoring Active Directory replication between domain controllers that are distributed in other Active Directory sites? a. Domainprep b. Adprep c. Sysprep d. Repadmin

Repadmin

You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? (Choose all that apply.) a. SecureData.xml will retain its original permissions following the move operation b. SecureData.xml will remain encrypted following the move operation c. SecureData.xml will inherit the permissions from the target folder following the move operation d. The SecureData.xml will be not be encrypted following the move operation

SecureData.xml will inherit the permissions from the target folder following the move operation The SecureData.xml will be not be encrypted following the move operation

You would like to share a folder that uses the access-based enumeration feature. What must you do? a. Share the folder using SMB by accessing folder properties. b. Share the folder using SMB using Server Manager. c. Share the folder using NFS by accessing folder properties. d. Share the folder using NFS using Server Manager.

Share the folder using SMB using Server Manager

True or False. A DFS Namespace server can use more than one Namespace as long as the names are different. a. TRUE b. FALSE

TRUE

True or False. Successful logons of user accounts in the Active Directory domain are audited by default. a. TRUE b. FALSE

TRUE

A Windows helpdesk staff is trying to create new shared folder using Windows PowerShell. He sends a screenshot to ask for help about the error message he got after running PowerShell command. What can you do resolve this error? a. The Workstation service that controls the creation of shared folders is not started. b. The folder name "MyDocuments" has exceeded the 8-character limit for folder names. c. The Server service that controls the creation of shared folders is not started. d. The MyDocuments folder must first be created before running the New-SmbShare command.

The MyDocuments folder must first be created before running the New-SmbShare command

The policy setting "Audit object access" was enabled by an administrator in a test lab Active Directory domain. A new folder called Sales was created on one of the domain controllers. Subsequently, a document called SalesForecast was created in the mentioned folder. When the Event Viewer >Security log was examined, no event was logged about Sales folder and the SalesForecast document. Why was there no event log about the newly-created objects? a. The policy Audit object access setting was set to Success. b. The Sales folder was not enabled for auditing. c. The Sales folder was not shared. d. The policy Audit object access setting was set to Failure.

The Sales folder was not enabled for auditing

You created a folder named "codeplans" on a domain member server. You want to share this folder and entered the following Windows PowerShell command: New-SmbShare -Name "codeplans" -Path "c:\corpdata" -Fullaccess practicelabs\domain users You get the following error message which you saved as a screenshot. What is cause of this error message? a. The security group Domain Users and the domain name practicelabs are not enclosed in quotation marks to enable Windows to create a mapping between account names and security IDs. b. The security group Domain Users is not existing in the domain. Therefore, Windows is unable to create a mapping between account names and security IDs. c. The security group Domain Users is not found on the member server. Therefore, Windows is unable to create a mapping between account names and security IDs. d. The security group Domain Users has no user accounts as members. Therefore, Windows is unable to create a mapping between account names and security IDs.

The security group Domain Users and the domain name practicelabs are not enclosed in quotation marks to enable Windows to create a mapping between account names and security IDs

You have shared a folder using SMB and assigned members of the Accounting group Full Control shared folder permission. One of the members of the Accounting group complains that they get an access denied message when attempting to access files within the shared folder. What are two possible causes of this issue? (Choose two answers.) a. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files denies access to a group to which the user belongs b. The shared folder is on an FAT32 or exFAT volume, and the DACL on the files does not allow the user access c. The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs d. The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

The shared folder is on an NTFS or ReFS volume, and the DACL on the files denies access to a group to which the user belongs The shared folder is on an NTFS or ReFS volume, and the DACL on the files does not allow the user access

If a RODC is stolen, you can delete the computer account to reset affected user and computer accounts. a. True b. False

True

Only the NTFS filesystem supports all of the basic and advanced attributes for folders and files. a. True b. False

True

The schema and configuration partitions of the Active Directory database are replicated forest-wide. a. True b. False

True

Windows systems that have the Client for NFS installed can access an NFS shared folder by browsing the network or specifying the shared folder's UNC. a. True b. False

True

You can use soft quotas to provide warnings to users that exceed folder quotas, while not restricting their ability to add content to a folder. a. True b. False

True

You can use the Set-ACL cmdlet within Windows PowerShell to configure entries within a DACL or SACL. a. True b. False

True

Which of the following programs can be used to share a folder from a Windows Server computer? [Choose two that apply]. a. Control Panel b. Windows PowerShell c. Microsoft Management Console d. Credential Manager

Windows PowerShell Microsoft Management Console

Which of the following domain functional levels provides Kerberos armoring? (Choose all that apply.) a. Windows Server 2008 R2 b. Windows Server 2012 c. Windows Server 2012 R2 d. Windows Server 2016

Windows Server 2012 Windows Server 2012 R2 Windows Server 2016

Which two files must you import within the Windows Deployment Services tool to provide for remote installation? a. install.wim b. PXE.wim c. bootmgmt.wim d. boot.wim

install.wim boot.wim

Which of the following aliases can be used to switch to a different PowerShell provider? a. sp b. ps c. cd d. sl

sl

You can use the Install-ADDSDomain cmdlet within Windows PowerShell to configure a new forest root domain. a. True b. False

False

Complete the following Windows PowerShell command for creating a security group in Active Directory. New-ADGroup Sales -Path "ou=Engineering,ou=EMEA,dc=practicelabs,dc=com" - Security - GroupScope Global a. GroupType b. GroupClassification c. GroupCategory d. GroupVariant

GroupCategory

Any changes to a guest operating system made following the creation of a checkpoint are stored within a.avhdx file in the same directory as the associated .vhdx file. a. True b. False

True

Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services. a. True b. False

True

Commands within Windows PowerShell are referred to as cmdlets. a. True b. False

True

Containers are often used to host Web apps within cloud environments. a. True b. False

True

Virtual machine settings are stored within a .vhdx file. a. True b. False

False

You are signed-in as a local administrator on Windows Server 2016. Complete the following Windows PowerShell cmdlet to install a new child domain in an existing Active Directory Domain network. Install-ADDSDomain -NewDomainName NORTHAMERICA -ParentDomainName PRACTICELABS.COM -InstallDNS a. -Credential (Get-User practicelabs\administrator) b. -LogonAs (Get-Credential practicelabs\administrator) c. -Credential (Get-Credential practicelabs\administrator) d. -Runas (Get-Credential practicelabs\administrator)

-Credential (Get-Credential practicelabs\administrator)

Which of the following methods are acceptable when it comes to implementing a group nesting strategy in a corporate network spanning more than one Active Directory domain? [Choose two that apply]. a. A-G-DL-P b. A-G-U-DL-P c. A-G-P d. A-G-L-P

A-G-DL-P A-G-U-DL-P

Which component of Microsoft Defender can be used to provide cloud-based threat analysis within Windows Server 2019? a. Shielded virtual machines b. IIS c. ATP d. Windows Defender Firewall

ATP

A user template account was created to ease the creation of user accounts with common user properties. Which of the following user attributes or properties are copied from a template account? [Choose three that apply]. a. First name b. Account is disabled setting c. Home folder information d. Group membership

Account is disabled setting Home folder information Group membership

Which of the following tools can you use to verify the parent-child trust relationship following the installation of a new child domain in an existing Active Directory Domain network? a. Computer Management b. Active Directory Domains and Trusts c. Active Directory Sites and Services d. Active Directory Users and Computers

Active Directory Domains and Trusts

A trainee Windows administrator has built an Active Directory lab in an isolated network segment in the company. The essential domain controllers have been placed in their respective AD sites and site links have likewise been created. He wants to use a tool for forcing a replication of AD data whenever a change is made on one of the domain controllers. Which of the following tools can he use? a. Active Directory Domains and Trusts b. Active Directory Users and Computers c. Active Directory Connector d. ADSI Edit e. Active Directory Sites and Services

Active Directory Sites and Services

The HelpDesk security group was delegated the permission to create User objects and Reset their passwords in the Trainees organizational unit of the Active Directory domain. A new company policy will now mandate the HelpDesk security group to have the permission to create Group objects and modify their membership. This permission must be applied in the same Trainees OU. Which of the following tool can you use to modify the delegated permission to HelpDesk security group? a. Credential Manager b. Active Directory Users and Computers c. LDP.exe d. ADSI Edit

Active Directory Users and Computers

What command could you execute within PowerShell to learn about the syntax of the Get-WMIObject cmdlet? (Choose all that apply.) a. help Get-WMIObject b. Get-Help Get-WMIObject c. get-help Get-WMIObject d. Get-Help Get-WMIObject -online

All of the above

Which of the following are panes that you will see listed for a server, server group, or server role within Server Manager? (Choose all that apply.) a. Services b. Events c. Roles and Features d. Performance

All of the above

The Server Help Desk security group was delegated permission to create and delete user objects in an organizational unit called Apprentices. One of the users named Ryan is currently signed-in to a Windows 10 running RSAT. He is managing user objects in the Apprentices OU. The domain administrator modified the delegated permission granted to Server Help Desk security group to include create and delete group objects. Ryan opened Active Directory Users and Computers but couldn't find the command to create a New Group. He can see the command to create a New User. What must be done to resolve this issue? a. Use the Run as administrator to launch Active Directory Users and Computer. b. Add user named Ryan to Account Operators group in the domain. c. Ask the domain administrator to re-run Delegate Control and explicitly add Ryan to have the permission to create and delete group objects. d. Ask Ryan to sign out and sign back in to Windows 10 where RSAT is installed.

Ask Ryan to sign out and sign back in to Windows 10 where RSAT is installed

Group nesting is enabled between parent-child domain PRACTICELABS and NAMERICA. A domain user SalesUser1 from the NAMERICA child domain is a member of GSales Security group. GSales was unintentionally changed to a Distribution group. When SalesUser1 signed-in after a short break, he is unable to connect to the shared resource from the PRACTICELABS domain. GSales was changed back to being a Security group type. However, SalesUser1 is still unable to access the shared resource. What can you do to resolve this issue? a. Add SalesUser1 as a member of the Domain Users group in the child domain. b. Add SalesUser1 as a member of the Domain Users group in the parent domain. c. Ask SalesUser1 to sign out and sign back in. d. Ask SalesUser1 to sign out and sign back in as Guest.

Ask SalesUser1 to sign out and sign back in

A visiting domain user called Lisa from a child domain called EMEA-CORP wants to test if she can access a shared resource in the parent domain called PRACTICELABS. At the moment, she does not have her company-issued Windows 10 laptop. Group nesting strategy has been successfully setup between the two domains indicated. Which of the following actions can you do to help visiting domain user so she can access the shared network resource, while in the premises of the PRACTICELABS domain? a. Ask the PRACTICELABS administrator to enable the Guest account. b. Ask the PRACTICELABS administrator to add her account to the Domain Users group. c. Ask the PRACTICELABS administrator to lend her a domain workstation so she can sign-in to the EMEA-CORP domain and subsequently connect to the shared resource. d. Ask the PRACTICELABS administrator to give her Remote Desktop Users group membership.

Ask the PRACTICELABS administrator to lend her a domain workstation so she can sign-in to the EMEA-CORP domain and subsequently connect to the shared resource

Which of the following are valid methods for executing the superscript.ps1 file within PowerShell, assuming it is in your current directory, C:\Scripts? (Choose all that apply.) a. C:\Scripts\superscript.ps1 b. superscript.ps1 c. ./superscript.ps1 d. .\superscript.ps1

C:\Scripts\superscript.ps1 ./superscript.ps1 .\superscript.ps1

Two Active Directory domains in their respective forests were successfully created. You were tasked to configure an alternate DNS server on each domain controller of both domain forests. This is to ensure successful hostname resolution between the two AD forests. Which of the following tools can you use? a. Command Prompt b. Active Directory Domains and Trusts c. Computer Management d. System Information

Command Prompt

Your system has three physical storage devices. Windows Server 2019 is installed on the first physical storage device. What can you do to increase the performance of the system as much as possible? a. Move the paging file to the second physical storage device b. Move the paging file to the third physical storage device c. Create a paging file on the second and third physical storage devices d. Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

Create a paging file on the second and third physical storage devices and remove the page file from the first storage device

To create a virtual machine template, what actions must you perform at minimum? (Choose all that apply.) a. Create a new virtual machine and install a guest operating system within it b. Install additional software components within the guest operating system c. Run the System Preparation Tool within the guest operating system to remove unique identifiers d. Export the virtual machine to a folder on the filesystem

Create a new virtual machine and install a guest operating system within it Run the System Preparation Tool within the guest operating system to remove unique identifiers Export the virtual machine to a folder on the filesystem

Which action should you choose for a virtual machine within the Actions pane in order to obtain the Virtual Machine Connection window? a. Start b. Connect c. View d. Ctrl+Alt+Del

Connect

The minimum memory required for a graphical Windows Server 2019 installation is 512 MB. a. True b. False

False

Domain controllers store local user accounts within a SAM database and domain user accounts within Active Directory. a. True b. False

False

Which of the following utilities can be used to manually install a new device that is not fully PnP-compliant? a. Windows PowerShell b. Device Manager c. Devices and Printers utility d. Server Manager

Devices and Printers utility

Which of the following Hyper-V features allows a virtual machine to use additional physical memory within a server, provided that it is available? a. Smart caching b. Dynamic memory c. Smart paging d. Shielding

Dynamic memory

Your server has an additional SSD that you wish to use exclusively within a virtual machine as a pass-through disk to increase performance. What must you do to achieve this? (Choose two answers.) a. Ensure that the SSD is set to an Online state within the Disk Management tool. b. Ensure that the SSD is set to an Offline state within the Disk Management tool. c. In the properties of the virtual machine, create a new virtual hard disk file that is stored on the drive letter that is used by the SSD. d. In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD.

Ensure that the SSD is set to an Offline state within the Disk Management tool In the properties of the virtual machine, select an existing virtual hard disk, choose Physical hard disk, and select the SSD

Which of the following can be used to open a new Windows PowerShell prompt that is connected to a remote computer (provided that winRM is enabled)? a. Enter-PSSession computername b. Invoke-Command computername c. Execute-Shell computername d. Enable-PSRemoting computername

Enter-PSSession computername

Which of the following trust relationships can be created between two domains in separate Active Directory forests? a. Forest trust b. Shortcut trust c. Realm trust d. External trusts

External trusts

A Windows server apprentice with domain admin rights ran the command "Install-ADDSDomainController -InstallDNS -DomainName practicelabs.com" to create an additional domain controller in a test lab. He gets an error message as seen on the below screenshot. What is the cause of this error? a. He must run "Install-WindowsFeature -Name AD-Domain-Services -IncludeManagementTools" to install the Active Directory binaries or supporting files. b. He must be signed-in with Configuration Admin rights to be able to create an additional domain controller in the existing domain. c. He must be signed-in with Schema Admin rights to be able to create an additional domain controller in the existing domain. d. He must be signed-in with Enterprise Admin rights to be able to create an additional domain controller in the existing domain.

He must run "Install-WindowsFeature -Name AD-Domain-Services -IncludeManagementTools" to install the Active Directory binaries or supporting files

A trainee Windows domain administrator would like to set granular permissions on an organizational unit called Sales. He opened the properties of Sales OU and noticed that Security tab is not displayed. How can he resolve this issue? a. The trainee Windows domain administrator does not have Enterprise Admins membership. b. He needs to select Advanced Features in the View menu of Active Directory Users and Computers. c. Use Run as administrator command to launch Active Directory Users and Computers. d. Use the ADSI Edit to perform a low-level edit on the Sales OU.

He needs to select Advanced Features in the View menu of Active Directory Users and Computers

Which of the following hardware devices does a Generation 1 virtual machine emulate? (Choose all that apply.) a. IDE hard disk b. SCSI hard disk c. UEFI BIOS d. Serial ports

IDE hard disk SCSI hard disk Serial ports

Which of the following network transport must be used when creating a site link between two sites that belong to the same Active Directory Domain? a. IP b. SMTP c. X.500 d. X.400

IP

The TechSupport security group was granted permission to create and delete User objects in the domain through the Delegation Control wizard in Active Directory Users and Computers. John, a member of the said security group is using Windows 10 as management workstation. Upon sign-on, he couldn't find the Active Directory Users and Computers in the list of programs. What must be done to enable John to manage user objects in the domain? a. Re-run Delegation of control wizard on the domain. b. Run mmc.exe and add Active Directory Users and Computers snap-in from a remote server. c. Install Remote Server Administration Tools on Windows 10. d. Install Active Directory Users and Computers on Windows 10.

Install Remote Server Administration Tools on Windows 10

You are the local administrator of a standalone Windows Server 2016 computer. The Active Directory Domain Services has been successfully installed previously added. Which of the following cmdlet must be used to create the forest root domain on Windows Server 2016? a. New-ADDSForest b. Create-ADDSForest c. Install-ADDSForest d. Add-ADDSForest

Install-ADDSForest

To which of the following virtual switches can a host operating system connect? (Choose all that apply.) a. Internal b. External c. Public d. Private

Internal External

Which of the following command line tools use an import file to add user objects in Active Directory? [Choose two that apply]. a. Ldifde.exe b. Dsadd.exe c. Csvde.exe d. Net.exe

Ldifde.exe Csvde.exe

Which of the following Hyper-V features requires that your host operating system be joined to an Active Directory domain? (Choose all that apply.) a. Live migration b. Checkpoints c. Replication d. Quality of Service (QoS)

Live migration Replication

Which two small footprint installation options are available for Windows Server 2019? (Choose two answers.) a. Nano Server b. Microsoft Hyper-V Server c. Server Core d. Essentials

Nano Server Server Core

Which Hyper-V feature allows you to install a virtual machine within another virtual machine? a. Nested virtualization b. SLAT c. Checkpoints d. Hyper-V containers

Nested virtualization

Which of the following Windows PowerShell cmdlet can you use to set a static IP address on a newly-installed Server Core computer? a. Set-NetAdapter b. Set-IPAddress c. New-IPAddress d. Set-NetIPAddress e. New-NetIPAddress

New-NetIPAddress

Which of the following are hardware requirements for Hyper-V? a. 64GB of memory b. Two network interfaces c. Processor with Intel VT or AMD-V and SLAT d. A 32-bit or 64-bit processor

Processor with Intel VT or AMD-V and SLAT

What are the three Flexible Single Master Operations (FSMO) "domain-specific" roles assigned to the first domain controller installed in an Active Directory domain? a. RID master, PDC emulator, Schema master b. RID master, PDC emulator, Domain naming master c. RID master, PDC emulator, Global catalog server d. RID master, PDC emulator, Network time server e. RID master, PDC emulator, Infrastructure master

RID master, PDC emulator, Infrastructure master

What are the two Flexible Single Master Operations (FSMO) "forest-specific" roles assigned to the first domain controller installed in an Active Directory forest root domain? a. Schema master, Domain naming master b. Schema master, Services master c. Schema master, Global catalog server d. Schema master, LDAP emulator

Schema master, Domain naming master

Which of the following are included in the naming contexts or partitions of Active Directory? a. Schema, Configuration, LDAP b. Schema, Configuration, Global catalog c. Schema, Configuration, Domain d. Schema, Configuration. Kerberos

Schema, Configuration, Domain

You have successfully configured a Server 2016 Core called Server2 and added it to your lab domain. DNS service was installed in Server2 after adding it to the domain. Using a domain controller server called Server1, you connected to Server2 using DNS Manager console and you get a message saying "The server is unavailable. Would you like to add it anyway?" and selected Yes. You noticed that after adding Server2 in the DNS console, Server2 has red circular icon appended to it. What is the possible cause of this error? a. Server2's Windows firewall setting has blocked inbound traffic to its DNS service. b. Server2 is not a member of the Active Directory Domain. c. Server2 is not reachable on the network. d. Server2 is not enabled for zone transfer yet.

Server2's Windows firewall setting has blocked inbound traffic to its DNS service

Which Windows Server edition supports Windows Containers and up to two Hyper-V Containers? a. Essentials b. Standard c. Datacenter d. Storage Server

Standard

Which of the following Windows Server 2019 editions are licensed per processor core? (Choose all that apply.) a. Essentials b. Standard c. Datacenter d. Hyper-V Server

Standard Datacenter

Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices? a. Storage Spaces b. ReFS c. Storage Migration Service d. Storage Replicas

Storage Spaces

True or False. A forest trust relationship between two Active Directory domain forests is considered transitive. a. TRUE b. FALSE

TRUE

Which of the following occurs when you join a computer to an Active Directory domain? (Choose all that apply.) a. The Domain Users group is added to the local Users group b. A computer account is created within Active Directory, if one has not been prestaged c. The Domain Admins group is added to the local Administrators group d. The SAM database is replaced by the Active Directory database

The Domain Users group is added to the local Users group A computer account is created within Active Directory, if one has not been prestaged The Domain Admins group is added to the local Administrators group

A trainee, signed-in as a local administrator tried to promote a member server as the first domain controller in a child domain to an existing domain. The existing domain is connected to a lab network. After successfully installing the Active Directory Domain Services feature, he ran the "Install-ADDSDomain" cmdlet to create a child domain. He gets the following error message saying "Verification of user credential permissions failed. You must supply a user account name..." Please see the screenshot for your reference. What is the solution to resolve this error when creating a new child domain? a. The user must use the cmdlet Install-ADDSForest instead to create a child domain in the Active Directory network. b. The user must restart the Active Directory Domain Services in the domain controller found in the parent domain to refresh the service. c. The user must sign-in as an administrator with the permission to create a child domain in the Active Directory network. d. The user must use the cmdlet Install-ADDSDomainController instead to create a child domain in the Active Directory network.

The user must sign-in as an administrator with the permission to create a child domain in the Active Directory network

After importing a virtual machine template to create a new virtual machine, you should rename the new virtual machine. a. True b. False

True

Server Manager can be used to monitor and manage other Windows Server 2008 and later systems. a. True b. False

True

Server Manager is typically used to perform most post-installation tasks on a graphical Windows Server 2019 system. a. True b. False

True

Some software issues require that you modify the value of an entry within the Windows Registry to fix a system problem. a. True b. False

True

System environment variables apply to any user logged onto the system. a. True b. False

True

The Tab key can be used to auto complete a PowerShell cmdlet as you are typing it. a. True b. False

True

The Test-NetConnection cmdlet can be used to test network connectivity to a target computer. a. True b. False

True

The Windows Admin Center allows you to obtain a Windows PowerShell session within your Web browser. a. True b. False

True

The physical network interface used by an external virtual switch is not configured using IP. Instead, it uses the Hyper-V Extensible Virtual Switch protocol to allow virtual network interfaces attached to the external virtual switch to use the physical network interface. a. True b. False

True

To install a Windows Server 2019 virtual machine, you typically attach an ISO image file that contains the installation media to a virtual DVD drive within the virtual machine settings. a. True b. False

True

Virtual machine checkpoints are often used prior to making an important configuration change within a guest operating system, such as installing software or device drivers. a. True b. False

True

WDS can be used to install multiple physical or virtualized systems at the same time, provided those systems can boot from the network using PXE. a. True b. False

True

You can start the Windows Server Configuration Wizard within Server Core by running the sconfig.cmd command. a. True b. False

True

Which of the following is allowed by Windows Server running as Domain Controller when changing or converting Group Scopes? This is assuming group nesting between domains is not configured. [Choose two that apply]. a. Global group to Local group b. Domain local to Global c. Universal to Domain local d. Global to Universal

Universal to Domain local Global to Universal

Which of the following is not a question that should be asked when planning a Windows Server 2019 installation? a. What are the storage needs of the server? b. Who will be supporting the server? c. How many users are expected to connect to the server? d. What services will the server run?

Who will be supporting the server?

Which of the following management tools is not installed by default on Windows Server 2019? a. Server Manager b. MMC c. Windows PowerShell d. Windows Admin Center

Windows Admin Center

Complete the following netsh.exe command that will configure a domain controller to have an alternate DNS server: netsh interface ip name=Ethernet addr=192.168.0.4 index=2. a. new dns b. second dns c. alt dns d. add dns

add dns

Which of the following tools can be used to enable a security group to have permissions in administering selected objects in an organizational unit n Active Directory? a. mmc.exe b. cmd.exe c. dism.exe d. control.exe

mmc.exe

Which of the following commands must be executed to be able to manage the Active Directory Schema on a Windows domain controller? a. dcomcnfg schmmgmt.dll b. regsvr32 schemmgmt.dll c. regsvr32 schmmgmt.dll d. register schmmgmt.dll

regsvr32 schmmgmt.dll

You plan to install DNS on Windows Server 2016 using PowerShell. Which of the following can be used to include the DNS console for administering the DNS service? [Choose two that apply]. a. rsat-dns-console b. rsat-dns-server c. rsat-dns-tools d. -IncludeManagementTools

rsat-dns-server -IncludeManagementTools

Which of the following PowerShell constructs is best to use when you wish to perform a specific action based on the value of a single variable? a. if b. switch c. do...while d. for

switch

Which of the following commands may be used to start Hyper-V Manager? a. hyperv b. hyper-v c. virtmgmt.msc d. new-virtconsole

virtmgmt.msc


Set pelajaran terkait

Rosenthal NCE Practice Questions

View Set

Ch.27: Safety, security and emergency preparedness

View Set

BSG Quiz 1, BUS 490 BSG Simulation Quiz 1, BSG Quiz 1, BSG Chapter 1 Quiz

View Set

Cell Junctions, Cell Adhesion, and the Extracellular Matrix

View Set

History 202 Final Exam UTM Barber

View Set

Hill & Walton: A Survey of the Old Testament: Key Ideas Final Exam OT 1

View Set