Microsoft II Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When creating connection security rules, which authentication option would you typically use in an environment that includes computers unable to use the IPsec authentication methods available with Windows Firewall with Advanced Security? A. Request Authentication For Inbound And Outbound Connections B. Require Authentication For Inbound Connections And Request Authentication For Outbound Connections C. Require Authentication For Inbound And Outbound Connections D. Do Not Authenticate

A

Which Windows PowerShell cmdlet enables you to determine whether any printers installed on a print server are shared? A. Get-Printer B. Get-PrinterConfiguration C. Get-PrinterProperty D. Get-PrintServer

A

You have configured several Drive Maps preference items so that users targeted by the GPO can have mapped drives to make it easier for them to access shared folders on the network. These shared folders are all located on different file servers. Occasionally, one of the file servers is taken down for maintenance, and you want the user to be able to use the remaining mapped drives when this occurs. Which option on the Common tab of the Drive Maps preference item can you configure to allow this? A. Stop Processing Items In This Extension If An Error Occurs B. Run In Logged-on User's Security Context (User Policy Option) C. Remove This Item When It Is No Longer Applied D. Apply Once And Do Not Reapply

A

You have used Windows PowerShell to create two 5 TB data volumes on your file server. The total free space on all connected physical disks is only 2 TBs. What feature of Storage Spaces makes this possible? A. Thin provisioning B. Fixed provisioning C. Mirror resiliency D. Parity resiliency

A

You want to install a new printer on a print server running Windows Server 2012 R2. The print device uses the HP LaserJet 6L PS Class Driver printer driver and requires a standard TCP/IP printer port. You used Notepad to create a text file named install.ps1 that contains the following Windows PowerShell commands: Add-PrinterPort -Name "TCP66" -PrintHostAddress "172.16.11.66" Add-Printer -Name "Printer66" -DriverName "HP LaserJet 6L PS Class Driver" ` -ShareName "Printer66" -PortName "TCP66" You open a Windows PowerShell prompt on the local print server and run the preceding script, but it generates an error. Which of the following could be the cause of the error? (Choose all that apply.) A. The required printer driver is not installed on the print server. B. There is a syntax error in the first line of the script. C. There is a syntax error in the second line of the script. D. There is a syntax error in the third line of the script.

A B

What steps can you take to make your iSCSI storage environment more secure? (Choose all that apply.) A. Enable and configure CHAP and Reverse CHAP on your iSCSI targets. B. Deploy a RADIUS server and configure your iSCSI initiators to use it for authentication. C. Configure IPsec tunnel mode addresses for the initiator. D. Configure your iSCSI targets to allow connections from initiators with an IQN of IQN:*.

A B C

Which of the following scenarios might be appropriate for implementing DHCP failover in hot-standby mode? (Choose all that apply.) A. Your organization has a hub-and-spoke site topology. B. You want to use the DHCP server in your data center as a standby in case a DHCP server at one of your remote branch offices goes offline. C. Your organization has a hub-and-spoke site topology, but you have a limited budget for deploying additional servers as standbys for existing servers in your environment. D. Your organization has only one physical site.

A B C

Which of the following storage-management utilities is deprecated as of Windows Server 2012 R2? (Choose all that apply.) A. DiskPart B. DiskRAID C. The Disk Management MMC snap-in D. WMI

A B C

Which of the following types of directory objects can you not create using ADAC? (Choose all that apply.) A. Sites B. Domains C. Trusts D. Groups

A B C

You right-clicked an OU in the GPMC console tree that contains computers and then selected the Group Policy Update menu option from the context menu. The Remote Group Policy Update Results dialog box indicates Completed, and no error message has been displayed. You later discover that at least one of the Computer Configuration policies in the GPO linked to the OU was not refreshed on the computers in the OU. What could be the cause of this failure? (Choose all that apply.) A. The necessary firewall ports on the targeted computers have not been opened to enable a remote refresh of Group Policy. B. The GPO that should be linked to the OU has become unlinked from the OU. C. The Computer Configuration portion of the GPO linked to the OU has been disabled. D. The Group Policy Remote Update Firewall Ports Starter GPO has been deleted from the domain.

A B C

Which of the following is not true when deploying Storage Spaces with Failover Clustering? (Choose all that apply.) A. A minimum of two physical disks is required. B. Physical disks must be SATA disks. C. Physical disks must pass the failover cluster validation tests. D. Thin provisioning must be used.

A B D

Which of the following tasks must you perform to be able to manage print servers running Windows Server 2012 R2 from a single workstation running Windows 8.1? (Choose all that apply.) A. Install RSAT for Windows 8.1 on the workstation and enable the necessary remote-management tools. B. Make sure Remote Management is enabled on the print servers. C. Add the print servers to the server pool in Server Manager. D. Add the print servers to the console tree in Print Management.

A B D

Which of the following is true concerning DHCP failover in Windows Server 2012 and Windows Server 2012 R2? (Choose all that apply.) A. DHCP failover only supports using a maximum of two DHCP servers. B. DHCP failover is supported for both IPv4 and IPv6 scopes and subnets. C. DHCP failover can be implemented in two ways: load-balance mode or hotstandby mode. D. DHCP failover requires that the DHCP servers be domain members and authorized in Active Directory.

A C

Although performing checkpoints is not recommended in production environments, they are sometimes used. Which of the following checkpoint actions should you never take? (Choose all that apply.) A. Performing checkpoints on virtualized domain controllers B. Performing checkpoints on a virtual machine just before applying a critical software update to the guest operating system C. Performing checkpoints on virtualized workloads that use data distributed across multiple databases D. Restoring checkpoints older than 30 days on domain-joined virtual machines

A C D

Which of the following tasks cannot be performed on a virtual disk by using either Server Manager or Windows PowerShell? A. Extending the virtual disk B. Shrinking the virtual disk C. Detaching the virtual disk D. Deleting the virtual disk

A C D

You want to create a firewall rule that blocks inbound traffic to %windir%regedit.exe on the computer. Which type of rule can you use to do this? (Choose all that apply.) A. Program rule B. Port rule C. Predefined rule D. Custom rule

A D

In which of these scenarios might you try to optimize a virtual hard disk by compacting, expanding, shrinking, or merging it? A. When the disk is associated with a virtual machine that has checkpoints B. When you need to free up storage space on the host C. When the disk is associated with a virtual machine that has replication enabled D. When the disk is associated with a chain of differencing disks

B

What action does the following command perform? Set-DhcpServerv4OptionValue -Router 10.10.0.1 -ScopeId 10.10.20.0 A. Configures a DHCP server option that assigns the address 10.10.0.1 as the default gateway on any DHCP client whose IPv4 address is on the 10.10.20.0 subnet B. Configures a DHCP scope option that assigns the address 10.10.0.1 as the default gateway on any DHCP client whose IPv4 address is on the 10.10.20.0 subnet C. Configures a DHCP server option that assigns the address 10.10.0.1 to a router on the 10.10.20.0 subnet D. Configures a DHCP scope option that assigns the address 10.10.0.1 to a router on the 10.10.20.0 subnet

B

What do you need to do or use for Windows computers on an IPv4-only network to be able to communicate with Windows computers on a different network that is IPv6-capable? A. You need to do nothing because Windows computers automatically assign IPv6 addresses to their LAN interfaces using stateless address autoconfiguration. B. You need to deploy Windows Server 2012 or Windows Server 2012 R2 as an ISATAP router and use it to forward traffic between the IPv4-only and IPv6- capable networks. C. You need to deploy Windows Server 2012 or Windows Server 2012 R2 as a Teredo server and use it to forward traffic between the IPv4-only and IPv6-capable networks. D. You need to deploy Windows Server 2012 or Windows Server 2012 R2 as a DHCPv6 server and use it to assign global IPv6 addresses to the computers on the IPv4-only network.

B

When you use Show-Command to open a properties page for a cmdlet, what does an asterisk (*) mean when you find one beside a parameter? A. The parameter is optional. B. The parameter is mandatory. C. The parameter does not apply to that cmdlet. D. The parameter can be specified only from the command line.

B

Which Windows PowerShell cmdlet can you combine with New-ADUser to bulk-create new user accounts? A. Get-ADUser B. Import-Csv C. Set-ADAccountPassword D. Where-Object

B

Which Windows PowerShell cmdlet can you use to configure the default storage location for virtual machine files on a Hyper-V host? A. Get-VMHost B. Set-VMHost C. Add-VMStoragePath D. Set-VM

B

Which approach to ensuring DHCP availability involves dividing up the IP address pool of a scope between two DHCP servers, typically using the ratio 80:20? A. Server cluster B. Split scope C. Standby server D. DHCP failover

B

Which of the following Active Directory administration tasks can you not perform using ADAC? (Choose all that apply.) A. Raising the forest functional level B. Delegating administrative control over an OU and the objects it contains C. Enabling the Active Directory Recycle Bin D. Configuring fine-grained password policies

B

Which of the following Windows PowerShell cmdlets produces output that you can use to determine the LUN mapping for an iSCSI target? A. Get-IscsiConnection B. Get-IscsiServerTarget C. Register-IscsiSession D. Get-IscsiTarget

B

Which of the following is not true about IPv6 on Windows Server 2012 and Windows Server 2012 R2? A. Windows Server 2012 and Windows Server 2012 R2 have a dual IP layer TCP/IP stack that supports both IPv4 and IPv6. B. You can disable IPv6 on all interfaces by editing the registry on a Windows Server 2012 or Windows Server 2012 R2 computer. C. You can use Windows Server 2012 and Windows Server 2012 R2 as a DHCPv6 server for stateless address autoconfiguration. D. You can use Windows Server 2012 and Windows Server 2012 R2 as an ISATAP router.

B

Which two cmdlets can you use together to create a new GPO and link it using a single command? A. Get-StarterGPO and New-GPO B. New-GPO and New-GPLink C. New-GPO and Set-GPLink D. Get-GPO and New-GPLink

B

You modify the install.ps1 script from the previous question so that it no longer generates an error when you run it. After running the script, you use Print Management to verify that the printer driver, printer port, and printer have all been installed successfully and that you can print a test page to the new printer. Unfortunately, your users indicate that they cannot print to the printer. What might be the reason for this? A. You haven't yet deployed a printer connection to your users. B. The printer has not yet been shared. C. The print device has not yet been turned on. D. There is a job stuck in the print queue for the printer.

B

What commands can you use to find Windows PowerShell cmdlets for managing Active Directory groups? (Choose all that apply.) A. Get-Command -Module ActiveDirectory B. Get-Command *ADGroup* C. Get-Help *ADGroup* D. Get-Help ActiveDirectory

B C

Which of the following is not true concerning Group Policy preferences? (Choose all that apply.) A. You cannot configure preferences in local GPOs. B. Preferences take precedence over policies when they conflict. C. When creating a new preference item, selecting the Create action deletes and re-creates the preference item for the targeted user or computer. D. You can press F3 to select a variable when configuring a field of a preference item in which a variable can be used.

B C

Why are pass-through disks no longer recommended for Hyper-V virtual machines? (Choose all that apply.) A. Pass-through disks are no longer being manufactured and therefore are difficult to obtain. B. Tests have demonstrated that fixed-size virtual hard disks perform almost as well as pass-through disks and also provide the flexibility benefits of virtual hard disks. C. Tests have demonstrated that dynamically expanding virtual hard disks perform almost as well as pass-through disks and also provide the flexibility benefits of virtual hard disks. D. Configuring a virtual machine to use a pass-through disk is a complex task that might introduce errors.

B C

Which of the following might be true if the primordial pool is not visible in the Storage Pools tile on the Storage Pools subpage of the File and Storage Services page of Server Manager? (Choose all that apply.) A. A new storage pool has been created on the server. B. The server has only one connected physical disk (the boot disk). C. The physical disks are already allocated to storage pools on the server. D. The physical disks already have volumes on them.

B C D

Which of the following are best practices for implementing fine-grained password policies in a domain? (Choose all that apply.) A. Assign fine-grained password policies to users instead of groups. B. Ensure that each fine-grained password policy has its own unique preference value. C. Ensure that each group has at least one fine-grained password policy assigned to it. D. Make sure you have configured a fallback policy for the domain. This can be either a fine-grained password policy that has a higher precedence value than any other policy or the password and account lockout settings defined in the Default Domain Policy GPO.

B D

Which of the following statements is not true regarding firewall profiles in Windows Firewall with Advanced Security? (Choose all that apply.) A. The domain profile is automatically applied to any network connection that Windows identifies as having a network location type of domain. B. Only one firewall profile can be active at any given time. C. The default behavior of the domain profile is to block inbound connections unless those connections are explicitly allowed by firewall rules. D. To display the currently active settings for the domain profile on the local computer, you can use the Get-NetFirewallProfile cmdlet with the -PolicyStore PersistentStore parameter.

B D

You want to improve the reliability of print services in your environment by running the printer driver for each printer installed on your print server in a separate process that is isolated from the Print Spooler service on the server. Which set of requirements will enable you to achieve this goal? (Choose all that apply.) A. The printer drivers can be of the v3 type as long as the driver's INF file indicates that the driver supports driver isolation. After the drivers have been installed, you must use Print Management to configure Set Driver Isolation to the value Shared. B. The printer drivers can be of the v3 type as long as the driver's INF file indicates that the driver supports driver isolation. After the drivers have been installed, you must use Print Management to configure Set Driver Isolation to the value Isolated. C. The printer drivers must be of the v4 type. After the drivers have been installed, you must use Print Management to configure Set Driver Isolation to the value Shared. D. The printer drivers must be of the v4 type. After the drivers have been installed, you must use Print Management to configure Set Driver Isolation to the value Isolated.

B D

1. In an environment in which the iSCSI Target Server role service of Windows Server 2012 R2 has been deployed, what might the following string mean? iqn.1991-05.com.microsoft:srv4-finance-target A. This is the IQN of the iSCSI initiator on a computer named srv4. B. This is the IQN of the iSCSI initiator on a computer named finance. C. This is the IQN of an iSCSI target on a target portal named srv4. D. This is the IQN of an iSCSI target on a target portal named finance.

C

In a Windows Server-based DNS infrastructure in which DNSSEC has been implemented, where is the validation of the response to a query performed? A. On an authoritative DNS server in the forest root domain B. On an authoritative DNS server in a child or tree domain C. On a recursive DNS server that is not authoritative for the zone being queried D. On the client computer issuing the name query

C

The IPv6 address assigned to an interface has a prefix identifier of FE80::/64. What type of address is it? A. Global address B. Unique local address C. Link-local address D. Multicast address

C

What does the -Force parameter do in the following Windows PowerShell command? Set-ADAccountPassword -Reset -NewPassword (ConvertTo-SecureString -AsPlainText "Pa$$w0rd" -Force) A. It forces the specified password to be converted from plain text to a secure string. B. It forces the specified password to be encrypted. C. It suppresses the confirmation prompt that the user normally would have to respond to when performing this action. D. It forces the user to respond to a confirmation prompt when performing this action.

C

What is the minimum number of physical disks required for a storage pool that will be used to provision resilient volumes for a failover cluster consisting of two file servers? A. One B. Two C. Three D. Four

C

When you want to implement DNSSEC in an Active Directory environment in which all DNS servers are domain controllers and use only Active Directory-integrated zones, which of the following steps in the DNSSEC deployment process is not correct? A. Begin by introducing Windows Server 2012 or Windows Server 2012 R2 domain controllers into your environment. B. After deciding which DNS zone to implement DNSSEC on, sign the zone. C. Use Robocopy.exe to replicate the private zone signing keys to all domain controllers hosting the zone. D. Use IPsec to protect the last mile between the nonvalidating DNS client and its local DNS server.

C

Which Windows PowerShell cmdlet can you use to display the address information for an interface? A. Ipconfig B. Get-NetAdapter C. Get-NetIPAddress D. Get-NetIPInterface

C

Which Windows PowerShell cmdlet can you use to enable the Active Directory Recycle Bin? A. Set-ADForestMode B. Enable-ADRecycleBin C. Enable-ADOptionalFeature D. New-ADFineGrainedPasswordPolicy

C

Which Windows PowerShell cmdlet can you use to unshare a printer that is currently shared? A. Set-PrintConfiguration B. Set-PrinterProperty C. Set-Printer D. Get-Printer

C

Which cmdlet can you use to disable a binding on a network adapter? A. Get-NetAdapterBinding B. Remove-NetAdapterBinding C. Disable-NetAdapterBinding D. Disable-NetAdapter

C

Which edition and installation option of Windows Server 2012 R2 are the best choices for deploying Hyper-V hosts in a data center environment? A. Standard edition on Server Core B. Standard edition on Server With A GUI C. Datacenter edition on Server Core D. Datacenter edition on Server With A GUI

C

Which of the following profiles should you select when using the New Shares Wizard to create a share for storing Hyper-V virtual machine files on the network? (Choose all that apply.) A. SMB Share - Quick B. SMB Share - Advanced C. SMB Share - Application D. NFS Share

C

You have two firewall rules configured on the computer as follows: Rule A explicitly blocks outbound traffic from the svchost.exe process running on the computer. Rule B explicitly allows outbound traffic from the svchost.exe process running on the computer. In addition, the outbound default rule is set to Block. The svchost.exe process running on the computer attempts to send a packet to another computer on the network. Which answer best describes what will happen? A. The packet will be allowed because rule B has a higher priority than rule B. The packet will be blocked because rule B has a higher priority than rule C. The packet will be blocked because rule A has a higher priority than rule D. The packet will be blocked because the outbound default rule is set to Block.

C

Which of the following is not true concerning checkpoints? (Choose all that apply.) A. Performing checkpoints creates point-in-time images of the virtual machine to which you can return later if needed. There is no interruption to running virtual machines when checkpoints are performed on them. B. When you apply a checkpoint, any unsaved data in the virtual machine will be lost. C. You can perform checkpoints only when the virtual machine is stopped. D. Exporting checkpoints is not supported in Hyper-V.

C D

Which of the following nodes in the console tree of Print Management allows you to install new printer drivers on a print server? (Choose all that apply.) A. The Print Management node B. The Print Servers node C. A node representing a print server D. The Drivers node beneath a node representing a print server

C D

You want to use IPsec to protect communications between a server and computers on a specific subnet of your network. Which type of connection security rule can you create to do this? (Choose all that apply.) A. Isolation rule B. Authentication exemption rule C. Server-to-server rule D. Custom rule

C D

Diffie-Hellman Group 14 is an example of what? A. An IPsec authentication method B. An IPsec data-integrity algorithm C. An IPsec data-encryption algorithm D. An IPsec key-exchange algorithm

D

If the recycled object lifetime for a directory object has expired, what state is the object in? A. Live B. Deleted C. Recycled D. Removed

D

What action does the following command perform? Backup-GPO -All -Path \\HOST6\GpoBackups A. The command backs up the GPO named All to the C:\GpoBackups folder on HOST6. B. The command backs up the GPO named All to the GpoBackups share on HOST6. C. The command backs up all GPOs to the C:\GpoBackups folder on HOST6. D. The command backs up all GPOs to the GpoBackups share on HOST6.

D

What feature of ADAC enables you to quickly access the last three containers you accessed? (Choose all that apply.) A. Column Explorer B. Navigation pane C. Navigation nodes D. MRU list

D

What node should you select in the console tree of the GPMC to view the current status of SYSVOL replication as it relates to Group Policy in a domain? A. The root node named Group Policy Management B. The node named Forest: <forest_root_domain> C. The node named Domains D. The node named <domain_name>

D

Which Windows PowerShell cmdlet can you use to view the health status for Storage Spaces on your file server? A. Get-StoragePool B. Get-VirtualDisk C. Get-PhysicalDisk D. Get-StorageSubSystem

D

Which of the following cannot be used as a targeting item for preference item-level targeting? A. MAC Address Range B. Organizational Unit C. Registry Match D. Desktop Computer

D

Which of the following is not a correct explanation of a DNSSEC term or concept? A. DNSKEY resource records contain the public keys for a particular zone. B. Only zones that are authoritative can be signed. C. The key signing key (KSK) is used to sign all of the DNSKEY records at the root of the zone. D. When zone data is updated by a client sending a DNS dynamic update to an authoritative DNS server, the entire zone must be re-signed.

D

Which of the following is not true concerning virtual network adapters? A. Each virtual machine can have up to 12 virtual network adapters installed in it. B. Each virtual network adapter can be configured with either a static MAC address or a dynamic MAC address. C. Each virtual network can be assigned a unique VLAN channel. D. Virtual switches on a Hyper-V host can be connected to a wireless network adapter on the host system.

D

You have created a flat OU structure for your domain that has only top-level OUs and no child OUs. Each department's desktops, laptops, and users are contained in different OUs. What is the main reason why this design is a poor choice when it comes to implementing Group Policy for your environment? A. It will be difficult to manage Group Policy because of the large number of GPOs you will need. B. It will be difficult to delegate Group Policy because of the large number of GPOs you will need. C. It will be difficult to manage Group Policy because you won't be able to make effective use of Group Policy inheritance. D. It will be difficult to delegate Group Policy because you won't be able to make effective use of Group Policy inheritance.

D

You have three virtual machines running on a Hyper-V host that has 16 GBs of physical memory. The guest operating system installed in all three virtual machines is Windows Server 2008 R2, and none of the virtual machines is a file server. Dynamic Memory is enabled on all three machines and is configured as follows: ■■ VM-1 has 1 GB minimum RAM, 4 GBs maximum RAM, and 20 percent memory buffer. ■■ VM-2 has 2 GBs minimum RAM, 8 GBs maximum RAM, and 30 percent memory buffer. ■■ VM-3 has 1 GB minimum RAM, 6 GBs maximum RAM, and 100 percent memory buffer. Over time, you find that the performance of VM-1 and VM-2 is becoming sluggish. Why? A. The minimum RAM assigned to VM-1 is probably too low. B. The maximum RAM assigned to VM-2 is probably too high. C. The memory buffer for both VM-1 and VM-2 is probably too low. D. The memory buffer for VM-3 is probably too high.

D

You want to enable DHCP Guard on a virtual network adapter on virtual machine SRV-B running on host HOST4. To do this, you run the following command: Set-VMNetworkAdapter -ComputerName HOST4 -VMName SRV-B -DhcpGuard:$true Unfortunately, running this command returns the following error: Set-VMNetworkAdapter : Cannot bind parameter 'DhcpGuard'. Cannot convert value "True" to type "Microsoft.HyperV.PowerShell.OnOffState". Error: "Invalid cast from 'System.Boolean' to 'Microsoft.HyperV.PowerShell.OnOffState'." At line:1 char:67 + Set-VMNetworkAdapter -ComputerName HOST4 -VMName SRV-B -DhcpGuard:$true + ~~~~~ + CategoryInfo : InvalidArgument: (:) [Set-VMNetworkAdapter], ParameterBindingException + FullyQualifiedErrorId : CannotConvertArgumentNoMessage,Microsoft.HyperV.PowerShell.Commands. SetVMNetworkAdapterCommand What is the reason for this error? A. The virtual network adapter does not support DHCP Guard. B. You forgot to include the -VMName parameter in your command to specify which virtual network adapter you want to configure on the virtual machine. C. You should have specified -DhcpGuard ok instead of -DhcpGuard:$true in your command. D. You should have specified -DhcpGuard 1 instead of -DhcpGuard:$true in your command.

D

You want to use a Server Core installation of Windows Server 2012 R2 as a Hyper-V host. The server has been joined to an Active Directory domain and resides in yourdata center. Because you do not yet feel confident managing servers from the command line, you want to manage the host using the Hyper-V Manager snap-in. Given that security is a concern and you also want to keep the servicing overhead low for your servers while managing them conveniently, which of the following would be the best approach for you to pursue? A. Log on to the local console of the server, type powershell at the command prompt, and type Install-WindowsFeature -Server-Gui-Mgmt-Infra -Restart to convert your Server Core installation to a Minimal Server Interface installation. Now log on again to the local console of the server and launch the Hyper-V Manager snap-in to manage the Hyper-V host and its virtual machines. B. Enable Remote Desktop on the server and configure it to allow only remote clients that use Network Level Authentication to connect to the server. Now log on to an administrator workstation running Windows 8.1, use Remote Desktop Connection to connect to the remote host, and manage the host from your workstation. C. Log on to the local console of the server, type powershell at the command prompt, and type Install-WindowsFeature -Server-Gui-Mgmt-Infra -Restart to convert your Server Core installation to a Minimal Server Interface installation. Enable Remote Desktop on the server and configure it to allow only remote clients that use Network Level Authentication to connect to the server. Now log on to an administrator workstation running Windows 8, use Remote Desktop Connection to connect to the remote host, and manage the host from your workstation. D. Install the RSAT for Windows 8 on an administrator workstation running Windows 8, launch the Hyper-V Manager snap-in, connect to the remote host, and manage the host from your workstation

D

CH 7

GO!


Set pelajaran terkait

Architecture in the Global Context Review 1

View Set