Module 11 Review Quiz, Module 12 Review Quiz, Module 10 Review Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following performance counters can be used to identify jabbering hardware?

% Interrupt Time

What must you configure in IIS Manager to allow users to access a help desk ticketing system Web app using the URL https://www.sample.com/helpdesk? (Choose all that apply.)

-A helpdesk virtual directory -An HTTPS protocol binding

After a container is running, you cannot configure its contents until the container is stopped.

False

Block storage is a cheaper alternative to object storage on public cloud providers.

False

Committed memory refers to the memory that is used by the Windows kernel and device drivers.

False

Only schema version 1 certificate templates can be configured for auto-enrollment.

False

Performance baselines are typically created only after installing a new Windows Server 2019 system.

False

Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters.

False

The Linux Containers on the Windows (LCOW) feature of Windows Server 2019 allows you to run Linux containers only if Docker EE was obtained using the DockerMsftProvider Windows PowerShell module.

False

The Windows Subsystem for Linux (WSL) allows you to execute Web apps in a virtual machine on Windows Server 2019.

False

The docker command is also called the Docker daemon.

False

There are five event levels available in an event log: Information, Warning, Error, Audit Success, and Audit Failure.

False

There are no GPOs created in an Active Directory domain by default.

False

You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless.

False

In a continuous deployment scenario, which software creates a container or virtual machine on a cloud server to test the functionality of a new Web app version?

Build automation

Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?

Controlled folder access

What can you create in Event Viewer to display specific types of events from one or more event logs?

Custom view

Which of the following IIS configuration features is used to specify the default webpage or Web app file that a client views?

Default Document

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver?

Last Known Good Configuration (advanced)

You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?

Publish the software in the User Configuration

In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?

RADIUS server

A baseline is a set of performance information for a system during normal times of operation.

True

Each Linux container run on Windows Server 2019 using LCOW is automatically run as a Hyper-V container that executes on a Linux kernel provided by the LinuxKit component of Docker EE.

True

Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters.

True

Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain).

True

Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA.

True

Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default.

True

Many organizations store system documentation in help desk ticketing software.

True

Nano Server containers must be run as a Hyper-V container on Windows Server 2019.

True

Resource Monitor allows you to identify the storage devices and files that a single process is accessing.

True

Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem.

True

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization.

True

Websites on a Web server provide the front end for most Web apps.

True

You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings

True

You are tasked with deploying a private cloud in your organization that needs to host both Windows and Linux Web apps using a SaaS delivery model on a single Windows Server 2019 system. What technology should you configure on the Windows Server 2019 system?

WSL

Which of the following commands can be used to start the Apache Web server in a Linux container or WSL Linux distribution on a Windows Server 2019 system?

apachectl start

Which of the following Linux distributions are supported for use with WSL? (Choose all that apply.)

-Fedora -Ubuntu -OpenSUSE Leap -Debian GNU/Linux

Your organization develops a containerized Linux Web app that is run on a public cloud provider. To minimize cloud costs, a continuous deployment process is not used. Instead, Web app developers must add new versions of their Linux Web app to a container and test its functionality locally before running it on the public cloud provider. What could you configure on an existing Windows Server 2019 system to allow the Web app developers in your organization to test new versions of their containerized Linux Web app? (Choose all that apply.)

-Hyper-V -LCOW

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.)

-OU -Site -Domain

Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.)

-Read -Enroll -Autoenroll

Which two tools are commonly used to create performance baselines? (Choose two answers.)

-Performance Monitor -Data Collector Sets

Which of the following can be included in a data collector set? (Choose all that apply.)

-Performance counter -Event trace provider -Windows Registry key

Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.)

-Rogue processes -Memory leaks

Group Policy settings apply to which of the following objects? (Choose all that apply.)

-Users -Computers

Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?

8531

Which of the following actions can be performed to solve a performance problem? (Choose all that apply.)

All of the Above Stop and disable unnecessary services b. Move applications to other systems c. Add additional hardware d. Upgrade hardware devices with bus mastering versions

Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)

All of the Above WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. Group Policy is used to direct domain computers to a WSUS server for updates. Updates can be manually or automatically approved for distribution on a WSUS server. A WSUS server can be configured to remove updates from computers that have installed them.

Which section of a GPO contains the most security-related settings for the Windows operating system?

Computer Configuration, Windows Settings

What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?

Connection security rules

To which of the following groups should you assign NTFS/ReFS permissions for Web app content in order to provide anonymous user access?

IIS_IUSRS

Which of the following components represents a specific hardware device or software component that can be monitored?

Instance

On which part of the maintenance cycle do server administrators spend the most time?

Monitoring

Which of the following cloud delivery models uses containers exclusively to run Web apps?

PaaS

Which of the following is not included in a certificate?

Private key

Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization?

Right-click the process and click Create dump file

Which of the following commands can be used to display containers that are no longer running?

docker ps -a

Which command can you execute to create a container from the microsoft/iis container image that runs in the background and automatically maps port 80 in the container to a port above 32767 on the underlying operating system?

docker run -d -P microsoft/iis

Which docker command displays container images available on Docker Hub?

docker search

Which term refers to the process whereby a user or computer obtains a certificate from a CA?

enrollment


Set pelajaran terkait

Varcarolis: Chapter 17 Somatic Symptom Disorders

View Set

Information Systems: A manager's guide to harnessing technology: Chapter 2

View Set

Chapter 53: Assessment of Kidney and Urinary Function

View Set