Servers

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

T/F. By default, the only site created within a new forest does not contain any domain controller.

False

T/F. The System File Checker is useful in recovering system files that have been corrupted.

True

What is the term for programs and system software that can query WMI?

WMI consumers

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

What are the three main container objects within an Active Directory database.

OUs, Sites, and domains

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?

The IP addresses were configured manually.

T/F. The subnet masket connot be modified once a scope is created.

True

When using the Best Practices Analyzer (BPA) to verify server roles, what severity level indicates the role does not meet best practices and problems can be expected?

Error

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perfmorm a reverse lookup?

A PTR record

T/F. To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-Vhost of the virtual machine that is being replicated.

FALSE. To replicate a virtual machine, the target Hyper-V host must have replication enabled.

Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change?

Account

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so.

Which of the following statements regarding a domain functional level is accurate?

It represents the oldest Windows Server version that can be used as a domain controller.

T/F. Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

FALSE

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug external disk drives without using the Safely Remove Hardware option. What should Ivan do?

Disable file caching and flushing

Which type of virtual switch in Hyper-V can only have virtual machines connected to it?

Private

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?

The DNS server and DHCP server are in different domains.

T/F. Storage pinning is the process of planning hardware for a specific server within an organization.

TRUE

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario?

The checkpoint file that is used to track and reverse the changes will be deleted from the system.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completing, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers.

Which of the following organizations should consider using Azure Active Directory?

An organization that subscribes to Office 365 services

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS.

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

Configure passive screening

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide asolution?

Distribution groups

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E: VMS. Where will the virtual machine configuration files be stored?

E:\VMs\Virtual Machines

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server.

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Remote control of the server (RDP) is blocked. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use natively to access the server?

Windows Admin Center

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

sfc/scannow

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

A cloud-based server

What resource record type defines an IPv6 host address in DNS?

AAAA Record

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xsl, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Another group has the Deny box checked for Read access.

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Radha has changed the IP address for servery.zone1.com and updated the primary DNS server. She is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

Clear the DNS Server cache, and clear the DNS cache on the resolver.

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has physical connection to the network.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

Distributed File System (DFS) replication

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder?

Edit the Default Domain Policy object to enable auditing functionality

What is the term for domain and forest functions that must be coordinated from a single domain controller?

Flexible Single Master Operations (FSMO)

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need torestore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer but doesn't want it to affect other users. Which Registry root key should Lucida access to change the font size?

HKEY_CURRENT_USER

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-efective method of dealing with this issue?

Hiroshi should create site objects and specify timed intervals for replicationusing site link objects.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true?

Minisha is a member of the Enterprise Admins group in both organizations.

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?

NTFS is a journaling filesystem, while FAT32 is not.

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder.

Isabella configures three virtual machines, VMI, VM2. and VM3. on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

On VM2

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PnP)

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied because they do not save system state.

Rebecca is configuring a RAID with two storage devices. If she saves a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

RAID level 0

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do?

Remove the computer name SERVERX

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time. Which of the following folders should Danielle use to configure this option?

Reservations

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and thenclick New Mirrored Volume to create a RAID level 1 volume with two disks

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

Run these web applications in containers

Haruko is a system administrator. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Identify the option that can be used to create storage pools that include storage devices from different servers on a network

Storage Spaces Direct

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server?

Storage tiering

T/F. Access to shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions

TRU (Calling!)

What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

The file is decrypted and placed onto the FAT32 volume.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

The responding computer

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

The server will be dedicated to web services and accessed via the Internet.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Mugel creates a virtual machine with default settings?

The virtual machine will have 1 GB of memory.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes or permissions, and execute files, but cannot view file contents.

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host.

T/F. Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service.

True

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure.What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?

Two

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use?

Virtualization

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. She would like to test Linux applications on her workstation. Why should Eileen consider upgrading to Windows 10?

Windows 10 has Windows Subsystem for Linux

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task?

Windows PowerShell

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

Catelin creates a virtual machine template named Windows Server2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?

Petra.T will be allowed to log in to the system with cached credentials.


Set pelajaran terkait

Chapter 4. Adjustment, Financial Statment, and Financial Results

View Set

Exam Respiratory System 4 Physiology

View Set

Nissan Variable Compression Turbo Engine

View Set