All study guides

Ace your homework & exams now with Quizwiz!

17. Which of the following organizations should consider using Azure Active Directory? a. An organization that subscribes to Office 365 services b. An organization that has a substantially onsite workforce c. An organization that uses IIS as a web server d. An organization that deploys Internet accessible services, such as FTP or DNS

a. An organization that subscribes to Office 365 services

22. You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next? a. Change the boot order in the BIOS. b. Insert the DVD after turning on your computer. c. Copy the ISO image to a bootable USB drive. d. Download Burnaware or Rufus.

a. Change the boot order in the BIOS.

10. Which of the following statements about directory partitions is true? a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain. b. The largest section of the Active Directory database is the configuration partition. c. Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships. d. If any change is made to a configuration partition, the change is also replicated in the schema partition.

a. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

14. Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space? a. Data Execution Prevention b. Processor Scheduling c. Flushing d. Windows Registry

a. Data Execution Prevention

16. Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do? a. Disable file caching and flushing b. Enable file caching and flushing c. Enable file caching and disable flushing d. Disable file caching and enable flushing

a. Disable file caching and flushing

9. Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true? a. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL. b. SERVERX is also a domain controller and has the Active Directory Domain Services role installed. c. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443. d. Jenaro should avoid modifying the local computer's trusted host settings.

a. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

11. Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision? a. Deion chose Generation 2 in the previous step. b. Deion intends to use this virtual machine in a nested virtualization configuration. c. Deion allocates 1024 MB of startup memory, which is sufficient to run most operating systems. d. Deion intends to run Windows Server 2019 on this virtual machine.

b. Deion intends to use this virtual machine in a nested virtualization configuration.

1. Storage pinning is the process of planning hardware for a specific server within an organization. a. True b. False

b. False

11. Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue? a. Hiroshi should create separate domains for each location to avoid the need for replication. b. Hiroshi should create site objects and specify timed intervals for replication using site link objects. c. Hiroshi should reduce the number of domain controllers to just one per physical location. d. Hiroshi should remove all domain controllers and have only one domain controller for the domain.

b. Hiroshi should create site objects and specify timed intervals for replication using site link objects.

24. What is the term for programs and system software that can query WMI? a. WMI infrastructure b. WMI consumers c. WMI providers d. WMI classes

b. WMI consumers

20. Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? a. Windows Admin Center b. Microsoft Management Console c. Windows Server Catalog d. Windows Server Configuration Wizard

c. Windows Server Catalog

16. Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10? a. Windows 10 automatically encrypts Linux containers. b. Windows 10 provides Server Core and Nano Server options. c. Windows 10 has the Windows Server Azure Network Adapter. d. Windows 10 has Windows Subsystem for Linux.

d. Windows 10 has Windows Subsystem for Linux.

17. Which of the following is a requirement for using Storage Spaces Direct? a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. b. More than 20 servers must be available. c. The number of SSDs used should not be more than one. d. The servers should be from different Active Directory domains.

a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.

23. Which printer server configuration task is performed before shared printers are added within the Print Management tool? a. Add manufacturer-supplied printer drivers for the associated print device b. Change the printer name, location, and comment c. Render print jobs on client computers d. Deploy with Group Policy

a. Add manufacturer-supplied printer drivers for the associated print device

11. Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose? a. Advanced b. Security c. Drivers d. Port

a. Advanced

18. Which of the following statements is true of the ownership of a file or folder? a. An administrator can take ownership of a file or folder without being granted the permission to do so. b. The account that creates a file or a folder gets its ownership only when the administrator grants ownership to that account. c. Ownership of individual files and folders cannot be transferred by anyone with the Take ownership permission. d. The owner of a file or folder cannot modify all the permissions for that file or folder.

a. An administrator can take ownership of a file or folder without being granted the permission to do so.

13. Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file? a. Another group has the Deny box checked for Read access. b. The Developer group restricts Pavel's ability to view the file. c. The Project Manager group restricts Pavel's ability to view the file. d. The group permissions override permissions granted to Pavel's user account.

a. Another group has the Deny box checked for Read access.

8. Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers? a. By using a WMI filter b. By using the Security Filtering option c. By setting Group Policy preferences d. By modifying Software Settings under Group Policy

a. By using a WMI filter

27. Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future? a. Configure passive screening b. Configure active screening c. Enable the encrypt attribute d. Enable the archive attribute

a. Configure passive screening

26. Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage? a. Configuring user quota b. Configuring folder quota c. Configuring active screening d. Configuring passive screening

a. Configuring user quota

15. Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish? a. Create several thin-provisioned virtual disks b. Create several thick-provisioned virtual disks c. Create several fixed-provisioned virtual disks of combined capacity smaller than the storage pool d. Create several virtual disks of combined capacity smaller than the storage pool

a. Create several thin-provisioned virtual disks

15. Asher, a system administrator, wants to run containers on Windows Server 2019. He chooses to install Docker using the Windows containers component. Which of the following is a service that will help Asher manage and run Docker containers on the server? a. Docker daemon b. Docker client c. Docker Hub d. DockerProvider

a. Docker daemon

19. Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected? a. Document List b. Properties c. All Printers d. Cancel All Documents

a. Document List

21. Emory install the WSL feature on a Web server. Next, she installs an Ubuntu Linux distribution and creates a new Linux user account, EmoryJ. She logs into the Ubuntu system using this user account. Which of the following is true of this scenario? a. Emory can use the EmoryJ user account to run administrative commands as the root user. b. By default, EmoryJ is assigned the Administrator or super user of the Linux system. c. Emory can use the password assigned to EmoryJ to log into the Linux system as the super user. d. By default, each administrative command should be prefixed with the su command.

a. Emory can use the EmoryJ user account to run administrative commands as the root user.

11. Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. The files are stored in a Web server on a platform managed by a cloud service provider. Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app? a. FTP Server b. Web Server Common HTTP Features c. Web Server Performance d. IIS Management Tools

a. FTP Server

12. Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks? a. Hire the services of a third-party Certification Authority b. Configure the Block Inheritance setting at OU-level GPOs c. Run the gpupdate /force command in a Command Prompt window. d. Run the gpresult /r command in Windows PowerShell.

a. Hire the services of a third-party Certification Authority

22. Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue? a. IQN is not present in the access server list. b. CHAP authentication is not enabled. c. DSM is not be added to the system. d. JBOD is not enabled in the system.

a. IQN is not present in the access server list.

16. Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead? a. Install a WINS server b. Restart the DNS Server c. Configure a default forwarder d. Configure a conditional forwarder

a. Install a WINS server

12. You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select? a. LAN routing b. Demand-dial connections c. NAT d. Dial-up access

a. LAN routing

23. Which of the following is a component that enables users to search and locate a shared folder in the Active Directory? a. LDAP b. RAP c. SMB d. NFS

a. LDAP

22. By default, where are updates synchronized from in WSUS? a. Microsoft Update servers on the Internet b. The Windows Internal Database c. The specified Microsoft SQL Server d. Windows Server Update Services

a. Microsoft Update servers on the Internet

15. Which of the following is the default format used to store documents received by the GDI API for modern print devices? a. NT EMF b. GDI2XPS c. RAW (FF auto) d. RAW (FF appended)

a. NT EMF

5. Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router? a. Next Generation Firewall b. Last mile technology c. Demarcation point d. Point-to-Point Protocol over Ethernet (PPPoE)

a. Next Generation Firewall

28. Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of? a. Operating system settings b. The entire system c. Virtual hard disk files d. Boot and recovery volumes

a. Operating system settings

18. Several users access the same shared printer in Lia's organization. A colleague tells her that the paper tray needs to be refilled. She uses the Printer menu to manage the print jobs and refill the paper tray. Which option do you think she would have chosen in the Printer menu if the documents within the print queue resumed printing after the refilling of the paper tray? a. Pause Printing b. Cancel All Documents c. Pause d. Restart

a. Pause Printing

10. While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected? a. Print Server b. Internet Printing c. LPD Service d. Shared Printer

a. Print Server

5. Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? a. RAID level 0 b. RAID level 1 c. RAID level 2 d. RAID level 5

a. RAID level 0

21. Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario? a. Remote Desktop Protocol b. Password Authentication Protocol c. Point-to-Point Tunneling Protocol d. Layer Two Tunneling Protocol

a. Remote Desktop Protocol

7. Identify the process that coverts the documents within the spool folder to a format understandable by the print device. a. Rendering b. Print job c. Spooling d. Print queue

a. Rendering

17. Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX. a. Repository b. RequiredVersion c. preview d. DockerProvider

a. Repository

13. How do you create a RAID level 1 volume with two disks in the Disk Management tool? a. Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks b. Right-click on the disk that you want to configure as a RAID volume and then click New Spanned Volume to create a RAID level 1 volume with two disks c. Right-click on the disk that you want to configure as a RAID volume and then click New Striped Volume to create a RAID level 1 volume with two disks d. Right-click on the disk that you want to configure as a RAID volume and then click Shrink Volume to create a RAID level 1 volume with two disks

a. Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks

25. Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation. a. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button. b. Right-click the volume, click Properties, highlight the Tools tab, and click the Check button. c. Write the "Repair-Volume-DriveLetter F -Scan" command in Windows PowerShell. d. Write the "Optimize-Volume -DriveLetter" command in Windows PowerShell.

a. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.

21. Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue? a. SERVERA does not have a NetBIOS name record on any WINS server. b. Christopher has not set up replication. c. The user computer is connect to the LAN but not to the Internet. d. The UNC syntax entered is incorrect and is missing arguments.

a. SERVERA does not have a NetBIOS name record on any WINS server.

11. Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. When configuring the remote access server, which of the following is Lashonda most likely to do? a. She will select the Demand-dial connections service. b. She will select the LAN routing service. c. She will install the Web Application Proxy role service. d. She will select the Dial-up access service.

a. She will select the Demand-dial connections service.

14. What option should you use on a printer's Advanced properties page if pages from different jobs are mixed? a. Start printing after last page is spooled b. Print spooled documents first c. Print directly to the printer d. Enable advanced printing

a. Start printing after last page is spooled

16. Identify the option that can be used to create storage pools that include storage devices from different servers on a network. a. Storage Spaces Direct b. A combination of hard disks and SDDs c. A thin-provisioning virtual disk d. The primordial storage pool

a. Storage Spaces Direct

26. Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied? a. The Profile pane b. The Action pane c. The Rule Type pane d. The Protocol and Ports pane

a. The Profile pane

27. The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access? a. The client programs are not using the non-standard port number used by the network service. b. The network service might have failed to start when the client systems were requesting the service. c. The network service is not responding to the requests from a local machine. d. There were other client systems that were accessing the network service.

a. The client programs are not using the non-standard port number used by the network service.

21. Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? a. The iSCSI target b. The iSCSI initiator c. HBA d. MPIO

a. The iSCSI target

6. Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches? a. The index attribute b. The compress attribute c. The archive attribute d. The hidden attribute

a. The index attribute

25. You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario? a. The list of Windows container images will be displayed. b. The list of Linux container images will be displayed. c. All container images on the system will be displayed. d. None of the container images on the system will be displayed.

a. The list of Windows container images will be displayed.

14. You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate? a. The percentage of time a storage device was not performing a read or write function b. The percentage of time the processor spends executing processes that do not require privileged access c. The percentage of free space on a volume d. The percentage of time the processor spends responding to interrupts

a. The percentage of time a storage device was not performing a read or write function

12. Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? a. The performance of file sharing applications will increase. b. The performance of database applications will increase. c. The performance of file sharing applications will decrease. d. The performance of database applications will decrease.

a. The performance of file sharing applications will increase.

17. Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario? a. The remote access server also contains a network location server. b. Noortje had established a VPN connection before the system was restarted. c. Noortje is using a Windows 7 operating system. d. The client is using IPv4 packets to authenticate to the remote access server.

a. The remote access server also contains a network location server.

15. What are users who only have the List folder contents permission allowed to do? a. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents. b. They can read, add, delete, execute, and modify files, but cannot delete subfolders and their file contents, change permissions, or take ownership. c. They can view file contents, view folder attributes and permissions, traverse folders, but cannot execute files. d. They can traverse folders, view file contents, view attributes and permissions, and execute files.

a. They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

5. Which of the following is true of Group Policy Objects (GPOs)? a. They do not apply to Active Directory groups. b. They are not strictly enforced. c. They allow users to configure settings that are applied by GPOs. d. They are limited to 500 or less users or computers.

a. They do not apply to Active Directory groups.

1. Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service. a. True b. False

a. True

1. Monitoring is a time-consuming task. a. True b. False

a. True

1. The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. a. True b. False

a. True

2. A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key. a. True b. False

a. True

2. Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions. a. True b. False

a. True

2. Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. a. True b. False

a. True

3. Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission. a. True b. False

a. True

3. Container images that are based on Nano Server must be run as Hyper-V containers. a. True b. False

a. True

3. Performance Monitor allows one to track how individual system resources are being used. a. True b. False

a. True

3. Selecting a shared printer within the Print Management console and clicking on More Actions, Properties from the Actions menu, you will be able to change the printer name, location, and comment. a. True b. False

a. True

3. The subnet mask cannot be modified once a scope is created. a. True b. False

a. True

4. LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container. a. True b. False

a. True

4. You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server. a. True b. False

a. True

5. The ping utility is used to test the connectivity between two devices on a network. a. True b. False

a. True

19. While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database? a. WID connectivity b. WSUS services c. SQL server connectivit d. Certification authority

a. WID connectivity

26. Which of the following tools can be used to create an unattended answer file? a. Windows System Image Manager b. Windows Deployment Services c. System Preparation Tool d. Hyper-V Manager

a. Windows System Image Manager

13. Which of the following is the most likely cause for missing resource records in a secondary zone? a. Zone transfer issues b. An invalid entry in the DNS cache c. Zones that allow dynamic updates d. Manual DNS cache flushing

a. Zone transfer issues

20. What command can you use to determine if a network service is listening on the correct port number? a. netstat -a b. tracert c. ping d. Test-NetConnection

a. netstat -a

11. Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating? a. A denial-of-service attack b. A man-in-the-middle attack c. A drive-by attack d. A malware attack

b. A man-in-the-middle attack

6. What resource record type defines an IPv6 host address in DNS? a. A record b. AAAA record c. PTR d. CNAME record

b. AAAA record

18. Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured? a. Configure the Configure 802.1X wizard b. Activate the server in Active Directory c. Edit or remove existing RADIUS clients d. Choose the EAP authentication method

b. Activate the server in Active Directory

27. Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next? a. Run the Active Directory Domain Services Installation Wizard b. Add branch office user accounts to the Allowed RODC Password Replication Group c. Create new user accounts for the branch office users d. Use the Active Directory Domain Services Configuration Wizard to configure the RODC

b. Add branch office user accounts to the Allowed RODC Password Replication Group

24. Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server? a. Before installing the Remote Desktop Services server role b. After selecting the role services that Aria wants to install c. After choosing the desktop deployment type d. After selecting deployment options

b. After selecting the role services that Aria wants to install

28. After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario? a. The stolen computers can rejoin the domain after resetting their passwords. b. Any computers that were not stolen will need to rejoin the domain. c. Shania does not need to delete the stolen RODC computer account if the other computer accounts are reset. d. The Active Directory database on the stolen RODC is deleted automatically.

b. Any computers that were not stolen will need to rejoin the domain.

27. As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose? a. Printer pooling b. Bidirectional printing c. Branch office direct printing d. List in the directory

b. Bidirectional printing

26. Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service? a. By using the /r option with the chkdsk command b. By using the /spotfix option with the chkdsk command c. By using the /c option with the chkdsk command d. By using the /x option with the chkdsk command

b. By using the /spotfix option with the chkdsk command

9. You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be? a. Use the drive letters A and B to label the partitions b. Create the partitions and label one of the partitions as extended c. Use a storage device that is more than 7 TB in size and uses an MBR d. Convert the device to GPT

b. Create the partitions and label one of the partitions as extended

6. An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? a. Next Generation Firewall b. Demarcation point c. Remote access server d. Point-to-Point Protocol over Ethernet (PPPoE)

b. Demarcation point

16. The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use? a. Layer Two Tunneling Protocol b. DirectAccess c. Next Generation Firewall d. Virtual Private Networks

b. DirectAccess

19. After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration? a. Safe Mode with Networking b. Directory Services Repair Mode c. Repair Your Computer d. Active Directory Emergency Maintenance Mode

b. Directory Services Repair Mode

25. Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents? a. Distributed File System (DFS) namespaces b. Distributed File System (DFS) replication c. Client for Network File System (NFS) d. File Server Resource Manager (FSRM)

b. Distributed File System (DFS) replication

27. Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? a. Every backup overwrites the previous backup. b. Every backup only backs up data that has been modified since the previous backup. c. The backup process will provide the fastest option at the time of restoring data. d. The backup process backs up the all the specified data every time.

b. Every backup only backs up data that has been modified since the previous backup.

6. What key should be pressed as soon as the computer boots to enter Safe Mode? a. Ctrl+Alt+Del b. F8 c. Ctrl+Shift+Del d. Esc

b. F8

1. Block storage can easily be shared by several different Web apps, virtual machines, or containers. a. True b. False

b. False

1. For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering. a. True b. False

b. False

1. If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order. a. True b. False

b. False

1. The XPS API stores documents within a spool folder using Enhanced Metafile (EMF) format. a. True b. False

b. False

1. When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. a. True b. False

b. False

1. Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group. a. True b. False

b. False

2. If there are multiple DHCP servers on a network, DHCP clients will accept the first offer that they receive. a. True b. False

b. False

2. Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess. a. True b. False

b. False

2. The Device and Printers utility contains print server configuration options that are not available within the Print Management tool. a. True b. False

b. False

2. The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. a. True b. False

b. False

2. The terms "program" and "process" are one and the same. a. True b. False

b. False

3. The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server. a. True b. False

b. False

3. Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations. a. True b. False

b. False

3. When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition. a. True b. False

b. False

4. Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default. a. True b. False

b. False

4. The print server does not spool the print job when branch office users connect to a shared printer across the Internet that has BODP enabled. a. True b. False

b. False

4. There are two types of event logs in Windows Server 2019, Microsoft logs and Windows logs. a. True b. False

b. False

4. WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does. a. True b. False

b. False

4. When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found. a. True b. False

b. False

5. Pausing all documents within a print queue is often performed after performing routine maintenance on a print device, such as changing toner or refilling paper trays. a. True b. False

b. False

5. The DFS Replication role needs to be installed to configure folder quotas and file screens. a. True b. False

b. False

5. To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor. a. True b. False

b. False

14. What is the term for domain and forest functions that must be coordinated from a single domain controller? a. Universal Group Membership Caching b. Flexible Single Master Operations c. Role seizure d. User Principle Name

b. Flexible Single Master Operations

16. Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information? a. View the event log on a day-to-day basis b. Increase the size limit of the event log c. Click Clear Log from the Actions menu d. Take a backup of the event log every week

b. Increase the size limit of the event log

22. What is the use of the New-ADReplicationSite Windows PowerShell cmdlet? a. It can be used configure the replication settings within a site link object. b. It can be used to create a new site object. c. It can be used to change the bridgehead server in a site. d. It can be used to launch the Active Directory Sites and Services tool.

b. It can be used to create a new site object.

17. Which of the following is true of WINS? a. It is enabled by default on all Windows Server systems. b. It can only resolve NetBIOS names to IPv4 addresses. c. If NetBIOS is enabled, a WINS server does not need to be installed on the network. d. If a computer is configured to use WINS, it resolves NetBIOS names using broadcasts.

b. It can only resolve NetBIOS names to IPv4 addresses.

25. Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center? a. It does not support features introduced within Windows Server 2008 R2 and later functional levels. b. It uses a minimal color interface that is similar to the one provided by Server Manager. c. It can only be used to manage OU, user, group, and computer objects, but not to create these objects. d. It is a command line tool similar to Windows PowerShell that requires the use of cmdlets.

b. It uses a minimal color interface that is similar to the one provided by Server Manager.

18. You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu? a. Enable low-resolution video b. Last Known Good Configuration c. Safe Mode d. Start Windows Normally

b. Last Known Good Configuration

24. Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window? a. Enable printer pooling b. List in the directory c. Enable advanced printing d. Branch Office Direct Printing

b. List in the directory

22. Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder? a. The default permission is Read-Only, but Mark needs the Read-Write permission. b. MSmark is a computer name and not Mark's user account name. c. Laurel forgot to click the Allow root access option for Mark. d. The ReFS permission is Read/Write, whereas the NFS permission is Read.

b. MSmark is a computer name and not Mark's user account name.

25. Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true? a. Michaela expects users to connect from both laptops and desktops. b. Michaela's organization allows users to connect remotely using their personal computers. c. The Remote Desktop Licensing role service is not installed on the remote server. d. Michaela has installed an HTTPS encryption certificate for Remote Desktop Web Access.

b. Michaela's organization allows users to connect remotely using their personal computers.

12. Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions? a. Read and execute b. Modify c. Full control d. Write

b. Modify

7. Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue. a. The software does not back up files larger than 500 MB. b. Natalie did not enable the archive attribute on the folder. c. Natalie did not enable the index attribute on the folder. d. NTFS filesystems do not support the backup of large files.

b. Natalie did not enable the archive attribute on the folder.

9. Runako wants to build a social networking website and host it using a PaaS provider. The social networking website will have users posting and sharing large quantities of media such as videos and images. He is currently evaluating the storage options that the app will need. Which of the following storage options should Runako use and why? a. Block storage, because it is less expensive than object storage b. Object storage, because it allows a Web app to directly store objects c. Persistent volume, because it is faster than block storage d. Block storage, because it is faster than object storage

b. Object storage, because it allows a Web app to directly store objects

18. Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result? a. PS C:\> docker tag microsoft/iis latest b. PS C:\> docker pull microsoft/iis c. PS C:\> latest docker pull microsoft/iis d. PS C:\> docker tag microsoft/iis iis

b. PS C:\> docker pull microsoft/iis

8. Skyfelt Graphics is a company that does not own any of the hardware or operating systems on which it creates and runs its Web app containers. These components are owned, maintained, and operated by a cloud provider. Which of the following cloud delivery models is Skyfelt using? a. Software as a Service b. Platform as a Service c. Infrastructure as a Service d. Mobile as a Service

b. Platform as a Service

9. XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario? a. Published the software under Software Settings in the Computer Configuration b. Published the software under Software Settings in the User Configuration c. Assigned the software under Software Settings in the Computer Configuration d. Assigned the software under Software Settings in the User Configuration

b. Published the software under Software Settings in the User Configuration

24. You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue? a. Reinstall Windows Server 2019. b. Reboot the router. c. Disable the firewall. d. Reboot the computers sending the packets.

b. Reboot the router.

19. Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? a. Remote Access Server b. Remote Clients c. Infrastructure Servers d. Application Servers

b. Remote Clients

15. Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next? a. Reno should permanently enable debug logging. b. Reno should turn off debug logging. c. Reno should delete all the log files. d. Reno should flush the DNS server cache.

b. Reno should turn off debug logging.

21. Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions. a. Right-click the folder, click Properties, highlight the Sharing tab, and click the Share button. b. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button. c. Click File and Storage Services, highlight Shares, select the Tasks drop-down box, and click New Share. d. Click File and Storage Services, select SMB Share - Quick, select Type a custom path, and specify the path to an existing shared folder that must be shared.

b. Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.

11. One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? a. Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space b. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space c. Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify d. Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device

b. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space

9. Nodin, a trainee system administrator, is configuring a shared print device, PrinterA, on a colleague's computer. PrinterA is shared through ServerV. He uses the format below to successfully configure the print device. \\ServerV\PrinterA Identify the protocol that he most likely used. a. LDP b. SMB c. IPP d. SMS

b. SMB

26. Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following options should Merlyn choose? a. PaaS b. SaaS c. IaaS d. MaaS

b. SaaS

5. Identify a vital service provided by secondary DNS servers. a. Secondary DNS servers contain read-write copies of a primary DNS server's data. b. Secondary DNS servers respond to DNS lookup requests using read-only zone files. c. Secondary DNS servers improve security by preventing access to primary DNS servers. d. Secondary DNS servers divert all traffic to primary DNS servers to reduce load.

b. Secondary DNS servers respond to DNS lookup requests using read-only zone files.

7. A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time? a. Click the Memory column in the Processes tab of Task Manager b. Select the Processes tab of Task Manager and click the CPU column c. Check the User tab to identify the user who started all the processes d. Select the Services tab and restart stopped services

b. Select the Processes tab of Task Manager and click the CPU column

26. Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer? a. Set-Printer printername-restart b. Suspend-PrinJob c. Restart-Service spooler-force d. http://serverx/printers

b. Suspend-PrinJob

20. Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information? a. The Group Policy Results Wizard b. The Add Roles and Features Wizard c. The Windows Server Updates Services Configuration Wizard d. The Certificate Enrollment wizard

b. The Add Roles and Features Wizard

6. Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs? a. The OUs were under another domain. b. The Block Inheritance setting prevented the OUs from applying the GPOs. c. The users under the OUs declined the domain-level setting when prompted. d. The GPO link was configured with the Enforced setting.

b. The Block Inheritance setting prevented the OUs from applying the GPOs.

26. You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue? a. The network contains computers with manually configured IP addresses. b. The DNS server and DHCP server are in different domains. c. The DNS server is an authoritative, primary DNS server. d. The DNS server and DHCP server are running on different operating systems.

b. The DNS server and DHCP server are in different domains.

12. Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue? a. The TCP port number is set to 443 and not 80. b. The FQDN in the HTTPS certificate does not match the Web server FQDN. c. The HTTPS encryption certificate is installed on the Web server. d. The website is already configured to respond to HTTP requests.

b. The FQDN in the HTTPS certificate does not match the Web server FQDN.

22. Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue? a. The Security event log b. The Hardware Events event log c. The Application event log d. The System event log

b. The Hardware Events event log

22. Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue? a. The IP addresses were configured automatically. b. The IP addresses were configured manually. c. The IP addresses were configured by the DHCP server. d. The IP addresses on both computers have expired.

b. The IP addresses were configured manually.

9. Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server? a. The SOA record b. The NS record c. The A record for 172.16.0.10 d. The A record for 192.168.1.50

b. The NS record

13. Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates? a. The Online Responder role service b. The Network Device Enrollment Service role service c. The Certificate Enrollment Policy Web Service role service d. The Certification Authority Web Enrollment role service

b. The Network Device Enrollment Service role service

6. TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data. Which of the following is true of this scenario? a. The TravelBugz website can be accessed from a browser using the TCP/IP protocol. b. The TravelBugz app communicates with the Web app using the TCP/IP protocol. c. The TravelBugz app communicates with the Web app using the HTTPS protocol. d. The app and website communicate with each other using the TCP/IP protocol.

b. The TravelBugz app communicates with the Web app using the TCP/IP protocol.

8. Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019? a. Common Internet File System b. The Windows Search Service c. Windows Run d. A discretionary access control list

b. The Windows Search Service

19. What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? a. The folder loses all NTFS and share permissions associated with it. b. The folder inherits the share permissions but loses the NTFS permissions. c. The folder is copied along with all NTFS and share permissions. d. The folder is set to read-only until the user performing the move changes the attribute.

b. The folder inherits the share permissions but loses the NTFS permissions.

8. What happens when a print job exceeds the print device storage capacity? a. The print jobs are sent to the Server Message Block (SMB). b. The print jobs are divided into smaller parts and sent to the print device sequentially. c. The Print Spooler service increases the print device storage capacity. d. The rendering process slows down, which results in a decrease in the print job.

b. The print jobs are divided into smaller parts and sent to the print device sequentially.

13. Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario? a. The number of connections for the SSTP protocol does not exceed the number of remote access clients. b. The remote access server was not rebooted after the recent changes. c. The client systems are running the latest version of Windows 10. d. The other protocols do not have updates to the number of connections.

b. The remote access server was not rebooted after the recent changes.

10. Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration? a. The GPO was not backed up before the new settings were applied. b. The settings can only be applied at the next login. c. The computer had to be rebooted for the application of the GPO settings. d. The Block Inheritance setting was enabled for the OU that the computers belonged to.

b. The settings can only be applied at the next login.

24. A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in. What is most likely the cause of the failure? a. The user is in a new OU and lacks permission to log into the computer used. b. The user's account has been locked because of frequent failed password attempts. c. The computer is having issues communicating with the domain and is attempting to use cached credentials. d. The global catalog server has not replicated the user's account information to the rest of the domain.

b. The user's account has been locked because of frequent failed password attempts.

22. Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? a. Theodore used the sudo command to open the Linux command prompt. b. Theodore used the sudo passwd root command. c. Theodore used the su command to run commands as the root user. d. Theodore used the pwd command.

b. Theodore used the sudo passwd root command.

10. An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization? a. Virtual Private Networks b. Web Application Proxy c. DirectAccess d. RemoteApp

b. Web Application Proxy

14. A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager? a. Read attributes b. Write extended attributes c. Write attributes d. Read extended attributes

b. Write extended attributes

17. Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window? a. certmgr.msc b. certlm.msc c. wf.msc d. gpedit.msc

b. certlm.msc

20. Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? a. iSCSI target b. iSCSI initiator c. HBA d. MPIO

b. iSCSI initiator

26. Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable? a. $filter b. continue c. $count d. *number

c. $count

10. How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool? a. 1 KB b. 10 KB c. 1 MB d. 10 MB

c. 1 MB

4. Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data? a. 3 TB b. 8 TB c. 12 TB d. 15 TB

c. 12 TB

24. You must perform a clean install. What is the IP address that is assigned to the network loopback interface? a. 0.0.0.0 b. 255.255.255.255 c. 127.0.0.1 d. 10.0.0.0

c. 127.0.0.1

7. You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup? a. An A record b. An AAAA record c. A PTR record d. A CNAME record

c. A PTR record

24. Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? a. A copy of Reena's file is created with a new file name. b. All the files get deleted when the Data Deduplication Service is enabled. c. A new copy of Reena's file is created and associated with the same file name. d. None of the files are deleted as they have different file names.

c. A new copy of Reena's file is created and associated with the same file name.

12. You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead? a. A forward zone b. A reverse zone c. A stub zone d. A glue zone

c. A stub zone

23. Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change? a. Profile b. General c. Account d. Organization

c. Account

24. Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this? a. Rename the shared folder to KettleProgram/KettleApp. b. Create an empty file called KettleApp within the folder. c. Add KettleApp as a keyword in the folder's properties. d. Transfer ownership of the folder to a user called KettleApp.

c. Add KettleApp as a keyword in the folder's properties.

25. If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule? a. Authentication exemption b. Allow the connection c. Allow the connection if it is secure d. Block the connection

c. Allow the connection if it is secure

19. Which of the following organizations does not need to install a WINS server? a. An organization that uses shared folders on computers with NetBIOS names b. An organization that uses modern operating systems such as Windows 10 c. An organization that has disabled NetBIOS on its computers d. An organization that has DNS servers installed

c. An organization that has disabled NetBIOS on its computers

7. David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts? a. By using the Block Inheritance setting on the domain-level GPO b. By using the Enforced setting on the OU-level GPOs for the OUs that contain the managers' accounts c. By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts d. By using a WMI filter to check for conditions under which the Default Domain Policy must be applied

c. By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts

24. Carlos is configuring a DHCP server in his organization. Some of the computers in his organization contain manually configured IP addresses. Currently, he is setting up the new server to configure IP addresses for users who operate their mobile devices on the organization's network. Which of the following decisions should Carlos reevaluate? a. Carlos sets the subnet mask as 255.255.255.0. b. Carlos provides a subnet delay of 100 milliseconds. c. Carlos sets the lease duration to 7 days. d. Carlos excludes certain IP addresses.

c. Carlos sets the lease duration to 7 days.

23. Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change? a. Enter the file extensions to be excluded b. Click the Add button under Deduplication Settings c. Click Set Deduplication Schedule d. Select the Apply button under Deduplication Settings

c. Click Set Deduplication Schedule

12. Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue? a. Candice did not open the Device Manager when attaching the hard disk. b. Hard disks are not PnP-friendly devices. c. Computers contain a limited number of IRQ lines. d. The display driver did not go through driver signing when Candice turned it on.

c. Computers contain a limited number of IRQ lines.

27. What is the first step in troubleshooting an issue where a single computer is unable to lease an address? a. Ensuring that the DHCP service is running b. Verifying that the DHCP server is authorized c. Confirming that the computer has a physical connection to the network d. Checking if the computer was manually configured with an IP address

c. Confirming that the computer has a physical connection to the network

12. Lea's organization develops a cloud-based storage application. While running the application on the local server, she notices that a process run by the application consumes excess amounts of memory, which in turn leads to new performance issues. She gets the process ID from Task Manager to search for possible solutions online. However, she is not successful. What should Lea have done instead? a. Troubleshoot the issue and modify the programming code of the application herself b. Check the Resource Monitor to check the amount of memory used by the process c. Create a dump file and share it with the development team so that they can fix the issue d. Share the process ID with a support technician and get the issue sorted

c. Create a dump file and share it with the development team so that they can fix the issue

17. Devika copies a file, TFPresentation, from a folder titled "Mach-2" to a folder titled "Mach-3" on the same NTFS disk volume. The Mach-2 folder allows Read access to the Editor group, while explicitly denying Write permission to the same group. The Mach-3 folder allows Full control to the Editor group. TFPresentation, the original file, has Modify permissions for the Editor group. What is the effective access of the Editor group on the copied file? a. Read b. Modify c. Full control d. No access

c. Full control

21. Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance? a. He can restrict the number of domain controllers to one per site. b. He can increase the number of domain controllers to spread the replication load. c. He change the bridgehead server to one with a faster network interface. d. He can use SMTP instead of IP to improve performance.

c. He change the bridgehead server to one with a faster network interface.

7. VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario? a. Software as a Service b. Platform as a Service c. Infrastructure as a Service d. Mobile as a Service

c. Infrastructure as a Service

18. Which of the following is true of Storage Server 2019? a. It can have a maximum memory of 24 TB. b. It can host unlimited virtual machines. c. It cannot be purchased from Microsoft directly. d. It can be download for free and used in any environment.

c. It cannot be purchased from Microsoft directly.

26. After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion, complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session. If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true? a. Jabez removed Marion from the Marketing group and added her to another group. b. Jabez removed the Remote Desktop Connection Broker service. c. Jabez created a shared folder that is accessible to remote servers in the collection. d. Jabez rebooted the remote access server.

c. Jabez created a shared folder that is accessible to remote servers in the collection.

12. Which of the following print server permissions allows users to configure print server settings within the Print Management tool? a. Manage Printers b. View Server c. Manage Server d. Manage Documents

c. Manage Server

8. Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? a. Journaling b. Formatting c. Mounting d. Spanning

c. Mounting

19. After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running? a. PS C:\> docker ps -a b. PS C:\> docker ps -d c. PS C:\> docker ps d. PS C:\> docker container prune

c. PS C:\> docker ps

6. Which of the following RAID level configurations is not supported by Windows Server 2019? a. RAID level 0 b. RAID level 1 c. RAID level 2 d. RAID level 5

c. RAID level 2

20. A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file? a. Full control b. Modify c. Read d. Read/Write

c. Read

20. Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using? a. Remote Desktop app b. Virtual Private Network c. RemoteApp d. DirectAccess

c. RemoteApp

25. Identify the correct process that automatically adds SMB shared printers to computers that join a domain. a. Access the Advanced tab of the printer and select Auto deploy printer to client computers b. Access the Sharing tab of the printer and select the List in the directory option c. Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu d. Select the printer within the Print Management tool and click Enable Branch Office Direct Printing

c. Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu

9. Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation? a. Security b. Application c. Setup d. System

c. Setup

11. Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario? a. The resource records for N2001EY will be deleted within 14 days. b. All the resource records for N2001EY will be made available for scavenging after 28 days. c. Some of the resource records for N2001EY will be made available for scavenging after 28 days. d. Malia will need to manually remove all the resource records for N20001EY.

c. Some of the resource records for N2001EY will be made available for scavenging after 28 days.

16. What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document? a. Pcl.sep b. Pscript.sep c. Sysprint.sep d. Sysprtj.sep

c. Sysprint.sep

13. Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options? a. The Sharing tab b. The Ports tab c. The Advanced tab d. The Security tab

c. The Advanced tab

24. You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container. Which of the following is true of this scenario? a. The Docker EE package was installed using DockerMsftProvider. b. The Web server is running Windows containers. c. The Linux kernel provided by Docker runs on the Hyper-V hypervisor. d. The Linux container runs on a Docker component called Docker Hub.

c. The Linux kernel provided by Docker runs on the Hyper-V hypervisor.

10. Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server? a. The A record b. The AAAA record c. The MX record d. The CNAME record

c. The MX record

7. Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? a. The remote access server should be outside the DMZ. b. The NAT router must be configured to forward remote access requests. c. The NAT router should be a Next Generation Firewall. d. The remote access server should be connected directly to the demarc.

c. The NAT router should be a Next Generation Firewall.

21. The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one. Can you identify why this solution is feasible? a. The system need not be powered down to replace the hard disk. b. The operating system was backed up prior to the disk failure. c. The Windows system uses a RAID level 5 configuration. d. The corrupt hard disk contained the boot volume.

c. The Windows system uses a RAID level 5 configuration.

8. Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario? a. The FQDN server will return both IP addresses, 192.168.1.75 followed by 172.6.0.15. b. The FQDN server will return one of the IP addresses because of the round robin feature setup. c. The client will contact the Web server with the address 172.6.0.15. d. The client will contact the Web server with the address 192.168.1.75.

c. The client will contact the Web server with the address 172.6.0.15.

13. Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website? a. The HTTPS encryption certificate should not be installed on the Web server. b. IIS cannot run multiple websites simultaneously. c. The first website is using port 443, so the second website cannot use the same port. d. A Web server cannot be configured to host more than one website with HTTPS binding.

c. The first website is using port 443, so the second website cannot use the same port.

25. Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work? a. The administrator changed the boot volume while installing the operating system. b. The problem was with a device driver and not with the operating system. c. The issue was with the software and not the operating system. d. There was an issue in the installation of the operating system.

c. The issue was with the software and not the operating system.

23. Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay. If true, which of the following would justify this choice? a. The network contains other DHCP servers that lease IP addresses. b. The organization contains computers with manually configured IP addresses. c. The organization contains DHCP relay agents in different locations. d. The network contains DHCP servers configured in a DHCP failover configuration.

c. The organization contains DHCP relay agents in different locations.

14. Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option? a. She enters the wrong virtual disk name. b. She is not using the New Virtual Disk Wizard. c. The system uses an SSD and not an HDD. d. The storage spool does not have sufficient space.

c. The system uses an SSD and not an HDD.

9. Identify the true statement about Type 2 hypervisors. a. They can run independent of a host operating system. b. They can interact with the hardware directly. c. They can run multiple operating systems on a single host. d. They self-contain a small operating system.

c. They can run multiple operating systems on a single host.

20. Tuyet types the following statement into File Explorer: \\serverA\Share1. The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week. Which of the following is true of this scenario? a. The NetBIOS name is first broadcast over the LAN to all the computers. b. Tuyet is using a Windows XP computer or another legacy operating system. c. Tuyet's computer's name record will be deleted from the WINS server. d. The WINS server will automatically shut down because of inactivity.

c. Tuyet's computer's name record will be deleted from the WINS server.

6. Malaika purchased a print device that can be automatically configured by the system. The print device is PnP capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system? a. Wi-Fi b. Bluetooth c. USB d. Ethernet

c. USB

22. Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone? a. Changed the location of the spool folder b. Turned the printer off and turned it on again c. Updated or reinstalled the printer driver on the print server d. Updated or reinstalled the printer driver on all the print clients individually

c. Updated or reinstalled the printer driver on the print server

21. The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue? a. The WSUS installation is either incomplete or has not been installed properly. b. While installing WSUS, the option SQL Server Connectivity was selected. c. While installing WSUS, the option Store updates in the following location was deselected. d. While configuring WSUS, the option Synchronize from another Windows Server Update Services server was selected.

c. While installing WSUS, the option Store updates in the following location was deselected.

10. You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why? a. Yes. Events related to hardware issues are usually recorded in the system event log. b. No. Issues related to hard disk errors are stored in the application event log. c. Yes. Events from the software applications using the hard disk will be stored in the system event log. d. No. A Windows Server 2019 system does not use event logs.

c. Yes. Events from the software applications using the hard disk will be stored in the system event log.

23. Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change? a. install apache2 b. apachect1 start c. apachect1 configtest d. vim file

c. apachect1 configtest

8. You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? a. 1723/TCP b. 443/TCP c. 500/TCP d. 1701/TCP

d. 1701/TCP

15. What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?\ a. 256-bit encryption b. 257-bit encryption c. 1024 -bit encryption d. 2048-bit encryption

d. 2048-bit encryption

18. Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use? a. Nslookup b. Debug logging c. A stub zone d. A replication partner

d. A replication partner

14. Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled? a. Read b. Write c. Enroll d. Autoenroll

d. Autoenroll

21. Which of the following actions cannot be performed by a user with Print permission? a. Send print jobs to the printer b. Pause, resume, and restart print jobs c. Cancel the print jobs they have ownership of d. Cancel all print jobs

d. Cancel all print jobs

13. Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet? a. Run the same process under a different user b. Use the process ID and search online for information regarding the process c. Create a dump file and share it with the in-house development team d. Check with the program vendor for an update

d. Check with the program vendor for an update

14. Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue? a. Ensure that the configuration of any stub zones is correct b. Configure the IP address of the correct DNS server in network interface properties on the resolver c. Modify the associated records in the zone on SERVER1 to include the correct information d. Clear the DNS Server cache, and clear the DNS cache on the resolver

d. Clear the DNS Server cache, and clear the DNS cache on the resolver

20. Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems? a. The Advanced tab b. Properties c. View Server d. Custom filters

d. Custom filters

18. Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard? a. Damien should not select the Use force tunneling option. b. Damien should select the Use force tunneling option. c. Damien should select the Enable DirectAccess for mobile computers only option. d. Damien should not select the Enable DirectAccess for mobile computers only option.

d. Damien should not select the Enable DirectAccess for mobile computers only option.

26. Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take? a. Shut down all RODCs b. Create a new RODC c. Disable user accounts in the branch office d. Delete the RODC computer account

d. Delete the RODC computer account

17. A print device, Printer_2AC, is installed on SEVERX within your organization. The printer must be automatically added to each computer added to the domain. Which of the following options can be used for this purpose? a. Use the Add Printer wizard b. Audit object access policy c. Enable advanced printing features d. Deploy with Group Policy

d. Deploy with Group Policy

16. Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets? a. Assign the hidden attribute to the folder b. Use a pair of public and private keys that are uniquely generated for a system c. Modify the folder permissions for each user through Advanced Security Settings d. Edit the Default Domain Policy object to enable auditing functionality

d. Edit the Default Domain Policy object to enable auditing functionality

14. Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use? a. Directory Browsing b. Request Filtering c. Handler Mappings d. Error Pages

d. Error Pages

9. Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server? a. Password Authentication Protocol (PAP) b. Challenge Handshake Authentication Protocol (CHAP) c. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) d. Extensible Authentication Protocol (EAP)

d. Extensible Authentication Protocol (EAP)

16. Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition—either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module. Which of the following justifies Ezra's choice? a. Ezra wants a stable version of Docker EE. b. Ezra wants a version of Docker EE provided by Microsoft. c. Ezra intends to run Windows containers on the server. d. Ezra intends to run Linux containers on the server.

d. Ezra intends to run Linux containers on the server.

9. Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied? a. FAT32 on a Windows 10 system b. Windows Server 2019 c. Windows Server 2016 d. FAT32 on a Windows 7 system

d. FAT32 on a Windows 7 system

11. Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem? a. He can search for the next occurrence of a specific event in the event log. b. He can use the Get-EventLog cmdlet in Windows PowerShell to view the events in an event log. c. He can search for specific events related to a problem using an event ID. d. He can use the Filter Current Log option in the Actions pane in Event Viewer.

d. He can use the Filter Current Log option in the Actions pane in Event Viewer.

7. While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? a. NTFS is a filesystem, while FAT32 is not. b. FAT32 keeps track of information being written, while NTFS does not. c. FAT32 is only used as a removable device, while NTFS is not. d. NTFS is a journaling filesystem, while FAT32 is not.

d. NTFS is a journaling filesystem, while FAT32 is not.

23. What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? a. Remote Desktop Licensing b. Remote Desktop Virtualization Host c. Remote Desktop Web Access d. Remote Desktop Gateway

d. Remote Desktop Gateway

22. Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application? a. Remote Desktop Gateway b. Remote Desktop Licensing c. Remote Desktop Virtualization Host d. Remote Desktop Web Access

d. Remote Desktop Web Access

25. Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option? a. Address Pool b. Address Leases c. Policies d. Reservations

d. Reservations

27. Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections. If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? a. Rory used the Log off option. b. Rory used the Disconnect option. c. Rory used the Send Message option. d. Rory used the Shadow option.

d. Rory used the Shadow option.

19. Which of the following statements is true of SAN devices? a. SAN devices are the same as network-attached storage. b. SAN devices use SAN protocols to manage and format filesystems. c. SAN devices use hardware RAID externally to provide fault tolerance for the storage device that they contain. d. SAN devices are functionally like an external USB drive.

d. SAN devices are functionally like an external USB drive.

15. You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use? a. General b. Directory c. Schedule d. Security

d. Security

10. Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do? a. She should generate a group of dynamic-link libraries. b. She should allow access to the app only using NFS. c. She should use object storage instead of block storage. d. She should create the Web app using ASP.NET.

d. She should create the Web app using ASP.NET.

27. Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud. Which of the following options should Lin choose? a. She should install the Datacenter Edition of Windows Server 2019. b. She should start with maximum recommended configuration. c. She should purchase more block storage than object storage. d. She should install a small footprint virtual machine.

d. She should install a small footprint virtual machine.

8. Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time? a. The Reliability Monitor b. Data Collector Sets c. Event Viewer d. The Performance Monitor

d. The Performance Monitor

27. To prevent man-in-the-middle attacks, Janet, a network administrator, configures a GPO such that all the traffic sent toward a specific database server is encrypted using IPSec. While most of her colleagues are able to successfully connect to the database via the IPSec authentication process, the connection is not successful for some computers. What do you see to be the problem here? a. The IP addresses of the computers were not added under Endpoint 1. b. The connection between the failed computers and the server was protected with IPSec. c. The rule type was set to Isolation instead of Server-to-server. d. The computers did not have an IPSec certificate.

d. The computers did not have an IPSec certificate.

11. What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system? a. The file transfer does not occur because FAT32 cannot store encrypted files. b. The file encryption is maintained on the new location. c. The file is moved but is only visible to Windows systems that can see EFS files. d. The file is decrypted and placed onto the FAT32 volume.

d. The file is decrypted and placed onto the FAT32 volume.

17. Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate? a. The system may become unstable. b. The services running on the server may not function properly. c. Users may be prevented from accessing the system. d. The functionality of the system can be affected.

d. The functionality of the system can be affected.

24. Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation? a. The Block Inheritance setting b. The firewall rules setting c. The controlled folder access setting d. The memory integrity setting

d. The memory integrity setting

4. Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server? a. Malaika's computer b. The Edge browser c. The website address d. The responding computer

d. The responding computer

23. Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been? a. The applications could not connect to the server. b. The applications were not configured properly. c. The hard disk was too slow. d. The space for file cache was not sufficient.

d. The space for file cache was not sufficient.

16. Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users. a. Their operating system is Windows XP. b. They have the Block Inheritance setting at the OU level. c. The template did not have the Enforced setting. d. Their operating system is Windows 2000.

d. Their operating system is Windows 2000.

14. Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario? a. Trang should add a DHCP relay agent for IPv6 before proceeding with the next step. b. Trang should reboot the remote access server before proceeding with the next step. c. Trang should select the network interface that is connected to the DHCP clients. d. Trang should select the network interface that is connected to the DMZ.

d. Trang should select the network interface that is connected to the DMZ.

18. A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration? a. Connection to Fibre Channel SAN devices b. Accessing multiple SAN devices c. Providing storage to other servers d. Using hardware RAID externally to provide fault tolerance

d. Using hardware RAID externally to provide fault tolerance

15. Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used? a. When a client is authenticated using an unencrypted authentication method b. When the Idle Timeout and Session Timeout constraints are set to 5 minutes c. When the access permission on the same screen is set to Access denied d. When a user account has the Control access through NPS Network Policy option set

d. When a user account has the Control access through NPS Network Policy option set

26. The workstations in your organization have been upgraded with the latest GPUs. To save costs, the company has procured a brand that is not widely known in the market. To install the drivers, the system administrator reboots the system using the Disable Early Launch Anti-Malware Driver option in the Advanced Boot Options menu. Why do you think this step was required to install the driver? a. Rebooting helps scan for malwares in the driver at boot time. b. The driver can be installed only if the system is booted in Safe Mode. c. The driver did not have a valid digital signature. d. Windows Defender may have considered the driver to be suspicious.

d. Windows Defender may have considered the driver to be suspicious.

20. Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use? a. Replication b. Live migration c. Virtual machine templates d. Windows Deployment Services

d. Windows Deployment Services

10. Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute? a. fsutil.exe b. dfsutil.exe c. compact.exe d. cipher.exe

d. cipher.exe

20. You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list? a. docker rmi image b. docker stop container c. docker rm container d. docker container prune

d. docker container prune

13. Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run? a. sigverif b. regedit c. Get-Command | more d. sfc/scannow

d. sfc/scannow

19. You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found? a. HKEY_CLASSES_ROOT b. HKEY_LOCAL_MACHINE c. HKEY_CURRENT_USER d. HKEY_CURRENT_CONFIG

a. HKEY_CLASSES_ROOT

11. Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway? a. Plug and Play (PnP) b. Remote Desktop Protocol (RDP) c. Gateway Server Mode d. Devices and Printers utility

a. Plug and Play (PnP)

23. Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first? a. Test-NetConnection b. Get-NetIPConfiguration c. Get-NetAdapterStatistics d. Set-NetFirewallProfile

a. Test-NetConnection

22. Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have? a. WindowsServer2019VMTemplate b. SERVERX c. Win2019VM1 d. It will not have a name.

a. WindowsServer2019VMTemplate

25. Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why? a. Home-FileServer-Raphael because it contains his name and is at least 15 characters b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters c. TEL COMP F3 because it contains a mix of letters, numbers, and spaces d. W@$h!nGT0n, because it contains special characters, numbers, upper case letters, and lower case letters

b. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters

2. Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain. a. True b. False

b. False

8. Which of the following statements regarding a domain functional level is accurate? a. Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised. b. It represents the oldest Windows Server version that can be used on a domain controller. c. A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level. d. It applies to domain controllers, clients, and other servers that are present in the domain.

b. It represents the oldest Windows Server version that can be used on a domain controller.

8. Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this? a. SERVERX is running a Windows Server 2016 operating system. b. SERVERX is the domain controller for the Active Directory. c. SERVERX does not have an existing HTTPS certificate. d. SERVERX has Web server software that is using port 443.

b. SERVERX is the domain controller for the Active Directory.

6. Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain? a. Zero b. One c. Two d. Three

c. Two

25. Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed? a. Turned off the DHCP service b. Turned off the WDS service on the WDS server c. Pressed F1 or Esc keys d. Listed the network interface at the top of the boot order

d. Listed the network interface at the top of the boot order

24. Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization's network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane. What does this indicate? a. The Deployment Server service is not running. b. The Transport Server service is not running. c. The WDS role was not installed successfully. d. The WDS service is not yet configured.

d. The WDS service is not yet configured.

18. Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true? a. Minisha is a member of the Enterprise Admins group in both organizations. b. Minisha is a member of the Domain Admins group in both organizations. c. Minisha has run the following command: Get-ADForest | select SchemaMaster,DomainNamingMaster. d. Minisha has run the following command: Set-ADDomainMode -Identity domainX.com -DomainMode Windows2012R2Domain.

a. Minisha is a member of the Enterprise Admins group in both organizations.

15. Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow? a. She should create the Domain Naming Master role on DC1. b. She should use DC2 or DC3 as the Domain Naming Master. c. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog. d. She should create three Domain Naming Master roles, one for each domain controller.

a. She should create the Domain Naming Master role on DC1.

1. Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. a. True b. False

a. True

1. The System File Checker is useful in recovering system files that have been corrupted. a. True b. False

a. True

2. Cmdlets are case-insensitive, so Get-Host and get-host are equivalent. a. True b. False

a. True

3. Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine. a. True b. False

a. True

13. If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication? a. Universal Group Membership Caching b. Flexible Single Master Operations c. Role seizure d. User Principle Name

a. Universal Group Membership Caching

17. Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario? a. VM1's virtual hard disk files will be moved to the destination server. b. VM1's virtual machine configuration files will be moved to the destination server. c. VM1's virtual hard disk files and virtual machine configuration files will be moved to the destination server. d. VM1 will be copied to the destination server and renamed as VM2.

a. VM1's virtual hard disk files will be moved to the destination server.

13. Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice? a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines. b. Walter Wells does not use storage replicas or storage spaces. c. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows. d. Walter Wells currently outsources its hardware maintenance operations to an external vendor.

a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.

20. Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario? a. When new domain controllers are added to this network, they will be added to NewYorkSite by default. b. Assigning an IP address to a site indicates that domain controllers within this site contain the global catalog. c. Anahira will not be able to install or use Simple Mail Transfer Protocol (SMTP) to perform Active Directory replication. d. This restricts the creation of bridgehead servers, and only NewYorkSite will contain bridgehead servers.

a. When new domain controllers are added to this network, they will be added to NewYorkSite by default.

6. Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario? a. An on-premise server b. A cloud-based server c. A client d. A network

b. A cloud-based server

2. If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2. a. True b. False

b. False

2. The Windows 10 Education edition supports Hyper-V but not nested virtualization. a. True b. False

b. False

3. A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles. a. True b. False

b. False

3. By default, the only site created within a new forest does not contain any domain controller. a. True b. False

b. False

3. To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. a. True b. False

b. False

4. By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User. a. True b. False

b. False

4. Decision constructs such as If and Switch allow you to perform a task multiple times. a. True b. False

b. False

4. You need multiple boot images on a WDS server, one for each operating system. a. True b. False

b. False

12. Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true? a. Secure Boot is disabled by default in Generation 2 virtual machines. b. Fareeda enabled shielding in the security settings for VM1. c. Fareeda selected the option to Encrypt state and virtual machine traffic. d. BitLocker contains the encryption keys.

b. Fareeda enabled shielding in the security settings for VM1.

13. Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true? a. Freya deleted the virtual disk from her system. b. Freya changed the physical disk's settings to take it offline. c. Freya removed the virtual hard drive from the virtual machine. d. Freya used the Browse option under the virtual hard drive settings.

b. Freya changed the physical disk's settings to take it offline.

22. Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X. a. More b. Get-HotFix c. select -last 1 d. Get-WindowsFeature

b. Get-HotFix

5. Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario? a. A member server b. Group Policy c. A standalone server d. Access Control List

b. Group Policy

26. Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true? a. Janice is using a Type-2 hypervisor to control both virtual machines. b. Janice has enabled nested virtualization on the Windows 10 operating system. c. Janice has enabled nested virtualization on the Windows Server operating system. d. Janice is using the Windows Server 2012 R2 Edition in the virtual machines.

b. Janice has enabled nested virtualization on the Windows 10 operating system.

11. Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions. Which of the following must be true if VM3 was set up successfully using nested virtualization? a. Nadira removed VM2 to accommodate VM3. b. Nadira powered off VM1, ran a PowerShell command, and powered on VM1. c. Nadira ran the following PowerShell command: Get-VMNetworkAdapter -VMName VM3 | Set VMNetworkAdapter -MacAddressSpoofing On. d. Nadira enabled nested virtualization in Windows 10 using a PowerShell command.

b. Nadira powered off VM1, ran a PowerShell command, and powered on VM1.

21. Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do? a. Rename the virtual machine VM1 b. Remove the computer name SERVERX c. Uninstall server roles and features d. Uninstall third-party software

b. Remove the computer name SERVERX

12. Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood? a. Avoid sandboxing in a testing environment b. Run these web applications in containers c. Increase the scalability of the system d. Use nested virtualization instead

b. Run these web applications in containers

5. Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console? a. SERVERY is joined to the same Active Directory domain as SERVERX. b. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list. c. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX. d. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.

b. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

16. Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog. Which of the following is a best practice that Arpita should follow? a. She should create the Domain Naming Master role on DC2. b. She should create the Infrastructure Master role on DC1. c. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog. d. She does not need to create the Infrastructure Master role because the forest contains multiple domains.

b. She should create the Infrastructure Master role on DC1.

8. Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable? a. N-tier security b. Single-root I/O virtualization c. Hyper-V Extensible Virtual Switch protocol d. Credential Security Support Provider

b. Single-root I/O virtualization

17. Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server? a. Storage pinning b. Storage tiering c. Capacity planning d. Data deduplication

b. Storage tiering

17. Which of the following statements regarding the use of system and user environment variables is accurate? a. User environment variables are always set first. b. System environment variables are always set first. c. User environment variables apply to any user logged onto the computer. d. System environment variables can be applied on a per-user basis.

b. System environment variables are always set first.

10. Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice? a. The generation of the virtual machine can be changed later, so this choice does not matter. b. The guest operating system on the virtual machine is a 32-bit version of Windows 7. c. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time. d. The virtual machine will need to emulate a Serial Attached SCSI disk.

b. The guest operating system on the virtual machine is a 32-bit version of Windows 7.

15. Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file? a. The paging file is not located on the same disk as the operating system. b. The paging file is disabled on the computer. c. The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM. d. The paging file is not placed on a RAID volume.

b. The paging file is disabled on the computer.

23. You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade? a. The Windows Server 2019 disc provides a direct upgrade path for Server 2008 R2, so no additional steps are required to perform the upgrade. b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019. c. The server must run a special upgrade while Server 2008 R2 is running, requiring the migration of server roles to the new OS and merging of configuration files. d. The server can't be upgraded to Server 2019, as no upgrade path exists.

b. The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

6. Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time? a. To allow Hyper-V to start the Kerberos protocol b. To allow Hyper-V to start the host operating system c. To add Hyper-V in a Type 2 configuration d. To add Hyper-V in a Type 1 configuration

b. To allow Hyper-V to start the host operating system

23. Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature? a. Deployment Server b. Transport Server c. Single-root I/O virtualization d. Live migration

b. Transport Server

8. Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use? a. Journaling b. Virtualization c. Sandboxing d. Deduplication

b. Virtualization

10. Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files. a. Don should use thin provisioning and fix the size of each virtual disk to 60 GB. b. Don should use thick provisioning and fix the size of each virtual disk to 100 GB. c. Don should use thin provisioning. d. Don should use thick provisioning.

c. Don should use thin provisioning.

5. Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored? a. C:\VMs b. E:\VMs c. E:\VMs\Virtual Machines d. E:\VMs\Config Files

c. E:\VMs\Virtual Machines

18. Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size? a. HKEY_CLASSES_ROOT b. HKEY_LOCAL_MACHINE c. HKEY_CURRENT_USER d. HKEY_CURRENT_CONFIG

c. HKEY_CURRENT_USER

5. Which of the following statements is true of a client on a computer network? a. It is a server that is located within the physical premises of an organization. b. It is a computer that shares resources in response to a request from another computer. c. It is a computer that requests for resources from another computer on the network. d. It is a server that is located outside an organization's premises and accessed via the Internet.

c. It is a computer that requests for resources from another computer on the network.

7. Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database? a. On the host server b. On VM1 c. On VM2 d. On VM3

c. On VM2

21. Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press? a. Up Arrow b. Home c. Q d. Tab

c. Q

21. Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true? a. Satish's computer does not meet the minimum storage requirements. b. Satish installed Server Core instead of the full version. c. Satish's computer does not have an optical disk drive. d. Satish has installed the server over the Internet from a remote device.

c. Satish's computer does not have an optical disk drive.

15. Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario? a. The modifications within the checkpoint file will be merged into the virtual hard disk. b. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications. c. The checkpoint file that is used to reverse the changes will be deleted from the system. d. The checkpoint file will replace the current virtual hard disk file.

c. The checkpoint file that is used to reverse the changes will be deleted from the system.

15. Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? a. The server will not be dedicated to a specific function but will serve multiple functions. b. The server will be managed by a novice administrator that fulfills other roles in the company. c. The server will be dedicated to web services and accessed via the Internet. d. The server will also function as an Active Directory domain controller.

c. The server will be dedicated to web services and accessed via the Internet.

9. You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next? a. Update the clients that are running Windows 7 to Windows 10 b. Update the servers running Windows Server 2008 R2 to Windows Server 2019 c. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016 d. Revert the domain functional level of each domain in the forest to Windows Server 2016

c. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

19. Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use? a. Replication b. Live migration c. Virtual machine templates d. Production checkpoints

c. Virtual machine templates

14. Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task? a. Microsoft Management Console b. Azure Active Directory c. Windows PowerShell d. Windows Admin Center

c. Windows PowerShell

25. Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system? a. Restricted b. AllSigned c. Unrestricted d. Bypass

d. Bypass

14. Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use? a. Replication b. Nested virtualization c. Live migration d. Checkpoints

d. Checkpoints

7. Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution? a. Universal Group Membership Caching b. User Principle Name c. Selective authentication d. Distribution groups

d. Distribution groups

6. Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting? a. Events b. Services c. Best Practices Analyzer d. Performance

d. Performance

12. A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome? a. Petra.T will not be allowed to log in to the system because the global catalog server is not available. b. Petra.T will be allowed to log in and access resources across the domain. c. Petra.T will be locked out of their account until the domain controller can access the global catalog. d. Petra.T will be allowed to log in to the system with cached credentials.

d. Petra.T will be allowed to log in to the system with cached credentials.

16. What is the advantage of using production checkpoints over standard checkpoints? a. Production checkpoints are applied without shutting down the guest operating system. b. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system. c. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts. d. Production checkpoints cause fewer problems than standard checkpoints when applied.

d. Production checkpoints cause fewer problems than standard checkpoints when applied.

19. You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task? a. Set-ADForestMode -Identity domainA.com -ForestMode Windows2012R2Domain b. Get-ADDomain | select PDCEmulator,RIDMaster,InfrastructureMaster c. netdom.exe d. Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

d. Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

18. Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete? a. She enabled replication on SERVERX. b. She enabled the Credential Security Support Provider protocol for replication on SERVERX. c. She enabled the Kerberos protocol for replication on SERVERY. d. She enabled replication on SERVERY.

d. She enabled replication on SERVERY.

10. What is the use of adding tags to servers in the Windows Admin Center? a. Tags allow you to upload and download files to and from the filesystems on the server. b. Tags allow you to monitor and manage DHCP server configuration. c. Tags help configure additional areas of the system via MMC tools. d. Tags help identify servers and can be searched using the Search dialog box.

d. Tags help identify servers and can be searched using the Search dialog box.

19. Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure? a. Server Core cannot be installed on personal computers. b. Tamara's computer does not contain an optical drive. c. Server Core requires at least a 1.4 GHz 64-bit processor. d. Tamara's computer has 30 GB free hard disk space.

d. Tamara's computer has 30 GB free hard disk space.

7. Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue? a. The SAN on the rack malfunctioned. b. The management station on the rack malfunctioned. c. The blackout caused all the servers on the rack to shut down because there is no power supply. d. The blackout took down the Internet, so Rhonda can't reach the email server.

d. The blackout took down the Internet, so Rhonda can't reach the email server.

9. Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings? a. The virtual machine will be a Generation 1 virtual machine. b. The virtual machine will be named VM1. c. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB. d. The virtual machine will have a 127 GB dynamically expanding hard disk.

d. The virtual machine will have a 127 GB dynamically expanding hard disk.

20. Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command? a. To create a customized Windows PowerShell session b. To control execution in the same way as the -whatif option c. To create an output file called More in which the results of Get-Command are stored d. To send the output from Get-Command to More, which displays the output page-by-page

d. To send the output from Get-Command to More, which displays the output page-by-page

7. Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server? a. Server Manager b. Remote Server Administration Tools c. Best Practices Analyzer d. Windows Admin Center

d. Windows Admin Center


Related study sets

NUR108 #2 & 3 - Chapter 36: Nursing Care of the Child with an Alteration in Comfort-pain Assessment and Management

View Set

Nutrition Exam 2 Ch 5-7 Combined

View Set

3 - No Answer each question negatively using an adjective with the opposite meaning of the adjective used in the question.

View Set

Principles of Economics Chapter 6

View Set

Intro to Marketing 2080 Final Study Guide

View Set

Rizal in the Context of 19th Century PH

View Set

Lipids: Fats, phospholipids, and steriles

View Set

leik- Pediatrics- Hematologic disorders; Congenital and Inherited Disorders, injury, GI/GU

View Set