Chapter 7, Windows Server 2019 study guide

Ace your homework & exams now with Quizwiz!

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions? -IS-IS -OSPF -RIP -EIGRP -BGP

-BGP (BGP is an advanced distance vector protocol (also called a path vector protocol) that uses paths, rules, and policies to make routing decisions.)

Which of the following routing protocols is classified as a hybrid routing protocol? -IS-IS -EIGRP -RIP -OSPF

-EIGRP (EIGRP is a hybrid routing protocol developed by cisco for routing within an AS. RIP is a ditance vector protocol, while OSPF and IS-IS are link state protocols.

Which of the following RAID volume types provide fault tolerance in the event of a single storage device failure? (Choose all that apply.)

striping with parity & mirroring

Which of the following is a characteristic of static routing when compared to dynamic routing? -Routers send packets for destination networks to the next hop router. -All routes must be manually updated on the router. -Routers use the hop count to identify the distance to a destination network. -Routers can only use static routing when not connected to the internet.

-All routes must be manually updated on the router. (static routing requires that entries in the routing table are configured manually. Network entries remain in the routing table until manually removed. WHen changes to the network occur, static entries must be added or removed. The next hop router is used with most routes to identify the next router in the path to the destination, regardless of whether the route is a static or dynamically-learned route. The hop count can be used by static or dynamic routes, depending on the routing protocol used. static routing can be used for private and public networks whether they are connected to the internet or not)

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? -EIGRP -BGP -OSPF -IS-IS -RIP

-BGP (BGP (border gateway protocol) is the protocol used on the internet. ISPs use BGP to identify routes between ASs. Very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connection to the internet through different ISPs. RIP is used on small private networks, while OSPF and EIGRP are used on larger private networks. IS-IS is used on very large private networks and within the internet service provider (ISP) network.

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? -VLSM -Convergence -Classful -Link state -Distance vector

-Convergence (the term convergence is used to describe the condition when all routers have the same (or correct) routing information. Convergence requires some time, but once it is reached, it means that any router has learned about all other networks that are being advertised (or shared) on the network. Link-state and distance vector describe general methods that routers use to share routes with other routers. Classful describes a routing protocol that assumes the subnet mask based on the address class of the network. Variable length subnet masks (VLSM) lets you use custom subnet masks for subnetting or supernetting.)

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receive a packet addressed to network 10.1.0.0/16. What will the router do with the packet? -Hold the packet in cache until a matching route is learned or configured. -send the packet to both networks 192.168.3.0 and 192.168.4.0 and to the next hop router. -send the packet out both of its directly-connected networks as a broadcast frame. -drop the packet

-Drop the packet (if a packet does not match any route in a routing table, the router drops the packet. In this example, the router does not know about the destination network, and it is not configured with a default route. With a default route, the router will forward the packet to the next hop router specified by the default route.)

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. what will the router so with the packet? -Forward the packet to the next hop router specified by the route to the network 0.0.0.0. -drop the packet -send the packet out both of its directly connected networks to the next hop router. -send the packet out both of its directly connected networks as a broadcast frame.

-Forward the packet to the next hop router specified by the route to the network 0.0.0.0. (a route of 0.0.0.0 with a mask of 0.0.0.0 identifies a default route. The default route is used when no other route is a better match. Packets that match no other networks are sent to the next hop router specified by the default route.)

Which of the following are true about reverse proxy? (select two) -Handles requests from the internet to a server in a private network. -Can perform load balancing, authentication, and caching. -Clients always know they are using reverse proxy. -Handles requests from inside a private network out to the internet. -Sits between a client computer and the internet.

-Handles requests from the internet to a server in a private network. -Can perform load balancing, authentication, and caching. (A reverse proxy server handles requests from the internet to a server located inside a private network. Reverse proxies can perform load balancing, authentication, and caching. Reverse proxies often work transparently, meaning clients don't know they are connected to a reverse proxy.)

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers. -If the network is connected to the internet using public addressing. -If the network has over 15 areas and uses IPv6. -If the network has over 15 hops. -If the network is connected to the internet using multiple ISP's.

-If the network is connected to the internet using multiple ISP's. (very large networks can use BGP internally, but typically only share routes on the internet if the AS has two (or more) connections to the internet through different ISPs If your network has over 15 hops, use a routing protocol other than RIP. Use OSPF or IS-IS to divide your network into areas. Private networks that use public IP addresses do not need to share routes with internet routers; it is typically the responsibility of the ISP to configure routes into the private network, even when public addressing is being used. A single route out of the private network is all that is required if the network has a single connection to the internet.)

You would like to control internet access based on users, time of day, and websites visited. How can you do this? -Configure internet zones using internet options. -Configure a packet filtering firewall. Add internet access only through the proxy server. -Install a proxy server. Allow internet access only through the proxy server. -Enable windows firewall on each system. Add or remove exceptions to control access. -Configure the local security policy of each system to add internet restrictions.

-Install a proxy server. Allow internet access only through the proxy server. You can configure rules on a proxy server based on users, time of day, and websites visited. all intenet acces requests are routed through the proxy server. Use a packet filtering firewall, such as windows firewall, to allow or deny individual packets based on characteristics such as source or destination address and port number. Configure internet zones to identify trusted or restricted websites and control the types of actions that can be performed when visiting those sites.

When multiple routes to a destination exist, what is used to select the best possible route? -Distance vector -Metric -Autonomous system number -Exterior gateway protocol

-Metric (Routers use metric values to identify the distance, or cost, to a destination network. The metric is used by the routing protocol to identify and select the best route to the destination when multiple routes exists. The metric can be calculated based on hop count, bandwidth, or link cost. The exterior gateway protocol is a routing protocol that routes traffic between autonomous systems. The distance vector is a routing protocol that defines how routers update and share routing information. An autonomous system number is a unique number used to identify an autonomous system.)

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? -EIGRP -RIP -IS-IS -OSPF

-OSPF OSPF divides a large network into areas. Each autonomous system requires an area 0 that identifies the network backbone. All areas are connected to area 0, either directly or indirectly through another area. Routes between areas must pass through area 0. IS-IS uses areas, but does not have an area 0 requirement. Neither RIP nor EIGRP use area.

Which of the following routing protocols uses relative link cost as the metric? -BGP -RIP -OSPF -EIGRP

-OSPF OSPF is a link-state routing protocol used for routing within an OSPF uses relative link cost for the metric.

Which of the following best describes OSPF? -OSPF is a classful distance vector routing protocol. -OSPF is classless link state routing protocol. -OSPF is a classful link state routing protocol. -OSPF is a classless distance vector routing protocol

-OSPF is classless link state routing protocol. RIP version 1 and IGRP are both classful distance vector routing protocols that supports classless addressing.

What are the main differences between the OSPF and IS-IS routing protocols? -OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol. -OSPF requires an area 0, while IS-IS does not. -OSPF is a classful protocol, while IS-IS is a classless protocol. -OSPF is a link state protocol, while IS-IS is not.

-OSPF requires an area 0, while IS-IS does not. (Like OSPF, IS-IS uses areas when designing the network. However, IS-IS does not require an area 0 like OSPF does. Because IS-IS was originally designed for non-IP protocols, it can more easily support IPv6 routing. Both OSPF and IS-IS have the following characteristics: -both are link state protocols. -both are classless protocols, supporting CIDR and VLSM. -Both are interior Gateway Protocols (IGPs) that are used within an AS)

Which of the following is a firewall function? -Encrypting -Frame filtering -Packet filtering -FTP hosting -Protocol conversion

-Packet filtering (Firewalls open filter packets by checking each packet against a set of administrator-defined criteria. If the packet is not accepted, it is simply dropped)

Which of the following protocols has a limit of 15 hops between any two networks? -RIP -BGP -IS-IS -EIGRP -OSPF

-RIP (RIP networks are limited in size to a maximum of 15 hops between any two networks. A networks with a hop count of 16 indicates an unreachable network. The other routing protocols do not use the hop count as the metric. EIGRP uses bandwidth and delay for the metric. OSPF and IS-IS use a relative link cost. BGP uses paths, rules, and policies for the metric)

Which of the following statements about RIP is true? -RIP uses hop counts as the cost metric. -RIP is suitable for large networks. -RIP is the routing protocol used on the internet. -RIP is a link state routing protocol.

-RIP uses hop counts as the cost metric. (RIP is a distance vector routing protocol. As such, it is susceptible to the count-to-infinity problem. RIP uses the hop count as the cost metric. Because it has a limitation of 15 hops in one route, it is not suited for large networks.)

What info does the next hop entry in a routing table identify. -The last router in the path to the destination network. -The first router in the path to the destination network. -A backup router that is used to forward packets addresses to unknown networks -The number of routers that the packet must go through to reach the destination network.

-The first router in the path to the destination network. (the next hop router is the first(or next) router in the path to the destination network. Each router looks at the destination network in the packet, then consults the routing table to identify the next hop router to the destination network. The hop count identifies the number of routers in the path to the destination network. A default gateway router is a router that is used for packets sent to external networks. Most routers do not have a default gateway setting, but instead use a default route setting, which identifies a next hop router for all unknown networks.)

A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? -Stop and restart the RIP protocol on the router. -Force RIP to perform an immediate update -Wait for convergence to take place -Manually configure the default route to point to the new next hop router.

-Wait for convergence to take place (when using a routing protocol, changes in routing information take some time to be propagated to all routers on the network. The term "convergence" is used to describe the condition when all routers have the same (or correct) routing information. Static routes in the routing table must be updated manually. Restarting RIP might actually increase the time required for changes to be learned. Forcing an update (if the router supports it) is not a requirement, as the periodic sharing of routes will eventually update the routing table entry.)

Which of the following tasks do routers perform? (select 2) -identify devices through hardware addresses. -maintain info about paths through an internetwork. -control access to the transmission media. -route data based on logical network addresses -multiplex signals onto the same transmission media -Route data based on hardware device addresses.

-maintain info about paths through an internetwork. -route data based on logical network addresses Routers build and maintain tables of routes through an internetwork and deliver data between networks based on logical network addresses.

Which of the following are true of a circuit proxy filter firewall? (select 2) -operates at the network and transport layers -operates at ring 0 of the operating system. -verifies sequencing of sessions packets. -operates at the application layer -operates at the session layer. -examines the entire message contents

-verifies sequencing of sessions packets. -operates at the session layer. (a circuit proxy filter firewall operates at the session layer. It verifies the sequencing of session packets, breaks the connections, and acts as a proxy between the server and the client. An application layer firewall operates at the aplication layers, examines the entire message, and can act as a proxy to clients. a stateful inspection firewall operates at the network and transport layers. It filters on both IP addresses and port numbers. A kernel proxy filtering firewall operates at the operating system ring 0.

You wish to create a RAID level 5 volume using the Disk Management tool. How many storage devices can you use in the volume?

32

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name.What resource record should you use to perform a reverse lookup?

A PTR record.

What resource record type defines an IPv6 host address in DNS?

AAAA record

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so.

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers.

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xls, is not opening. Upon investigation, you find that Pavel's user account has full control permission over the file. The Project Manager group has Modify access but not Full control. The developer group has write access but no read access.What is the most likely reason that Pavel is not able to open the file?

Another group has the deny box checked for read access.

Radha has changed the IP address for servery.zone1.com and updated the primary DNS server. She is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup severy.zone1.com. SERVER1 returns an incorrect result.If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

Clear the DNS server cache, and clear the DNS cache on the resolver

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive.Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

Configure passive screening.

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has a physical connection to the network.

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

Distributed File System (DFS) replication

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs.Where will the virtual machine configuration files be stored?

E:\VMs\Virtual Machines

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them.Which of the following steps should Hasad take to track all the activity within the folder Assets?

Edit the Default Domain Policy object to enable auditing functionality

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

False

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

False

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? -Link state -BGP -Distance Vector -IGP -Static -Dynamic

IGP (You would use an interior gateway protocol (IGP) on routers within your network. Routing protocols can be classified based on whether they are routing traffic within you network. Routing protocols can be classified based on whether they are routing traffic within or between autonomous systems. an GIP routes traffic within an AS; an exterior gateway protocol (EGP) routes traffic between ASs. Link state and distance vector describe how routing protocols share routing information. The network size might determine which protocol is best for your network. Static routing uses manually defined routes in the routing table, while dynamic routing uses a protocol so routers lean and share routes with other routers. You can use static routing, dynamic routing, or both on a private network.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.What do you think could be the reason for this difference?

NTFS is a journaling filesystem, while FAT32 is not.

Natalie a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up.Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder.

Isabella configures three virtual machines, VM1, VM2 and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database.Where should Isabella place the database?

On VM2

Which type of virtual switch in Hyper-V can only have virtual machines connected to it?

Private

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied because they do not save system state.

Rebecca is configuring a RAID with two storage devices. If she saves a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half the amount of time it would take to save the entire file on one storage device.Which of the following RAID levels is Rebecca configuring?

RAID level 0

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the system preparation tool.

Remove the computer name SERVERX

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time.Which of the following folders shoudl Danielle use to configure this option?

Reservations

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume then click new mirrored volume to create a RAID level 1 volume with two disks.

After noticing a RAID level 5 volume in Disk Management with a status of Failed Redundancy, you located and replaced the failed storage device with a new one. What must you do to return the volume status to Healthy?

Right-click the RAID volume, click Repair Volume, and select the new storage device

Identify a vital service provided by secondary DNS servers

Secondary DNS servers respond to DNS lookup requests using ready-only zone files.

Identify the option that can be used to create storage pools that include storage devices from different servers on a network.

Storage Spaces Direct

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients.What is most likely the cause for this issue?

The DNS server and DHCP server are in different domains.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85.If the organization's network uses a DHCP server, which of the following most likely caused this issue?

The IP addresses were configured manually.

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made.Which of the following is true of this scenario?

The checkpoint file that is used to track and reverse the changes will be deleted from the system.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to FAT32 partition on a Windows 7 system?

The file is decrypted and placed onto the FAT32 volume.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time.Which of the following statement is true if Miguel creates a virtual machine with default settings?

The virtual machine will have 1 GB of memory

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system.

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

True

The subnet mask cannot be modified once a scope is created.

True

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks the Move within the actions pane. Next, he selects "Move the Virtual Machine's storage"Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server.

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks.When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

Which of the following is the most likely cause for missing resources records in a secondary zone?

Zone transfer issues.


Related study sets

methods of experimental psych final study guise

View Set

Ch. 25 Types of Diabetes and Diagnosis

View Set

Practice Midterm Exam - Weeks 1-4; Chapters 1-7

View Set

Personal Lines-Homeowners Policy

View Set

1.4 Network Addressing - Loopback and reserved, Default gateway, Virtual IP, Subnet mask, Subnetting, Address assignments

View Set

Marketing Multiple choice questions Chapter 1

View Set