CIT 211 Final Exam review
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data?
12 TB
If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?
Allow the connection if it is secure
Which of the following options is provided by the Print Management tool to quickly check the status of printers to identify any problems?
Custom filters
Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?
Disable file caching and flushing
You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?
HKEY_CLASSES_ROOT
You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select?
LAN Routing
Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?
Performance
A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?
Petra.T will be allowed to log in to the system with cached credentials.
Skyfelt Graphics is a company that does not own any of the hardware or operating systems on which it creates and runs its Web app containers. These components are owned, maintained, and operated by a cloud provider. Which of the following cloud delivery models is Skyfelt using?
Platform as a ServiceThis scenario exemplifies Platform as a Service. PaaS allows you to run Web app containers in the cloud.
While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected?
Print Server
What is the advantage of using production checkpoints over standard checkpoints?
Production checkpoints cause fewer problems than standard checkpoints when applied.
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?
Remote Desktop Gateway
What happens when a print job exceeds the print device storage capacity?
The print jobs are divided into smaller parts and sent to the print device sequentially.
The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?
While installing WSUS, the option Store updates in the following location was deselected.
Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. Why should Eileen consider upgrading to Windows 10?
Windows 10 has Windows Subsystem for Linux.
Which of the following tools can be used to create an unattended answer file?
Windows System Image Manager
Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines. Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?
a. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.
What is the IP address that is assigned to the network loopback interface?
c. 127.0.0.1
Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute. Which of the following names can Kristoffer use for the variable?
$count
You are configuring a Windows Server 2016 VPN server using L2TP and NAT. Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?
1701/TCP
Which of the following is a requirement for using Storage Spaces Direct?
A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.
Leisl configures multiple WINS servers on her organization's network. She wants the WINS servers to be able to share the NetBIOS records with each other. Which of the following features should Leisl use?
A replication partner
You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?
A stub zone
Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change?
Account
Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured?
Activate the server in Active Directory
Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." What is the most efficient method that Iqbal can use to enable this?
Add KettleApp as a keyword in the folder's properties.
Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC. What is the most appropriate step that Kiora should take next?
Add branch office user accounts to the Allowed RODC Password Replication Group
Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose?
Advanced
Aria is setting up a Remote Desktop Services server to allow users remote access to the server. At what point in the installation process should Aria reboot the server?
After selecting the role services that Aria wants to install
Which of the following statements is true of the ownership of a file or folder?
An administrator can take ownership of a file or folder without being granted the permission to do so.
Which of the following organizations does not need to install a WINS server?
An organization that has disabled NetBIOS on its computers
After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option. Which of the following is true of this scenario?
Any computers that were not stolen will need to rejoin the domain.
Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled?
Autoenroll
As a system administrator, you are tasked with identifying the reason for print jobs not getting completed. You notice that the queue status against one of the printers is "paused." This does not provide a specific reason. To ease the process of troubleshooting in the future, you want the queue status to show specific notifications from the printer. Which of the following options would you enable for this purpose?
Bidirectional printing
David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?
By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts
Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers?
By using a WMI filter
Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service?
By using the /spotfix option with the chkdsk command
Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system?
Bypass
Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He's completing some post-installation configuration tasks including naming the server. He has four options. Which of the following names should Raphael pick for the newly installed server and why?
COR-WEB-12 because it contains allowed characters and is shorter than 15 characters
Which of the following actions cannot be performed by a user with Print permission?
Cancel all print jobs
Which of the following statements about directory partitions is true?
Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.
Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet?
Check with the program vendor for an update
Huong is the system administrator for a virtual machine that is used by over 500 employees. She wants to install some device drivers to enable support for a few hardware components. Before she installs the drivers, she wants to ensure that she can revert to the current version of the virtual machine if something goes wrong with the installation. Which of the following Hyper-V features should Huong use?
Checkpoints
Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone1.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?
Clear the DNS Server cache, and clear the DNS cache on the resolver
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change?
Click Set Deduplication Schedule
Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply. What is the most likely explanation for this issue?
Computers contain a limited number of IRQ lines.
Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?
Configure passive screening
Barry, a system administrator, finds that a shared drive on his organization's network is slow because of the huge amount of data stored in it. He realizes that most employees of the company back up all their data on this drive. He wants to restrict the amount of data that each employee stores on the drive. Which of the following steps will help Barry limit employees' space usage?
Configuring user quota
Lea's organization develops a cloud-based storage application. While running the application on the local server, she notices that a process run by the application consumes excess amounts of memory, which in turn leads to new performance issues. She gets the process ID from Task Manager to search for possible solutions online. However, she is not successful. What should Lea have done instead?
Create a dump file and share it with the development team so that they can fix the issue
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be?
Create the partitions and label one of the partitions as extended
Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options should Damien configure on the Enable DirectAccess Wizard?
Damien should not select the Enable DirectAccess for mobile computers only option.
Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?
Data Execution Prevention
Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision?
Deion intends to use this virtual machine in a nested virtualization configuration.
Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take?
Delete the RODC computer account
An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?
Demarcation point
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers. Which of the following options should Samir use?
DirectAccess
After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration?
Directory Services Repair Mode
Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?
Distributed File System (DFS) replication
You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list?
Docker container prune
Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored?
E:\VMs\Virtual Machines
Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets?
Edit the Default Domain Policy object to enable auditing functionality
Emory install the WSL feature on a Web server. Next, she installs an Ubuntu Linux distribution and creates a new Linux user account, EmoryJ. She logs into the Ubuntu system using this user account. Which of the following is true of this scenario?
Emory can use the EmoryJ user account to run administrative commands as the root user.
Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website. Which of the following IIS configuration features should Britta use?
Error Pages
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario?
Every backup only backs up data that has been modified since the previous backup.
Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?
Extensible Authentication Protocol (EAP)
Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition—either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module. Which of the following justifies Ezra's choice?
Ezra intends to run Linux containers on the server.
What key should be pressed as soon as the computer boots to enter Safe Mode?
F8
Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. The files are stored in a Web server on a platform managed by a cloud service provider. Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app?
FTP Server
Fareeda, a system administrator, is configuring the security settings for a Generation 2 virtual machine called VM1. She enables the Trusted Platform Module (TPM). Next, she wants to encrypt the virtual hard disks for VM1 so that other virtual machines are restricted from using these hard disks. If the virtual hard disks are successfully encrypted, which of the following statements must be true?
Fareeda enabled shielding in the security settings for VM1.
What is the term for domain and forest functions that must be coordinated from a single domain controller?
Flexible Single Master Operations
Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true?
Freya changed the physical disk's settings to take it offline.
Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem?
He can use the Filter Current Log option in the Actions pane in Event Viewer.
Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites. Which of the following measures can Faustino use to improve the performance?
He change the bridgehead server to one with a faster network interface.
Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication. What is a cost-effective method of dealing with this issue?
Hiroshi should create site objects and specify timed intervals for replication using site link objects.
Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue?
IQN is not present in the access server list.
Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information?
Increase the size limit of the event log
Kaya is an administrator at Kelvin Computing. Benjamin, a user, wants to access a shared folder on SERVERA, so he uses the UNC \\servera\share to access the folder. His computer then sends out a broadcast to the network to resolve the name SERVERA. Because of the broadcast, all computers on the LAN interpret it and causes additional processing that interferes with other operations. What can Kaya do to avoid this additional overhead?
Install a WINS server
What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?
It can be used to create a new site object.
Which of the following is true of WINS?
It can only resolve NetBIOS names to IPv4 addresses.
Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center. What is the most likely reason for not using the Active Directory Administrative Center?
It uses a minimal color interface that is similar to the one provided by Server Manager.
Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?
LDAP
You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu?
Last Known Good Configuration
Which of the following options will allow a shared printer to be automatically published, allowing domain users to search for the Print window?
List in the directory
Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers. If Yihana can successfully install the operating system, which of the following tasks has she completed?
Listed the network interface at the top of the boot order
Laurel creates a shared folder on a ReFS filesystem using NFS. She grants Read-Only permission to MSmark. When her colleague Mark tries to access the folder from his computer, he cannot access it. Which of the following is the most likely reason that Mark cannot access the folder?
MSmark is a computer name and not Mark's user account name.
Which of the following print server permissions allows users to configure print server settings within the Print Management tool?
Manage Printers
Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?
Michaela's organization allows users to connect remotely using their personal computers.
Denji has access to a shared folder on his company's network drive. He updates the data in some files and replaces one of the existing files on the shared folder with a new version. He wants to share the updated files with a colleague who must verify the updated data and make changes if necessary. However, the colleague can only view the file contents, and Denji does not have the rights to grant the required permission. Which of the following NTFS/ReFS folder and file permissions does Denji most likely have that allows him to make the changes mentioned in the scenario but does not allow him to grant the required permissions?
Modify
Which of the following is the default format used to store documents received by the GDI API for modern print devices?
NT EMF
Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.
Natalie did not enable the archive attribute on the folder.
Runako wants to build a social networking website and host it using a PaaS provider. The social networking website will have users posting and sharing large quantities of media such as videos and images. He is currently evaluating the storage options that the app will need. Which of the following storage options should Runako use and why?
Object storage, because it allows a Web app to directly store objects
Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of?
Operating system settings
After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running?
PS C:\> docker ps
Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands can Mateo run to achieve this result?
PS C:\> docker pull microsoft/iis
XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?
Published the software under Software Settings in the User Configuration
Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?
Q
Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?
RAID level 0
A user is attempting to access a shared file. The file has Full control NTFS permissions and Read permissions at the share level. What is the effective permission for the user on the file?
Read
You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue?
Reboot the router.
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?
Remote Clients
Zahara is accessing an application installed on her organization's remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer. Which of the following protocols is employed in this scenario?
Remote Desktop Protocol
Asa is working from home. She launches an application from the Start menu on her computer. The application is running on the remote access server in her organization. She is able to see and manipulate the application's graphical interface on her computer without running a full graphical desktop of the remote server. Which of the following Remote Desktop services server role allows this behavior of the application?
Remote Desktop Web Access
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?
Remoteapp
Identify the process that coverts the documents within the spool folder to a format understandable by the print device.
Rendering
Reno is facing some DNS server issues that he is unable to resolve using nslookup, DNS manager, and other general methods. He decides to use information from the DNS Server log to identify the issue. However, the information that was logged is insufficient to resolve the issue. Reno is able to identify the issue after enabling debug logging. What should Reno do next?
Reno should turn off debug logging.
Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider Identify the correct code that should replace XXXX.
Repository
Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign an IP address to a printer in the sales department. Which of the following folders should Danielle use to configure this option?
Reservations
How do you create a RAID level 1 volume with two disks in the Disk Management tool?
Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks
Nodin is a system administrator in training. He is trying to grant the user, Becky Winters, shared folder permissions using Server Message Block. Help Nodin identify the correct sequence to grant Becky Winters Full control shared folder permissions.
Right-click the folder, click Properties, highlight the Sharing tab, and click the Advanced Sharing button.
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space?
Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation.
Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.
Which of the following statements is true of SAN devices?
SAN devices are functionally like an external USB drive.
Christopher sets up multiple WINS servers in his organization and configures users' computers to use the WINS server. During testing, he attempts to access a folder called Share on the computer SERVERA. He enters the following statement into File Explorer: \\serverA\share. However, Christopher is unable to access the shared folder. What is the most likely reason for this issue?
SERVERA does not have a NetBIOS name record on any WINS server.
Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this?
SERVERX is the domain controller for the Active Directory.
Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?
SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.
Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following options should Merlyn choose?
SaaS
You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use?
Security
A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time?
Select the Processes tab of Task Manager and click the CPU column
Identify the correct process that automatically adds SMB shared printers to computers that join a domain.
Select the printer within the Print Management tool, select More Actions, and choose Deploy with Group Policy from the Actions menu
You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task?
Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain
Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation?
Setup
Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY. If the replication is successful, which of the following tasks did Gyaltsen most likely complete?
She enabled replication on SERVERY.
Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow?
She should create the Domain Naming Master role on DC1.
Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog. Which of the following is a best practice that Arpita should follow?
She should create the Infrastructure Master role on DC1.
Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do?
She should create the Web app using ASP.NET.
Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud. Which of the following options should Lin choose?
She should install a small footprint virtual machine.
Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable?
Single-root I/O virtualization
Malia configures a primary zone on a DNS server to accept dynamic updates. Whenever a computer is added to the network, resource records for the computer are automatically created. For a computer, NX2001EY, Malia configures resource records manually. On the Zone Aging/Scavenging Properties window, she selects Scavenge stale resource records, sets the No-refresh interval to 14 days, and sets the Refresh interval to 14 days. She also enables automatic scavenging in the DNS server's properties. If Malia removes NX2001EY from the network, what is the most likely outcome in this scenario?
Some of the resource records for N2001EY will be made available for scavenging after 28 days.
What option should you use on a printer's Advanced properties page if pages from different jobs are mixed?
Start printing after last page is spooled
Identify the option that can be used to create storage pools that include storage devices from different servers on a network.
Storage Spaces Direct
Which of the following commands can be used within Windows PowerShell to view and manage print jobs within the print queue for a printer?
Suspend-PrinJob
What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document?
Sysprint.sep
What is the use of adding tags to servers in the Windows Admin Center?
Tags help identify servers and can be searched using the Search dialog box.
Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website. Which of the following PowerShell cmdlets should Caylin run first?
Test-NetConnection
Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information?
The Add Roles and Features Wizard
Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options?
The Advanced tab
Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?
The Block Inheritance setting prevented the OUs from applying the GPOs.
You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?
The DNS server and DHCP server are in different domains.
Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue?
The Hardware Events event log
Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?
The IP addresses were configured manually.
You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container. Which of the following is true of this scenario?
The Linux kernel provided by Docker runs on the Hyper-V hypervisor.
You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario?
The List of Windows container images will be displayed. If LCOW was enabled, this command would display only the Linux container images. because you diabled LCOW, the Widnows container images will be displayed. Linux containier images will not be avaliable until you enable LCOW again.
Felicia is drafting an email to her colleague Rhonda. After Felicia types out the email, she enters the email address [email protected] and clicks Send. Felicia's email server uses the email address typed to locate the recipient email server. Which DNS resource record for zoneA.com allows Felicia's email server to locate the recipient email server?
The MX record
Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?
The NAT router should be a Next Generation Firewall.
Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server?
The NS record
Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?
The Network Device Enrollment Service role service
Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?
The Profile pane
Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?
The Windows Search Service
Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue?
The blackout took down the Internet, so Rhonda can't reach the email server.
The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access?
The client programs are not using the non-standard port number used by the network service
Aspen sets up the round robin feature in DNS for an FQDN server, server.domainA.com. She creates two identical Web servers with IP addresses 192.168.1.75 and 172.6.0.15 and associates two A records on the FQDN server with these IP addresses. The first A record is associated with the Web server having the IP address 192.168.1.75, and the second A record is associated with the Web server having the IP address 172.6.0.15. Aspen uses a client with the IP address 172.6.0.95 to perform a forward lookup of server.domainA.com. Which of the following is true of this scenario?
The client will contact the Web server with the address 172.6.0.15.
What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?
The file is decrypted and placed onto the FAT32 volume.
Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website. Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website?
The first website is using port 443, so the second website cannot use the same port.
Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate?
The functionality of the system can be affected.
Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage?
The iSCSI target
Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. Which of the following attributes should Nora deactivate to exclude the data files from searches?
The index attribute
Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work?
The issue was with the software and not the operating system.
Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation?
The memory integrity setting
Michelle is configuring a DHCP server in her organization. When creating a new scope, she is prompted to enter the subnet delay. She chooses to enter a few milliseconds of delay. If true, which of the following would justify this choice?
The organization contains DHCP relay agents in different locations.
You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate?
The percentage of time a storage device was not performing a read or write function
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large?
The performance of file sharing applications will increase.
Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN. Which of the following is true of this scenario?
The remote access server also contains a network location server.
Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?
The remote access server was not rebooted after the recent changes.
Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?
The settings can only be applied at the next login.
Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been?
The space for file cache was not sufficient.
Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users.
Their operating system is Windows 2000.
Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands. Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes?
Theodore used the sudo passwd root command.
Which of the following is true of Group Policy Objects (GPOs)?
They do not apply to Active Directory groups.
Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface. Which of the following statements is true of this scenario?
Trang should select the network interface that is connected to the DMZ.
Tuyet types the following statement into File Explorer: \\serverA\Share1 . The NetBIOS name is resolved by a WINS server, and Tuyet is able to access the shared folder. After this interaction with the WINS server, Tuyet does not perform any other operations that requires her computer to interact with the WINS server for over a week. Which of the following is true of this scenario?
Tuyet's computer's name record will be deleted from the WINS server.
Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system?
USB
If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?
Universal Group Membership Caching
You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next?
Update all the domain controllers running Windows Sever 2012 to Windows Server 2016
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration?
Using hardware RAID externally to provide fault tolerance
Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?
VM1's virtual hard disk files will be moved to the destination server.
Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. Which of the following Hyper-V features should Orana use?
Virtual machine templates
While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?
WID connectivity
Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties.In which of the following circumstances will this permission be used?
When a user account has the Control access through NPS Network Policy option set
The workstations in your organization have been upgraded with the latest GPUs. To save costs, the company has procured a brand that is not widely known in the market. To install the drivers, the system administrator reboots the system using the Disable Early Launch Anti-Malware Driver option in the Advanced Boot Options menu. Why do you think this step was required to install the driver?
Windows Defender may have considered the driver to be suspicious
Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines. Which of the following Hyper-V features should Achelle Electronics use?
Windows Deployment Services
Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?
WindowsServer2019VMTemplate
A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?
Write extended attributes
Which of the following is the most likely cause for missing resource records in a secondary zone?
Zone transfer issues
You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?
a. Change the boot order in the BIOS.
Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server. Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change?
apachect1 configtest
Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?
b. A cloud-based server
Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?
b. Run these web applications in containers
Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use?
b. Virtualization
Which of the following is true of Storage Server 2019?
c. It cannot be purchased from Microsoft directly.
Which of the following statements is true of a client on a computer network?
c. It is a computer that requests for resources from another computer on the network.
Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage. If Satish installed the server using Rufus, which of the following is most likely true?
c. Satish's computer does not have an optical disk drive.
Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task?
c. Windows PowerShell
Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?
c. Windows Server Catalog
Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?
certlm.msc
Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?
cipher.exe
Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure?
d. Tamara's computer has 30 GB free hard disk space.
Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI?
iSCSI initiator
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?
man-in-the-middle attack
Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?
sfc/scannow
Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer. Which Registry root key should Lucida access to change the font size?
HKEY_CURRENT_USER
You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade?
The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.
Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?
The server will be dedicated to web services and accessed via the Internet.
Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.
Get-HotFix
Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario?
Group Policy
Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running. If one of the virtual machines is running inside another virtual machine, which of the following must also be true?
Janice has enabled nested virtualization on the Windows 10 operating system.
Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?
Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.
Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice?
The guest operating system on the virtual machine is a 32-bit version of Windows 7.
Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?
The virtual machine will have a 127 GB dynamically expanding hard disk
What are users who only have the List folder contents permission allowed to do?
They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?
To allow Hyper-V to start the host operating system
Martha, a support technician, is troubleshooting a problem with a shared printer. All her colleagues, including Flavio, had complained that the printer control codes appear on printouts. She identifies corrupt print drivers as the cause of the problem. She reinstalls the print driver on Flavio's computer, and he does not face this problem again. However, other people in her company still face the issue. What should Martha have done to mitigate this issue for everyone?
Updated or reinstalled the printer driver on the print server
Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16. Which of the following is true of this scenario?
When new domain controllers are added to this network, they will be added to NewYorkSite by default.
Which printer server configuration task is performed before shared printers are added within the Print Management tool?
Add manufacturer-supplied printer drivers for the associated print device
Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?
To send the output from Get-Command to More, which displays the output page-by-page
Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization's network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests. Which component of the Windows Deployment Services role provides this feature?
Transport Server
Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?
Windows Admin Center