CPT 176 Final
Type of IPv6 address used for communication between neighboring nodes on the same link, and equivalent to IPv4 addresses configured using APIPA
Link local IPv6 address
A printer that is connected directly to a computer
Local Printer
A printer setting that enables a user with a portable computer to print to a printer physically located close to her computer
Location-aware Printing
The Layer 2 address assigned to a network adapter
MAC address
A collection of management tools known as snap-ins that are organized under a single management tool. The tool is used for both local and remote administration
MMC
The partition style that uses a partition table that describes the location of the partitions on the disk, and on which the first sector contains a hidden binary code file that is used for booting the system is called _________.
Master boot record(MBR)
By doing some planning, an administrator can ________roles, features, operating system settings, user data, and shares from a previous installation to Windows Server 2012 R2.
Migrate
Address that enables the delivery of packets to each of multiple interfaces
Multicast IPv6 address
An advanced feature that enables guests to take advantage of redundant links to access storage area networks
Multipath I/O (MPIO)
Uses up to two virtual network adapters up to two virtual network switches
NIC team(virtual)
Technology that enables UNIX to share files and applications across the network
Network File System(NFS)
The file system originally provided with Windows NT and present in modern server versions that supports volume mounting, compression, encryption, and security
New Technology File System(NTFS)
Enables you to cache locally stored copies of shared files and folders, so that you can work with them while offline and resynchronize your changes when you go back online
Offline Files
At startup, Windows Server 2012 Core presents _______.
Only a command window
By default, which GPO is applied first
Organizational Unit
Similar to a Telnet session, the PowerShell cmdlet ________creates a persistent connection to a remote computer.
PSSession
Allows you to isolate specific virtual machines on a port based on the virtual switch
PVLAN
A virtual disk method used to enable the virtual operating system to access a physical disk on the host directly
Pass-through disk
A set of APIs that enable software vendors to create applications to filter and modify TCP/IP packets, monitor, or even authorize connections
Port Mirroring
The program that converts graphics commands into instructions that a type of print device can understand
Print Driver
The act of setting up two or more physical printers (print devices), each associated with a single printer
Print Pooling
The hardware device that produces the printed output
Print device
The software interface between the operating system and the print device that determines various aspects of the printing process
Printer
A number from 1 to 99 that determines which document is printed first
Printer Priority
An area on a computer's hard drive where documents to be printed are stored while awaiting printing
Printer Spooler
The three virtual switch types to select from are External, Internal, and ________.
Private
Virtual Machine connection setting where your network adapter is connected to a virtual switch that is accessible only by the VMs and is helpful in lab/testing environments
Private Network
The hardware and shared computing environment that the hosting company or IT department within a company owns
Provider address space
Using AppLocker, You can restrict applications according to ________ rules, which limit application execution according to the application's digital signature.
Publisher
Default mode of remote management using Server Manager
RSAT
When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _______.
Reboot their computers
Name-resolution technique wherein a DNS server queries other DNS servers on behalf of the requesting client to obtain the required FQDN, which it returns to the client
Recursion queries
A series of Windows Server 2012 R2 administrative utilities that you can download from Microsoft and install on a Windows 8.1 computer
Remote Server Administration Tool (RSAT)
Process that tracks virtual machine resource usage for reporting purposes
Resource Metering
DNS name-resolution process by which an IP address is resolved to a hostname
Reverse Lookup Query
List of the names and IP addresses of DNS servers that are authoritative for the Internet root domains
Root hints
When configuring Windows firewall with advanced security, the monitoring property contains a link called ________displays IPsec main mode and quick mode associations.
Security Associations
A network file sharing protocol that enables applications to read and write data and request information from programs on network servers
Server Message Block(SMB)
The section of Group Policy from which administrators can configure settings that are applied to users' desktops, specify programs that users can run, and so on is called ________.
Server Policies
Folders that are made available for access by users who are working at another computer on the network
Shared folders
Hyper-V function that allows for temporary paging of virtual machine memory to a disk
Smart Paging
The concept of creating a point-in-time copy of a file or virtual machine
Snapshot
A new feature for Server 2012 R2 that enables administrators to monitor and control virtual disk performance
Storage Quality of Service (QoS)
A tool used to schedule and automate tasks to perform a specific function at a specific time
Task Scheduler
A specific customer that owns or rents resources from the shared computing environment
Tenant
Tunneling communication protocol that enables IPv6 connectivity between IPv6/IPv4 nodes across network address translation (NAT) interfaces
Teredo
The folder hierarchy composed of the Group Policy Containers folder at the top and subfolders under it holds all the information for a given GPO.
False
When you configure software restriction policies in Group policy, you can control executables, DLL files, scripts, and Windows Installer files, and you can control each file type separately.
False
With the Default AppLocker Rules, for the Everyone group, the Executable Rule is that all files are located on the C:\ drive.
False
You can assign permissions to printers, but not audit their usage
False
___ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restriciting the types of files being saved, and monitoring the amount of storage used.
File Server Resource Manager (FSRM)
__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used.
File Server Resource Manager (FSRM)
A server role that provides utilities that enable you to manage files, folders, and other shared resources. It's installed by default when you install Windows Server 2012 R2.
File and Storage Services role
A VHD type that uses a preconfigured disk size that allocates physical storage matching the size of the configured virtual disk from the point at which the disk is created
Fixed-size disks
The first domain installed is the root domain in its ____________.
Forest
DNS name-resolution process by which a hostname is resolved to an IP address
Forward lookup query
Relaying of a DNS request from one server to another one when the first server cannot process the request
Forwarding
The combination of a hostname, an organization's domain name, and the Internet top-level domain name creates a ________ that is unique across the Internet.
Fully Qualified Domain Name(FQDN)
DNS domain name that unambiguously describes the location of the host within a domain tree
Fully qualified domain name (FQDN)
Virtual machine that runs on a specific physical host
Guest
Suite of services available for installation after a virtual machine has been created
Guest Integration Services
The interface card that enables Hyper-V hosts to connect to and communicate with storage area networks
Host Bus Adapter (HBA)
Physical server that provides physical resources such as CPU and memory to a virtual machine
Host(Hyper-V)
In DNS, the first or most-specific name assigned to an individual computer
Hostname
Microsoft's version of a Virtual Machine Manager
Hyper-V
The infrastructure responsible for creating shared computing environments using Hyper-V
Hyper-V Network Virtualization
Mechanism that is responsible for managing virtual machines
Hypervisor
An IPv6 address represented in the form 0:0:0:0:0:0:w.x.y.z, where w.x.y.z is the IPv4 address in dotted-decimal
IPv4-compatible address
An IPv4-only node is represented as :ffff:.w.x.y.z to an IPv6 node and used only for internal representation
IPv4-mapped address
A tunneling technology that enables unicast IPv6 connectivity between IPv6/IPv4 hosts over an IPv4 intranet
Intra-Site Automatic Tunnel Addressing Protocol(ISATAP)
Provides connection-oriented, reliable communication between two hosts, typically involving large amounts of data
Transmission Control Protocol(TCP)
.Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container
True
A hash is a fixed-length series of bytes that uniquely identifies an application or file.
True
A printer is the physical (hardware) device that produces the printed output.
True
A profile is a means of grouping firewall rules so that they apply to the affected computers dependent on where the computer is connected.
True
A user principal name (UPN) is a logon name formatted in a manner similar to that of an email address, such as [email protected].
True
Account operators, server operators, print operators, and backup operators are built-in security groups that enable members to perform limited administrative capabilities within the domain in which they are located.
True
Active Directory Certificate Services is the Server role responsible for public key infrastructure (PKI).
True
After a VM is created, you cannot change its generation
True
All NTFS permissions are inherited, that is, they pass down through the folder hierarchy from parent to child.
True
Branch Office Direct Printing is a new technology included in Windows Server 2012 and updated in Windows Server 2012 R2.
True
DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image.
True
DNS server software cannot refer queries to other DNS servers as required.
True
Disabling or deleting an account is referred to as deprovisioning the account
True
Dynamic Host Configuration Protocol is a service that enables an administrator to specify a range of valid IP addresses to be used on a network, as well as exclusion IP addresses that should not be assigned (for example, if they were already statically assigned elsewhere).
True
If you use differencing disks for testing, you have the ability to commit the changes back to the parent disk.
True
In Active Directory Administrative Center, a resource property describes or classifies a specific characteristic of a resource such as a file or folder.
True
In Active Directory Users and Computers to view the effective OU permissions granted to a user or group, the Effective Permissions tab shows all granted permissions, including inherited permissions.
True
In Windows Server 2012 R2, Hyper-V does not enable you to share a VHD between multiple VMs.
True
MMC configuration that prevents users from accessing areas of the tree that are not visible in the snap-in console windows
True
MMC is designed to be used in a domain environment; however, in a workgroup environment with different security boundaries, you might be required to use the Run As function for a custom MMC console.
True
Pointer records are created automatically if you have specified this option in the New Host dialog box or if the appropriate option has been configured at the DHCP server for dynamic DNS
True
Server Core is the default install option and is recommended by Microsoft.
True
Share permissions are more granular than Security permissions.
True
TCP/IP is not a single networking protocol but a suite of protocols.
True
The DHCP option 003 Router specifies the IP address of the default gateway.
True
The Isolation connection security rule enables you to limit connections according to authentication criteria that you define.
True
The VHDX format can support up to 64-TB disks
True
The Windows Server 2012 R2 Standard Edition is a robust, ideal platform for medium-sized offices that are designed upon a physical or minimally virtualized environment.
True
The command-line tool dsget provides information about objects in Active Directory.
True
The default gateway is the location on the local subnet to which the local computer sends all data meant for other subnets.
True
The forest administrators, who are members of the Enterprise Admins group, are automatically granted the ability to create an OU hierarchy in any domain within the entire forest.
True
The only tool you can use to configure audit policy on a Server Core computer is Auditpol.exe.
True
There is a GUI version of the Active Directory Recycle Bin feature. By default, the Recycle Bin is disabled, but you can enable it from within AD Administrative Center. After the recycle bin is enabled, you cannot disable it.
True
To make use of the functionality provided by Windows Server 2012 Active Directory, you must upgrade all domain controllers to Windows Server 2012 and upgrade the functional levels accordingly.
True
To use MMC to manage Server Core, you must first create Advanced Firewall rules to permit access.
True
Virtual Hard Disks (VHDs) are stored on local physical drives. You can create as many VHDs as your physical storage allows, or until you run out of drive letters.
True
When installing Windows Server 2012 R2 you can choose between Server Core Installation and Server with a GUI.
True
When pooled, storage can be allocated as one large volume, or it can be carved up into smaller sgments known as storage spaces. Storage spaces enable you to configure smaller virtual hard disks(VHDs) and allocate virtual disks to different servers or as separate volumes within the same server
True
You can have only one double-colon notation within any IPv6 address.
True
You cannot upgrade a Window Server 2003 or older computer or a computer running any client version of Windows to Windows Server 2012 R2.
True
What is the main reason not to employ a single tree in all multiple domain enterprises?
Two companies merge and want to maintain their separate identities
A(n) _______ is a convenient means of logging on to a domain from a computer located in another domain in the forest or a trusted forest.
UPN
Provides fast, nonconnection-oriented communications with no guarantee of delivery and no error checking
User Datagram Protocol(UDP)
You might need to convert a VHD to a VHDX format so that it can be supported under an older operating system.
VHDX OR VDIR OR VIR
The mechanism used to identify a specific physical SAN by name and associate the connection to it with one or more Host Bus Adapters installed on the Hyper-V host
Vitrual SAN
The virtual interface that enables communication between the guest, Hyper-V host, and storage area networks
Vitual Fribre Channel Adapter
The infrastructure required to create copies of files on your server for the purpose of quick restores of previous versions
Volume Shadow Services(VSS)
Microsoft's version of the WS- Management protocol
WinRM
The client component used to executed commands against a server running the Windows Remote Management service
WinRS
Uses a legacy driver to support legacy operating systems also used to perform network-based installations of the guest operating system or when integration services are not installed on the operating system
Windows Filtering Platform(WFP)
Role service in the Windows Server 2012 R2 File and Storage Services server role that enables users to access data on a file server from any remote location without the need for a VPN connection
Work folders
Which Windows firewall configurable exception allows computers to connect to other computers or the Internet?
core networking
The Print Server role service that enables the server to receive and manage documents that users have scanned from network-based scanners is ________.
distributed scan server
Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container
false
________ action refers to a configured set of actions within a firewall rule that determines whether the firewall will permit or block traffic attempting to cross it.
filter
The _________profile setting specifies the most restrictive default firewall settings
guest or public
The Hyper-V connection setting that is like having your network cable unplugged is __
not connected
In an Active Directory Domain Services (AD DS) domain, you must authorize the DHCP server in Active Directory before it can lease IP addresses. This is to prevent rogue DHCP servers from leasing improper IP addresses that would result in communication problems.
rogue
By default, which GPO is applied first?
site or local?
A(n) _______ is used to collect a set of users who need to share a particular set of permissions to a resource, such as a file, folder, or printer.
subdomains
A storage pool is a group of physical disks combined to create a shared pool of storage.
true
In Password policy settings, if the password must meet complexity requirements, it must contain three of these four criteria: English lowercase letters, English uppercase letters, numerals, and nonalphanumeric characters such as $ ; [ ] { } !
true
The first domain installed is the root domain in its forest
true
Using the dcpromo tool, you can redirect the default container for newly created computers to a specific OU. Computers joined will be created in the target OU instead of the default Computers container.
true
Windows Firewall with Advanced Security settings is included in a file with the .wfw extension.
true
Event that occurs in Task Scheduler after a trigger is set
An action
Address that is utilized only for a destination address assigned to a router
Anycast IPv6 address
The dynamic IPv4 addressing system used when DHCP is unavailable
Automatic Private IP Addressing(APIPA)
An Active Directory snap-in in Windows Server 2012 R2 that enables the administration of most Active Directory functions from a single console
Active Directory Administrative Center
Enabling applications to receive unsolicited Internet traffic through a Network Address Translation (NAT) device is an option called __________.
Allow edge traversal
A new Offline Files mode in Windows Server 2012 R2 that enables faster access to cached files and redirected folders in an AD DS environment
Always offline mode
The folder hierarchy is composed of the Group Policy __________ folder at the top and subfolders under it. This structure holds all the information for a given GPO.
Containers
Which tool enables you to automate the creation of new accounts by importing data to AD DS from files containing information in the comma-separated (CSV) format?
Csvde
The dedicated servers and network assigned to a specific customer in a cloud computing environment
Customer Address Space
A technology used to create a point-in-time backup of the virtual machine configuration and data
Checkpoint
IPv6 uses a ________-bit addressing scheme.
128
The virtual switch is a software function of Hyper-V that is responsible for layer __ switching
2
A DHCP server and a DHCP client both need to go through a ____-phase process before DHCP configures the client with a working set of TCP/IP parameters.
4
MMC configuration that prevents users from adding or removing snap-ins or changing snap-in properties.
? User mode - full access
The Winrm quickconfig command-line tool determines whether a WS-Management implementation is running on a remote machine.
False
Which of these is a built-in security group designed to enable members to perform limited administrative tasks within the domain in which they are located?
Backup Operators
A printer setting that is designed to conserve bandwidth and allow client printing if a print server failure occurs
Branch Office Direct Printing
Group policy is a group of policies that are applied together. It is a set of configuration settings that can be applied to one or more Active Directory Domain Services (AD DS) objects to define the behavior of the object and its ______________.
Child Objects
The Microsoft Management Console (MMC) snap-in from which you can manage most of the activities associated with operating a DNS server
DNS Manager
The child disk in a parent/child relationship
Differencing disk
Hierarchical name-resolution system that resolves hostnames into IP addresses, and vice versa
Domain Name System (DNS)
Adds security to the DNS protocol by providing origin authority, data integrity, and authenticated denial of existence
Domain Name System Security Extensions (DNSSEC)
The __ Protocol resolves hostnames on the internet and local networks to IP addresses
Domain name system
The ________ Protocol resolves hostnames on the Internet and local networks to IP addresses.
Domain name system
Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly
Dynamic
Using the ________ update method, as a DHCP server hands out IP addresses, it registers the client hostname or FQDN and IP address with the DNS server. If the hostname or IP address changes, the DNS record is updated accordingly.
Dynamic
Hyper-V function that allows for memory to be pooled within a host
Dynamic Memory
A VHD type that starts small and expands automatically to accommodate data growth
Dynamic expanding disk
A universal cross-platform-compatible used to simplify driver management when using Remote Desktop Services
Easy Printer Driver
Advanced Adapter feature of Hyper-V that allows network traffic from VMs to be monitored by copying incoming and outgoing packets
Emulated network adapter
Hyper-V feature that supports redirecting of local resources such as keyboard, video, mouse, audio, printers, clipboard, USB devices, drives, and plug-and-play devices
Enhanced Session Mode
Which of the following is not one of the three types of user accounts present in an AD DS network?
Enterprise user accounts
A DHCP server leases an IP address to the DHCP client for only a specified term. The default term is 4 days.
False
A Windows Server 2012 R2 Datacenter cannot act as a domain controller.
False
A dynamic disk may contain as many as four partitions or logical drives.
False
A mirrored volume cannot provide fault tolerance for the system and boot volumes.
False
A printer is the physical(hardware) device that produces the printed output.
False
The Hyper-V connection setting that is helpful for lab/testing environments is called Specific Network Interface Card.
False
After a differencing disk has been established, the parent disk will still accept write events.
False
All Group Policy Objects are identified by their PolicyIDs.
False
Dynamic Hyper Configuration Protocol is a service that allows a server to assign IP addresses to host computers on a subnet.
False
Even though the FQDN contains both the hostname and domain name, two hosts from different domains cannot share the same hostname.
False
Generation 2 virtual machines support Legacy Network Adapters.
False
Group Policy Templates are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information.
False
In the application layer of the four-layer TCP/IP model, the protocol that gathers network management information from network devices, such as routers, bridges, and servers that provides this information to network management consoles is Simple Mail Transfer Protocol (SMTP).
False
Installing Active Directory requires additional storage of 1000 MB for the Active Directory database and SYSVOL folder, plus at least 100 MB for the transaction log files
False
Password settings are stored in a Password Settings Container (PSC) in the domain.
False
The Distributed File System (DFS) feature enables file sharing among servers running Windows and UNIX. Added in Windows Server 2012 R2 is an NFS module for Windows PowerShell with several new cmdlets specific to NFS.
False
The NIC teaming property that refers to the ability of the NIC Team to manage the connections to the switches and keeps track of the teams' connection state is static teaming.
False
The Windows Remote Shell (WinRS) is the server component used with WinRM.
False