IS 4440 Final Exam Study

Ace your homework & exams now with Quizwiz!

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server admin, to implement measures to prevent such attacks what should she do

Hire the services of a third-party Certification Authority

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory

LDAP

Lin chooses to run a windows web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud Which of the following options should Lin choose

She should install a small footprint virtual machine

You are troubleshooting a DHCP server adn discover that it is not dynamically updating DNS records for DHCP clients what is the most likely cause for this issue

The DNS server and DHCP server are in different domains

Which service is a faster replacement for the windows indexing service that is available on windows server 2019?

The windows search service

Which of the following is true of Group Policy Objects (GPOs)

They do not apply to active directory groups

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions

True

The subnet mask cannot be modified once a scope is created

True

Andrei enabled the live migration feature of Hyper-V during its installation. he selects a virtual machine called VM1 within Hyper-V Manager and clicks on move within the actions pane. Next, he selects "Move the virtual machine's storage" Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server

Which of the following organizations does not need to install a WINS server?

an organization that has disabled NetBIOS on its computers

Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. the files are stored in a web server on a platform managed by a cloud service provider Which of the following IIS role services is integral to the file-sharing feature in Kenshin's web app?

FTP server

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

False

which of the following statements is true of the ownership of a file folder

An administrator can take ownership of a file folder without being granted the permission to do so

Pavel is an IT project leader at Kyrstal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. one of the files that he is trying to access is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Another group has the Deny box checked for Read acess

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name What resource record should you use to perform a reverse lookup

PTR

a user, Petra T, is trying to access their system while the global catalog server for the domain is offline What is the most likely outcome?

Petra T will be allowed to log into the system with cached credentials

Identify a vital service provided by a secondary DNS server

Secondary DNS servers respond to DNS lookup requests using read-only zone files

Alonso, a system admin, has configured and deployed a new GPO at the domain level in his organization. However, when he checks after a few hours, two of the OUs in the active directory do not reflect the change What is the most likely reason why

The block inheritance setting prevented the OUs from applying the GPOs

Viola, a system admin, installs IIS on a web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website

The first website is using port 443, so the second website cannot use the same port

a 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key

True

azure active directory can be configured to trust an organization's active directory forest, or mere it using a synchronization device

True

Giselle, a systems admin, creates a file redirection GPO, in the user configuration section that automatically saves files created by colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpuupdate /force command in the command prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO Why

The settings can only be applied at next login

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents

There are two types of event logs in windows server 2019, Microsoft logs and windows logs

false

the term program and process are one and the same

false

to replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated

false

Your organization has installed a new application that fetches project details from a database installed on a windows server 2019 system to perform financial computation. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed can you identify why reinstalling the operation system did not work

the issue was with the software and not the operating system

Miguel is using the new virtual machine wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default

the virtual machine will have one GB of memory

Dimitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does dimitry's computer reboot the second time

to allow Hyper-V to start the host operating system

Wat resource record type defines an IPv6 host address in DNS

AAAA record`

Radha has changed the IP address for severy.zone1.com and updated the primary DNS server. She is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup severy.zone1.com. SERVER1 returns an incorrect result If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

Clear the DNS Server cache, and clear the DNS cache on the resolver

Asher, a system admin, wants to run containers on windows server 2019. He choooses to install docker using the windows containers component which of the following is a service that will help Asher manage and run docker containers on the server?

Docker Daemon

Amaya is uninstalling the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default to E:\VMs Where will the virtual machine configuration files be stored

E:\VMs\Virtual machines

Hasad is the system admin for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following step should Hasad take to track all the activity within the folder Assets?

Edit the Default Domain Policy object to enable auditing functionality

Hiroshi is a system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization as an active directory domain, domaina.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3,000 new users across these locations. Hiroshi Notices that the surgeon users is causing internet congestion because of the active directory replication what is it cost-effective method of dealing with this issue

Hiroshi she creates a objects in specified time intervals for replication using sitelink objects

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these mining sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings. Which of the following cloud delivery models is exemplified in this scenario

Infrastructure as a Service

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring act directly across both locations to enable users from both location to access common resources If Minisha is able to accomplish the task successfully, which of the following must be true

Minisha is a member of the Enterprise admins group in both organizations

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. the same cannot be said for a FAT32 filesystem What do you think could be the reason

NTFS is a journaling filesytem, while FAT32 is not

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS measure 500MB on average. She used a software application to create backups of her work she had. Faced any issues with backing up for files until recently. During a recent backup, she noticed that a newly created folder was not backed up Identify the most likely cause for this issue

Natalie did not enable the archive attribute on the folder

what are the three main container objects within an active directory database

OUs, sites, and domains

Isabella has three virtual machines, VM1, VM2, VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch ( external virtual switch). VM1 AND VM2 are connected to a private virtual switch.VM2 and the hosts are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides client access to confidential information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security designed to protect database Where should Isabella place the database?

On VM1

Rebecca is configuring a RAID with two storage devices. If she save a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half of the amount of time it would take to save the entire file on one storage device which of the following RAID levels is Rebecca using

RAID level 0

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time. WHich of the following folder should Danielle use to configure this option

Reservations

How do you create a RAID level 1 volume with two disks in the disk management tool

Right click on the disk that you want to configure as a RAID volume and then click new mirrored volume to create a RAID level 1 volume with two disks

Identify the option that can be used to create storage pools that include storage devices from different servers on a network

Storage spaces direct

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions

Catelin creates a virtual machine template named WindwosServer2019VMTemplate. she wants to import this template, so she opens import virtual machine Wizard and hyper-V manager on SERVERX and proceeds with the process. specify the location D:VMS\Win2019VM1 for the configuration files and virtual hard disks When Catelin clicks finish during the last step in the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

Fayloa realizes that many of her collogues use the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future

configure passive screening

which of the following options provided by Windows Server 2019 how to configure folders that are on different servers to sync contents

distributed file system (DFS) replication

Block storage can easily be shared by several different Web apps, virtual machines, or containers

false

By default, the only site created within a new forest does not contain any domain controller

false

which of the following statements regarding a domain functional level is accurate?

it represents the oldest Windows Server version that can be used as a domain controller

What happens if an encrypted file in an NTFS partition on a windows 10 system is moved to a FAT32 partition on a windows 7 system?

the file is decrypted and placed onto the FAT32 volume


Related study sets

Barron's: AP Computer Science A: Chapter 9: Sorting and Searching

View Set

Solar System Astronomy Chapter 5 + 6

View Set

Globalisation Readings/Key Terms

View Set

PLS 21V Midterm Study Guide Questions

View Set

Black Codes, Jim Crow Laws, and Segregation

View Set

Chapter 28: Growth and Development of the School-Age Child

View Set

Posi 2320 civil liberties: Protecting individual rights

View Set