Module 2 – Configuring Windows Server

Ace your homework & exams now with Quizwiz!

Match the following Windows Registry Content with its description.

A folder that appears in the left pane of the registry editor. c. Key* Can contain entries or other subkeys. e. Subkey* An item that appears in the details pain and is the lowest level in the Windows Registry. b. Entry*

Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation. What is the most likely execution policy on Dillon's system

Bypass* The execution policy on Dillon's system is most likely set to Bypass, which is the reason he can execute the downloaded script without any additional prompts.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention* Data Execution Prevention (DEP) is a performance and security option in Windows Server 2019 that helps foil malware, such as computer viruses, Trojan horses, and worms by preventing such programs from using system memory space.

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option. What should Ivan do?

Disable file caching and flushing* This will enable Ivan to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use.

________ variables are used to tell the operating system where to find certain programs and program-related information. (fill in the blank)

Environment*

A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.

False* Windows PowerShell can be used to view, install, and remove Windows roles and features. For example, Get-WindowsFeature | ogv will display installed and available roles and features, including the service name for each one.

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT You will find the relevant settings under the HKEY_CLASSES_ROOT key. This key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER.

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.* The Web server software on SERVERX is using port 443 for HTTPS access, so Jenaro most likely used another port for HTTPS traffic to the Windows Admin Center. This means that Jenaro must append the port number to the URL to connect to the Windows Admin Center.

Match the following Virtual Memory terms with their descriptions.

Moved from physical memory into virtual memory on a disk. a. Pages* The area of a disk that is allocated for virtual memory is called this. c. Paging File*

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

Performance* Shweta needs to use the Performance pane to configure this setting. The Performance pane allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts.

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side. Which of the following features allowed Shae to start using the keyboard straightaway

Plug and Play (PnP)* The feature that allowed Shae to start using the keyboard straightaway is called Plug and Play (PnP). PnP allows your operating system to work with hardware devices to automatically detect and configure recently installed hardware to work with the operating system.

Choose the three power plans that are already created on Windows serve.

Power saver* Balanced* High Performance*

Kristian uses the following command on Windows PowerShell to view a list of all cmdlets: PS C:\Users\Administrator>Get-Command | More The command displays a subset of the total output and follows it with the word More. On clicking the return button, the next set of results is displayed. Kristian wants to exit this and return to the PowerShell prompt. Which of these keys should Kristian press?

Q* Using the Q key will let Kristian exit the results and return to the PowerShell prompt.

What are the five root keys that exist in the Windows Server 2019 Registry?

The Windows Server 2019 Registry is made up of five root keys: *HKEY_LOCAL_MACHINE * HKEY_CURRENT_USER * HKEY_USERS * HKEY_CLASSES_ROOT *HKEY_CURRENT_CONFIG

Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file. What is the most likely reason that Calvin's computer failed to create the dump file?

The paging file is disabled on the computer* The most likely reason that Calvin's computer did not create a dump file is that the computer did not have a paging file. The paging file is important for computer performance and to create a crash dump file in the event of a crash.

What is the use of loop constructs within PowerShell scripts?

They allow you to iterate through collections and repeat tasks until a condition is met.* An important programming construct that is useful within PowerShell scripts is a loop construct. Loop constructs allow you to perform a task several times, such as performing the same operation on each of the files within a particular directory. There are many different types of loop constructs available, including foreach, for, while, do...while, and do...until

Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command: PS C:\Users\Administrator>Get-Command | More Why does Alina use the pipe symbol (|) in this command?

To send the output from Get-Command to More, which displays the output page-by-page* Alina uses the pipe symbol ( | ) to send the results of the Get-Command cmdlet to the MS-DOS more command within PowerShell. The more command then displays the output page-by-page, because the output is too large to fit on one page. This process is called piping.

The maximum paging file size on a 64-bit server computer is 256 terabytes.

True*

Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.

True* Commands that you run within PowerShell will consist of cmdlets that have a specific format describing the function of the cmdlet as well as the object or item that it operates on. These cmdlets are case-insensitive, so Get-Host and get-host are equivalent.

Decision constructs such as If and Switch allow you to perform a task multiple times.

True* Loop constructs allow you to perform a task several times. Decision constructs allow you to modify the flow of your PowerShell script.

The System File Checker is useful in recovering system files that have been corrupted.

True* Windows Server 2019 offers the System File Checker to scan system files for integrity and replace damaged or overwritten files with the proper version.

When using the Best Practices Analyzer (BPA) to verify server roles, what are the three levels of severity for problems?

When the BPA verifies server roles and finds problems, the analysis of each role yields a report that shows three levels of severity: · Information—The role is in compliance, but a change is recommended. For example, a server's network interface might have a valid IPv4 address temporarily leased by DHCP, but a static address is recommended for the particular role. · Warning—The role complies under current operating conditions, but this may change if the operating conditions change. For example, the Hyper-V role might become noncompliant if another virtual machine is added for which there is no available virtual disk space. · Error—The role does not meet best practices and problems can be expected.

After data is written to disk, the memory used for that cash today that is freed, via a process called_________. (fill in the blank)

flushing*

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

sfc/scannow You can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell window by executing the sfc/scannow command to scan and replace damaged files.


Related study sets

Q/Christian Faith and Living - Unit 1: Knowing Yourself

View Set

NCLEX Urinary Practice Questions

View Set

Textbook questions OB Exam 3 chapters 18, 19, 20, 21, 22, 23, 25, 30, 31, 33, 34, 35, 36, and 37

View Set

Unit 3 Test: HIT, PCC, Healthcare Organizations

View Set