Network Admin/ Microsoft "Midterm"

Ace your homework & exams now with Quizwiz!

What is the IP address that is assigned to the network loopback interface?

127.0.0.1

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure. What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?

2

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

A cloud-based server

Your university has installed a shared printer, Print_MV, on SERVERX. To accommodate the large amount of print jobs generated by the students, the spool folder needs to be placed in a storage device with a large capacity. Which of the following tabs under the print server properties dialog box can be used for this purpose?

Advanced

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so.

Which of the following organizations should consider using Azure Active Directory?

An organization that subscribes to Office 365 services

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS.

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention

Deion is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the generation for his virtual machine, he is prompted to select the memory and an optional choice to enable the use of dynamic memory. He consults a colleague, Kanesha, and they decide against enabling dynamic memory. What is the most likely reason that prompted this decision?

Deion intends to use this virtual machine in a nested virtualization configuration.

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide a solution?

Distribution groups

Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs. Help Don choose the right size of the virtual hard disk files.

Don should use thin provisioning.

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs. Where will the virtual machine configuration files be stored?

E:\VMs\Virtual Machines

Alaska, a system administrator, copies important and sensitive encrypted files from an NTFS filesystem to various locations on the network. As the files are encrypted, she is not worried about anyone accessing the files. However, the file copy in one of the locations is no longer secure as it has been decrypted and can be read by anyone who has access to the folder. Which of the locations is most vulnerable to theft among the locations where the files have been copied?

FAT32 on a Windows 7 system

T or F, A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.

False

T or F, By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, Foreign Security Principals, Managed Service Accounts, and User.

False

T or F, By default, the only site created within a new forest does not contain any domain controller.

False

T or F, If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.

False

T or F, Jonathan has access to the files and folders in a newly created DFS namespace. The files and folders that he does not have access to are hidden. This indicates that the access-based enumeration is enabled by default.

False

T or F, Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

False

T or F, Pausing all documents within a print queue is often performed after performing routine maintenance on a print device, such as changing toner or refilling paper trays.

False

T or F, Storage pinning is the process of planning hardware for a specific server within an organization.

False

T or F, The Device and Printers utility contains print server configuration options that are not available within the Print Management tool.

False

T or F, The Windows 10 Education edition supports Hyper-V but not nested virtualization.

False

T or F, The XPS API stores documents within a spool folder using Enhanced Metafile (EMF) format.

False

T or F, The print server does not spool the print job when branch office users connect to a shared printer across the Internet that has BODP enabled.

False

T or F, To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.

False

T or F, Within a workgroup environment, if EFS keys are not backed up, you can still access EFS files when they are restored after a recovery, provided you are a member of the Administrators group.

False

T or F, You need multiple boot images on a WDS server, one for each operating system.

False

T or F. Decision constructs such as If and Switch allow you to perform a task multiple times.

False

The DFS Replication role needs to be installed to configure folder quotas and file screens.

False

What is the term for domain and forest functions that must be coordinated from a single domain controller?

Flexible Single Master Operations

Freya notices some performance issues with an important Generation 2 virtual machine. She realizes that the issue is caused by the presence of other virtual hard disks on the same physical disk. She has another physical hard disk on her system that is currently underutilized. She decides to use this disk as a pass-through disk to enhance the performance of the virtual machine. If Freya was able to accomplish this task successfully, which of the following must be true?

Freya changed the physical disk's settings to take it offline.

Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command: X | ogv Complete the command by selecting the missing component identified by X.

Get-HotFix

Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization. Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario?

Group Policy

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Which of the following is true of Storage Server 2019?

It cannot be purchased from Microsoft directly.

Which of the following statements is true of a client on a computer network?

It is a computer that requests for resources from another computer on the network.

Which of the following statements regarding a domain functional level is accurate?

It represents the oldest Windows Server version that can be used on a domain controller.

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX. If SERVERX has Web server software installed using port 443, which of the following must be true?

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

Which of the following print server permissions allows users to configure print server settings within the Print Management tool?

Manage Server

Which of the following is the default format used to store documents received by the GDI API for modern print devices?

NT EMF

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder.

Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

On VM2

Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage. Which of the following panes should she use to configure this setting?

Performance

While installing Print and Document Services, Laurel selects an option available under "Role Services." After the printer is configured, her colleagues can access the shared printer using a UNC. Which option do you think Laurel selected?

Print Server

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied.

Identify the process that coverts the documents within the spool folder to a format understandable by the print device.

Rendering

Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so. Which is the following may be a reason for this?

SERVERX is the domain controller for the Active Directory.

Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2. Which of the following commands must you run next in Windows PowerShell to complete your task?

Set-ADDomainMode -Identity domainA.com -DomainMode Windows2012R2Domain

Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed. Which of the following is a best practice that Raven should follow?

She should create the Domain Naming Master role on DC1.

Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network. Which of the following options should Minato enable?

Single-root I/O virtualization

What option should you use on a printer's Advanced properties page if pages from different jobs are mixed?

Start printing after last page is spooled

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each document?

Sysprint.sep

Which of the following statements regarding the use of system and user environment variables is accurate?

System environment variables are always set first.

What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails. Which of the following is most likely to have caused the installation failure?

Tamara's computer has 30 GB free hard disk space.

Which of the following tabs help configure the times that a printer is available to users, the printer priority, the printer driver, and spooling options?

The Advanced tab

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

Rhonda's company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent. Which of the following is the most likely cause for this issue?

The blackout took down the Internet, so Rhonda can't reach the email server.

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

The file is decrypted and placed onto the FAT32 volume.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions.

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. Which of the following reasons justifies Lehana's choice?

The guest operating system on the virtual machine is a 32-bit version of Windows 7.

Nora is a data scientist and works with programs that routinely acquire a lot of data. After data analysis, she stores the raw data for future use. However, she does not want the Windows Search Service to include the data files every time she performs a search function. ​ Which of the following attributes should Nora deactivate to exclude the data files from searches?

The index attribute

What happens when a print job exceeds the print device storage capacity?

The print jobs are divided into smaller parts and sent to the print device sequentially.

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

The responding computer

You are attempting to upgrade a server from Windows Server 2008 R2 to Windows Server 2019 Standard Edition. What must be done in order to accomplish the upgrade?

The server should be updated to the latest service pack for 2008 R2 and then upgraded to Server 2012 R2, after which the server can be upgraded to Server 2019.

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Miguel creates a virtual machine with default settings?

The virtual machine will have a 127 GB dynamically expanding hard disk.

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes and permissions, and execute files, but cannot view file contents.

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host.

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system

T OR F, Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.

True

T or F, Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.

True

T or F, Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission.

True

T or F, Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service.

True

T or F, Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.

True

T or F, Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets.

True

T or F, Selecting a shared printer within the Print Management console and clicking on More Actions, Properties from the Actions menu, you will be able to change the printer name, location, and comment.

True

T or F, The System File Checker is useful in recovering system files that have been corrupted.

True

Malaika purchased a print device that can be automatically configured by the system. The print device is PnP-capable, and it does not have a network interface. Which of these should Malaika use to connect the print device to the system?

USB

If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?

Universal Group Membership Caching

You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management. What should you do next?

Update all the domain controllers running Windows Sever 2012 to Windows Server 2016

What is the term for programs and system software that can query WMI?

WMI consumers

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use to access the server?

Windows Admin Center

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

Which of the following tools can be used to create an unattended answer file?

Windows System Image Manager

Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes. Which of the following permissions should the administrator give to the project manager?

Write extended attributes

Imala, a research scientist, wants to encrypt a document that contains her research data as she does not want the content to be made public before it is published. She is using the Command Prompt window to configure the encrypt attribute. Which of the following commands should Imala use to configure the encrypt attribute?

cipher.exe


Related study sets

ECO 202, Chapter 14: Part C & Quantity of Money Theory

View Set

Principle of Microeconomics Exam 3 Study Set

View Set

CH: 16 POST- OP NURSING MANAGEMENT SET 2-MED SURG I

View Set

Principles of Macroeconomics Mississippi College (Dr. Bolen) Exam 2 (Chapters 8,9,10,11)

View Set

Interactions between organisms and the environment

View Set

7 - Quantitative Measures and Investment Risks

View Set