NOS Final

Ace your homework & exams now with Quizwiz!

You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory. What type of zone can be used to accomplish this task with minimal overhead?

A stub zone

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perform a reverse lookup?

A PTR record

By default, there are no GPOs created in an Active Directory domain. T/F

False

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order. T/F

False

The terms "program" and "process" are one and the same. T/F

False

There are two types of event logs in Windows Server 2019, Microsoft logs and Windows logs. T/F

False

Which of the following is true of WINS?

It can only resolve NetBIOS names to IPv4 addresses.

If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?

Allow the connection if it is secure

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has a physical connection to the network

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu?

Last Known Good Configuration

Regarding the deployment of Windows Server 2019 VPN services, what VPN protocol is considered the least secure option?

PPTP

You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints?

Secure Socket Tunneling Protocol

Which of the following represents the maximum amount of time that a DNS server or resolver is allowed to cache the result of a forward lookup?

TTL

Lashonda sets up a DNS server, SERVER1, with a forward lookup zone called domainA.com. It hosts the resource records for the domainX.com Active Directory domain. It contains host (A) records for two network interfaces on SERVER1 (172.16.0.10 and 192.168.1.50). The host records are associated with the FQDNs server1.domainA.com and domainA.com. There is also an SOA record and an NS record for the zone. Which of the following records identifies SERVER1 as an authoritative DNS server?

The NS record

The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one Can you identify why this solution is feasible?

The Windows system uses a RAID level 5 configuration.

Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work?

The issue was with the software and not the operating system.

You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate?

The percentage of time a storage device was not performing a read or write function

A demilitarized zone (DMZ) is a network portion existing between two or more networks of differing security policies. T/F

True

A virtual private network (VPN) is a tunnel through a larger network and restricted to designated member clients. T/F

True

Monitoring is a time-consuming task. T/F

True

Performance Monitor allows one to track how individual system resources are being used. T/F

True

The ping utility is used to test the connectivity between two devices on a network. T/F

True

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. T/F

True

When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found. T/F

True

Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)

-WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. -Group Policy is used to direct domain computers to a WSUS server for updates. -Updates can be manually or automatically approved for distribution on a WSUS server. -A WSUS server can be configured to remove updates from computers that have installed them.

What TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

443

What resource record type defines an IPv6 host address in DNS?

AAAA record

A user complains that they are unable to contact a specific server in your organization. You remember that you recently modified the A record for this server on your organization's Active Directory-integrated DNS server. Which troubleshooting step should you try first to remedy the issue?

Clear the DNS cache on the user's computer

Group Policy settings apply to which of the following objects? (Choose all that apply.)

Computers Users

After installing Routing and Remote Access, a default remote access policy is created. What is the default access permission defined in this policy?

Deny access

After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration?

Directory Services Restore Mode

When selecting authentication types for an RAS server, what is considered to be the most secure authentication type?

Extensible Authentication Protocol

What key should be pressed as soon as the computer boots to enter Safe Mode?

F8

The Layer Two Tunneling Protocol uses what set of standards to provide encryption and security for a tunnel?

IP Security (IPSec)

Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information?

Increase the size limit of the event log

By default, where are updates synchronized from in WSUS?

Microsoft Update servers on the Internet

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.)

OU Site Domain

Which of the following is not included in a certificate?

Private key

You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue?

Reboot the router.

What remote access tunneling protocol encapsulates data within HTTP packets for transit across the Internet?

SSTP

You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use?

Security

A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time?

Select the Processes tab of Task Manager and click the CPU column

You are configuring a Windows Server 2019 VPN server using L2TP and NAT. What is NOT one of the ports that needs to be opened on the firewall for this configuration to work?

TCP 1723

Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time?

The Performance Monitor

Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been?

The space for file cache was not sufficient.

You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why?

Yes. Events related to hardware issues are usually recorded in the system event log

Which term refers to the process whereby a user or computer obtains a certificate from a CA?

enrollment

What command can you use to determine if a network service is listening on the correct port number?

netstat -a


Related study sets

Cross Sectional Anatomy Chp 9 Upper Extremities

View Set

Heat and Temperature Science Test

View Set

Evidence Based All Chapters Review

View Set

Chapter 45: Concepts of Care for Patients with Musculoskeletal Problems

View Set

Clinical judgement-Adaptive Assessments (Nursing Concepts Online for RN 2.0, 2nd Edition)

View Set