Server Admin Final Chp7-12

Ace your homework & exams now with Quizwiz!

You are planning to equip a server with a RAID level 5 array with five disks. Each disk has the capacity to store 4 TB of data. What is the total storage size that this RAID 5 array will provide to the server?

16

You are the administrator for an Active Directory domain and have been tasked with improving the response time for resolving DNS queries for resources in a second company-owned domain that does not use Active Directory by creating a zone that is not authoritative itself, but will allow for accessing an authoritative zone on another DNS server. What type of zone can you create to accomplish this?

A stub zone

What resource record type defines an IPv6 host address in DNS?

AAAA record

You are working on configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. You just set up the Network Policy and Access Services server role. What is the next step you should take once the server role has been configured?

Activate the server in Active Directory

The organization you work for does not own any of the hardware or operating systems on which it creates and runs its Web app containers. These components are owned, maintained, and operated by a cloud provider. Which cloud delivery models is your organization using?

Infrastructure as a Service

A developer at you organization wants to host a Windows Web app in a public cloud. They prefer to build the app and host it with a public cloud provider. They also don't want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks. Which of the following cloud service options should they choose?

SaaS

Choose the true statement regarding secondary DNS servers

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

Which of the following is true of Group Policy Objects (GPOs)?

They are not applied directly to Active Directory groups.

The developer group at your organization chose to run a Windows Web app in a public cloud environment using IaaS. but are worried about the cost of running the application on the cloud. What can be done to help optimize the cost of running this Web App in the cloud?

They should install a small footprint virtual machine that runs Server Core, IIS and the necessary Web app frameworks

Container images that are based on Nano Server must be run as Hyper-V containers.

True

You can obtain a Remote Desktop session by navigating to https://servername/RdWeb in a Web browser, where server is the FQDN of a Remote Desktop Web Access server.

True

You just installed the WSL feature on a Web server and installed an Ubuntu Linux distribution. Then you created a new Linux user account, testuser and loged into the Ubuntu system using this user account. Which of the following is true of this scenario?

You can use the testuser account to run administrative commands as the root user.

True or False - Because SSDs use non-volatile memory chips for storage and don't experience the same fragmentation of hard disks, there is no need to optimize them on a regular basis

False

True or False - If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order

False

True or False - Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess.

False

You are evaluating RAID levels for 4 drives to be used on a server read and write performance are important. The particular RAID level you are looking at is described dividing a file into as many sections are there are disks in the RAID array, with each section written to one of the storage devices concurrently. This would mean in your scenario that a file could be written to or read from the RAID array in about a quarter of the time it would take to save or read the same file from a single drive. What RAID level are you considering in this case?

RAID 0

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

Remote Desktop Gateway

A manager at your organization is working remotely. Their current role requires them to access his organization's resources that are running on the remote access server. The Microsoft Outlook application that they use to check their email is actually running on the remote access server on your organization's network, but it appears to him as though it's running on his own system. Which of the following options makes this possible?

RemoteApp

Which of the following methods can be used to create a storage pool using storage devices located on different servers on a network?

Storage Spaces Direct

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

The NAT router should be a Next Generation Firewall.

You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands will remove stopped containers?

docker container prune

You requested additional storage on the SAN from the storage administrators in your organization. They mentioned that the storage was provisioned on the iSCSI SAN and provided the relevant details for you to access it. What is the storage device that was made available to the server called?

iSCSI Target

Clients cache what they learn from a DNS server for a period of time to help minimize requests related to that record. For instance, opening a browser and going to google.com will: Initiate a DNS request to the DNS server Receive the DNS response Cache the response for up to 1 day Use this cached information to avoid constantly contacting the server anytime you load a Google page. This causes a problem if a DNS record is changed during the time the client is caching the IP associated with the google.com hostname. What command(s) can be issued clear these cached entries? (select two)

-ipconfig /flushdns -clear-DnsClientCache

You created some GPOs to control settings for specific users. You are trying to ensure that the GPO settings will apply only to these specified users and not to any other groups or users withing the OU. How can you ensure that this GPO is only applied to these specific users?

Create a new group containing only the specified users, then configure Security Filtering for the GPO to only include this group

You just created a new scope, Sales LAN, for a DHCP server in your organization. You wants to assign a specific IP address to a printer in the sales department, but don't want to set it to a static address because that makes it more difficult to manage. What should you do to make sure the printer gets a specific IP address when it requests one from the server?

Create a reservation for the specific IP address in the scope, which allows you to associate that IP to this specific printers MAC address

You just got done setting up your DHCP server with DHCP relay agents in appropriate subnets and everything is working great. Based on your research during the setup process you are somewhat concerned about "rogue" DHCP servers leasing IP addresses to your organizations clients. Why is this a valid concern?

DHCP clients will accept the first offer the receive and decline all other offers - This means if the rogue DHCP server answers first, a client will accept its offer

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines, including the different software applications that are required for various training offerings.

Infrastructure as a Service

_______ a filesystem makes that filesystem accessible as a drive letter to Windows and users of the OS

Mounting

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What is the reason for this difference?

NTFS is a journaling filesystem, while FAT32 is not

You are working on configuring DirectAccess for a group of users in his organization. One of the requirements at you organization is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network. Which of the following options is the correct way to use on the Enable DirectAccess Wizard?

Not selecting the Use force tunneling option

After downloading a container image from Docker Hub, you create multiple containers using the docker run command. After a few minutes, you download another container image and create multiple containers. Upon noticing that you are running out of system resources, you decide to stop some containers. Which of the following commands is the best choice to view the containers that are currently running?

PS C:\> docker ps

You are using the following command to search Docker Hub for containers that have IIS installed: PS C:\> docker search iis The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. You want to download the latest version of the microsoft/iis container from Docker Hub. Which of the following commands should you run to do this?

PS C:\> docker pull microsoft/iis

You are looking to enforce some security settings across your domain and just configured and deployed a new GPO at the domain level in your organization. However, when you checked after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?

The Block Inheritance setting was applied on them and prevented the OUs from applying the GPOs.

You just installed IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, you installed an HTTPS encryption certificate on the Web server. Next, you configured Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning. Which of the following is most likely causing this issue?

The FQDN in the HTTPS certificate does not match the Web server FQDN.

Two user just reported network issues on their computers, so you are troubleshooting the problem. You notice that both computers are using the same IP address, 192.167.1.85. Your organization uses DHCP, but you verified that no other DHCP servers are active for the subnet in question. Which of the following is likely the cause of the problem?

The IP addresses were configured manually to the same IP when deployed for testing and the technician forgot to change the network adapter configuration back to dynamic addressing

You are setting up Round Robin DNS for a web server with a FQDN myserver.myorg.com To do so, you deployed two identical VMs running the web server software in two different subnets. One with an IP address of 192.168.1.75 One with an IP address of 172.6.0.15 Then, you created two A records for the FQDN that will be used in the Round Robin balancing The first with the IP address of 192.168.1.75 The second with the IP address of 172.6.0.15 To test the setup, you use a PC with an IP Address of 172.6.0.178 to perform a forward lookup for myserver.myorg.com Which of the following statements is true in this scenario?

The client will contact the Web server with the address 172.6.0.15.

You recently installed IIS on a Web server and created two websites. You just configured the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding was successful. Then you tried to bind the HTTPS protocol to the second website. Why was there an issue when trying to bind HTTPS to the 2nd site?

The first website is using port 443, so the second website cannot use the same port and will need to use a different port

True or False - It is possible to deny a specific device the ability to lease an IP address from a Windows DHCP server

True

True or False - The Remote Desktop app uses Remote Desktop Protocol (RDP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server

True

True or False - When some computers have incorrect address information, you should check for the presence of unauthorized DHCP servers on the network running a non-Windows operating system and remove them if found.

True

True or False - Windows Server can also be configured as an iSCSI SAN device to provide SAN storage to other devices

True

Your organization needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers Which of the following will ensure that the software is installed only on the 32-bit computers?

Using a WMI filter to target only the 32-bit systems

You are creating a new remote access policy for the sales department in your organization. On the Specify Conditions screen of the wizard to create new policies, You select the option to grant or deny access according to user dial-in properties. In which of the following circumstances will this permission be used?

When a user account has the Control access through NPS Network Policy option set

You are looking to install Docker on a Windows Server 2019 server in order to run Liux containers. You have two options to download and install the Docker Enterprise Edition (Docker EE) —either DockerMsftProvider or DockerProvider. You chose to download the package using the DockerProvider Windows PowerShell module. Was this a good choice?

Yes - DockerProvider is required to run Linux containers

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?

2048-bit encryption

Users at your organization currently need to manually initiate a VPN connection when remotely accessing the organization's servers. You received regular requests from users to simplify the process of accessing the organization's servers. Which of the following options should you implement to make to address their complaints?

DirectAccess

You are system administrator at your organization and want to run containers on Windows Server 2019. You just got done installing Docker by using the Windows containers component. Which of the following is a service that will help you manage and run Docker containers on the server?

Docker daemon

You just set up a remote access server (RAS) for yourorganization. You have also configured VPN access on the NAT router. Next, you need to set up the client systems that will be allowed to access the RAS. You need to ensure that the client and server communicate using the most secure authentication method. Which of the following methods should Kyra ensure is supported on both the client and the server?

Extensible Authentication Protocol (EAP)

The IUSRS group in a workgroup is used to provide anonymous access to both website and Web app content.

False

The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB.

False

True or False - The only way to configure failover for DHCP is to manually split the subnet so that half of the addresses are available in a scope on one server, and the other half is available in a scope on 2nd server

False

True or False - a 256-bit encryption key is 2x as difficult to guess compared to a 128-bit encryption key

False

What SAN technology operates over fiber optic cables at speeds of up to 128gb/s, and can potentially operate over Ethernet networks if the SAN devices supports it?

Fibre Channel


Related study sets

Emergency Preparedness and Response Course- CBRN for Medical Personnel and First Responders

View Set

American Yawp Chapter 16 quiz answers

View Set

PLTW Brainstorming and Design Process

View Set

Abscond - (v) to run off and hide Access - (n) approach or admittance to places, persons, things; an increase; (v) to get at, obtain Anarchy - (n) a lack of government and law; confusion Arduous - (adj) hard to do, requiring much effort Auspicious - (adj)

View Set

BLAW 371 Chapter 11: Uniform Commercial Code

View Set