TestOut LabSim Chapters 10-13 Test Practice

Ace your homework & exams now with Quizwiz!

Which of the following BEST describes a server endpoint?

A location on a registered server.

Which of the following BEST describes split DNS?

Allows the same name to resolve to different IP addresses.

You have exported a virtual machine to a USB flash drive. You have just installed a new Hyper-V host, and you intend to build a lab environment consisting of several VMs on it. You plug the flash drive into the new host server and begin the import process. Partway through the process, the Import Virtual Machine wizard gives you several import types to choose from. Which of the following import types should you choose?

Copy the virtual machine (create a new unique ID)

Which of the following is a permissions best practice?

Create a group for multiple users with similar needs.

Which of the following is a setting usually made in the BIOS or UEFI that enables efficient virtualization use of the hardware environment?

Hardware-Assisted Virtualization

A user with Read and Execute permissions can do which of the following? (Select two.)

Run executable files within that folder. See the contents of the folder and subfolder.

Which of the following is TRUE regarding a test failover?

Should be performed monthly.

Allows a VM to see traffic from multiple VLANs

Trunking

What are the exceptions to be enabled inside of the firewall when you use virtual machine monitoring? (Select two.)

Virtual Machine Monitoring Remote Service Management

Which of the following BEST describes VNets?

Which of the following BEST describes VNets?

What is the maximum capacity of the Azure VM disk that holds the operating system?

4095 GB

When creating the file share for Azure File Sync Service, which port should you verify is not blocked by your firewall or ISP?

445

Which of the following BEST describes a WAP?

A Windows Server service that allows users to use any device to access applications from outside the corporate network.

Which of the following BEST describes a global catalog?

A database that contains a partial replica of every object from every domain within a forest.

Virtualization is the ability to install and run multiple operating systems concurrently on a single physical machine. Windows virtualization includes several standard components. Drag the component on the left to the appropriate description on the right. (Each component can be used once, more than once, or not at all.)

A file that resides within the host operating system and serves a storage device for the virtual machine. correct answer: Virtual hard disk (VHD) A thin layer of software that resides between the guest operating system and the hardware. correct answer: Hypervisor The guest operating system that is a software implementation of a computer that executes programs. correct answer: Virtual machine The host operating system that has hardware, such as storage devices, RAM, and a motherboard. correct answer: Physical machine Appears to be a self-contained and autonomous system. correct answer: Virtual machine Allows virtual machines to interact with the hardware without going through the host operating system. correct answer: Hypervisor

Which of the following BEST describes Node.js?

A free (open-source) backend runtime environment that works across multiple platforms.

Which of the following BEST describes namespaces?

A group of shared folders on a server.

Which of the following BEST describes a pool?

A logical concept composed of the free space available on the specified storage devices.

Which of the following BEST describes an Azure network adapter?

A point-to-site (P2S) VPN connection

Which of the following BEST describes a network policy?

A set of conditions, constraints, and settings used to authorize which remote users and computers can or cannot connect to a network.

Which of the following BEST describes a multi-master model?

A system that allows updates or changes to be made at any domain controller and replicated to other domain controllers.

Which of the following features are used by clients and provided by the RADIUS server? (Select three.)

Accounting Authentication Authorization

Which of the following is true regarding asynchronous replication?

Acknowledgement of the write operation is sent to the application without waiting for an acknowledgement from the replication partner.

You manage the network infrastructure for the westsim.com domain. All servers have recently been upgraded to Windows Server 2016, and all clients run Windows 10. All server and client computers are members of the domain. You have configured a DFS solution with a domain-based DFS root. Srv1 hosts the DFS root, and the namespace is named Sales. A single folder named Contacts in the DFS root points to the SalesSF shared folder on Srv3. You would like to provide redundancy so that the data in the Contacts shared folder will still be available, even if Srv1 goes down. You want to use Srv4 to provide the redundancy. What should you do?

Add Srv4 as a namespace server.

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. You are responsible for a server named HV1 that has the Hyper-V role installed. HV1 hosts a virtual machine that runs a custom web application that is in use 24 hours per day. The virtual machine has one hard drive that is hosted on a 127 GB expanding virtual hard drive (.vhdx). The server is running out of room. Management would like to upload 100 GB of new media files for use in the web application. You need to provide more storage space inside the virtual machine while minimizing downtime for the custom web application. What should you do?

Add a new virtual hard drive (.vhdx) to a SCSI controller.

On your Windows server, you share the D:\Reports folder using a share name Reports. You need to configure permissions on the shared folder as follows: Members of the Accounting group should be able to view files, but not modify them. Phil, a member of the Accounting group, needs to be able to open and edit files in the Shared folder. You need to assign the necessary permissions without assigning extra permissions beyond what is required, and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Add the Accounting group and assign the read permission. Add the Phil user account and assign read/write permission.

Srv7 currently has a single hard disk. The System volume takes up the entire hard disk. You need to create a new volume named Data for storing files used by applications running on the server. You want the new volume to optimize performance. Fault tolerance is not necessary for this volume. What should you do?

Add two hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

What happens to data when cloud tiering is disabled?

All data is synced from the cloud to the server endpoint.

Which of the following BEST describes Azure Bastion?

Allows a user to connect to a virtual machine using the Azure portal on a browser.

Which of the following BEST describes ABE?

Allows you to hide specific files and folders for users who don't have access permission.

What is the primary purpose of RADIUS?

Authenticate remote clients before access to the network is granted.

Which of the following is true regarding system requirements for implementing Storage Replica?

Both storage devices must be exactly the same size.

You work for a company that has headquarters in Seattle and an office in Olympia. The office in Olympia has five client computers that run Windows 10. The Olympia office is connected to the Seattle office with a WAN link. All servers are located in the Seattle office, and shared files are stored on those servers. You want to improve file access for users in the Olympia office to meet the following requirements: Copies of files should be saved on the client computers in the Olympia office. Only a single copy of each file should exist in the Olympia office. Files should be transferred only once from the Seattle office to the Olympia office (unless the file has changed). Copies of files in the Olympia office should be shared and available to all computers in that office. Files should be encrypted during transit between the two offices. Which feature should you implement in the Olympia office?

BranchCache

You are the network administrator for a small manufacturing company. You have ten regional sales people who travel extensively and have been provided Windows laptop computers. The mobile users have complained that, although they can take copies of important files with them into the field, occasionally they have been caught with out-of-date documents because no one told them the files had been updated. Additionally, some of these files need to be distributed to all the other sales staff. What should you do to address this problem and easily provide the appropriate access to these shared files?

Configure Offline Files for the folder that contains these files.

You are the network administrator for a small company using Windows Server 2016 and Windows 10 clients. A few of the company's employees want to work from home occasionally . You have decided to provide access using a VPN. What should you do?

Configure a remote access VPN.

You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2016 and holds all shared files for the company. The office in Olympia has five client computers that run Windows 10. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using distributed cache mode. Using Group Policy, you enable the following policies: Turn on BranchCache Set BranchCache Distributed Cache mode What else is required to complete the configuration?

Configure advanced firewall rules to allow the necessary ports.

Which of the following are features and benefits of Windows containers? (Select two.)

Containers are disposable. Containers are highly portable.

You are planning a server virtualization implementation using Hyper-V. Your virtualization solution must meet the following requirements: Both 32-bit and 64-bit operating systems will be installed as virtual machines. You need to install six virtual machines. All virtual machines must be able to communicate with each other. Virtual machines should not be able to communicate with any other network devices. Virtual machines should not be able to communicate with the management operating system. What should you do?

Create a private network

You are planning a server virtualization implementation using Hyper-V. Your virtualization solution must meet the following requirements: Both 32-bit and 64-bit operating systems will be installed as virtual machines. You need to install six virtual machines. You will manage the services running on the virtual machines from a Windows computer. What should you do?

Create an external network

By default, Hyper-V Replica only handles updating the state of the operating system, but not the state of any applications running. What do you need to do if you need to recover the state of the applications?

Create app-consistent recovery points.

Prevents a VM from being used as a rogue DHCP server

DHCP Guard

Which of the following is TRUE regarding a unplanned failover?

Data loss may occur.

You need to be able to create standard Windows Server containers on a Windows Server 2016 system that is using the Desktop Experience deployment. Which of the following tasks must be completed on the server? (Select two. Each correct answer is part of the complete solution.

Download and install the Docker engine. Install the Containers feature.

Which of the following BEST describes Single-root I/O virtualization?

Enables Network traffic to bypass the software switch layer of the Hyper-V virtualization stack.

Which of the following is a characteristic of TACACS+?

Encrypts the entire packet, not just authentication packets.

After installing the Azure File Sync agent, you are prompted to register your server. What does the registration do?

Ensures that a trust relationship has been established.

If you copy a file to a different folder on the same partition, which of the following are true?

Explicit assignments are removed and permissions will be inherited from the new parent folder.

You want to implement an Azure WAN solution that does not utilize the public internet and increases security, speed, and reliability. In addition, you want to utilize P2P Ethernet network connectivity. Which of the following Azure WAN solutions will meet your networking requirements?

ExpressRoute

Click on the menu option that allows you to verify that the virtual machine queue feature is enabled for a virtual machine.

Hardware Acceleration

Which of the following BEST describes node fairness?

Identifies overloaded nodes and then redistributes virtual machines to the other nodes.

Which of the following is true regarding cloud tiering?

Is optional but configurable to reduce the storage needed locally.

Which of the following is TRUE regarding an Azure extended network?

Lets on-premises VMs keep their original on-premises private IP addresses when migrating to Azure.

During which migration type can be the migration be planned or unplanned?

Live migration

Which report includes SQL Server, SharePoint Server, and Exchange Server?

Microsoft workload discovery report

Which of the following BEST defines Storage Quality of Service?

Monitors and manages the storage performance of virtual machines.

Provides bandwidth aggregation

NIC Teaming

You want to implement Hyper-V so you can create a lab environment that mirrors your production network for testing applications before deploying them into your production environment. You're planning on having four virtual Windows servers in this lab environment. You plan to use hardware that you already have on hand to create your first Hyper-V host system. You have an unused system with the following specifications and OS installed: A 64-bit processor with second-level address translation (SLAT). VM monitor mode extensions. UEFI that supports virtualization with the following features:Hardware-assisted virtualization with Intel VT.Data Execution Prevention (DEP) enabled with Intel Execute Disable Bit (XD). 4 GB RAM. Windows Server 2016 Standard Edition with the Desktop Experience deployment. Will this system allow you to create your lab environment?

No. You need more RAM to support four virtual machines.

What should you do before you start configuring a remote desktop gateway?

Obtain an SSL certificate

Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks?

PAP

You are the network administrator for Corpnet.com. The network has two servers that run Windows Server. They are named HV1 and HV2. Both servers are running the Hyper-V role and are members of a cluster named Cluster1. HV1 hosts a virtual machine running a Windows server named VM1. HV1 is running low on space. You would like to transfer the VHD file for VM1 to HV2 while you requisition additional space. VM1 must remain available while space is added to HV1.

Perform a storage migration.

Establishes rules that are applied to virtual switch ports

Port ACLs

Copies traffic from one switch port to another

Port Mirroring

You want to make applications available to your company employees without having to install the application on each employee's computer. You can do this by using which of the following?

Remote Desktop Gateway applications

Which of the following are the specific users for which the AD application proxy is designed?

Remote users that need access to legacy applications.

You have decided to create a shared folder that contains sensitive information about planned changes in the personnel structure. Most users will be denied access to the share, which is named REORG. You have successfully created the share and set appropriate permissions. However, management feels the effect of having this share on the server, which denies access to most users, is damaging morale. You need to keep the information available to the users who currently access it. What can you do to avoid having the REORG share listed when users view shares on the network?

Remove the REORG share. Share the folder again as REORG$ with the same permissions as before.

You are the network administrator for westsim.com. The network consists of a single domain. All of the servers run Windows Server 2016. All of the clients run Windows 10. The company has one main office and one branch office. A file server named FS1 is located in the main office and hosts several shares. A member server named DC2 is located in the branch and functions as a domain controller. Users at the branch office complain that there are often delays when they access files from FS1. You decide to implement the BranchCache feature. You view the BranchCache configuration of DC2, which is shown in the image. You need to ensure that users in the branch office can retrieve cached files from DC2. Which option will best accomplish this task?

Run the netsh.exe branchcache set service mode=HOSTEDSERVER command on DC2.

The Srv1 server runs Hyper-V and has several virtual servers installed. Currently, most virtual servers are used for testing purposes. The physical system is running out of memory because of all of the virtual machines that are currently active. You want to stop three virtual machines to free up system resources. You want to stop the virtual machines so that all open applications are still open and running when they start again. What should you do?

Save the virtual machine.

Which of the following are standard VPN types used for implementing an Azure WAN solution? (Select two.)

Site-to-site Private connectivity

Controls the throughput of data to virtual disks

Storage Quality of Service (QoS)

Which of the following BEST describes data deduplication?

Stores data in less physical space using sub-file variable-size chunking and compression.

Which of the following volume types seeks to optimize performance by writing data across all disks in the volume simultaneously?

Striped volume

You are the network administrator for westsim.com. The network consists of a single Active Directory domain. The network contains two servers named FS11 and FS12. Both servers are running Windows Server 2016 Datacenter edition. You have implemented Storage Replica as a disaster recovery solution with FS11 and FS12 as replication partners. When a user makes changes to a file that is stored in a shared folder on FS11 and then saves those changes, the following process takes place: FS11 writes the changes to its data disk but does not acknowledge the write operation to the user's application. FS11 replicates the write operation to FS12. FS12 writes the change to its data disk and acknowledge the write operation back to FS11. FS11 sends an acknowledgement to the user's application, letting it know the write operation was successful. Which replication type is being used between FS11 and FS12?

Synchronous

There are several terms used to describe Azure AD application proxy services. Which of the following terms refers to a cryptographic protocol that provides end-to-end security of data sent between applications over the internet?

TLS 1.2

You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. The virtual machine runs Windows Server and a custom application. You receive an update to the application. You want to save the current state so if the update causes any problems, you can easily revert back to the state before the update was installed. What should you do?

Take a snapshot of the virtual machine.

You are using the default file screens groups to block files from being saved on the server. The Marketing department needs to be able to store files the have a .asc extension. Which of the following file group would you create an exception for?

Text files

Match the type of VPN with its description.

Two hosts establish a secure channel and communicate directly.Host-to-host Routers on the edge of each site establish a VPN with the router at the other location.Site-to-site Routers on the edge of each site establish a VPN with the router at the other location.Site-to-site

Which of the following protects you from a single storage device failure?

Two-way mirror

You have implemented an Azure extended network with a firewall between on-premise and the cloud. Which port do you need to open?

UDP 4789

Which data deduplication component could be useful for troubleshooting or data migration?

Unoptimization

You want to view, but not modify, the Windows installation and data files in a VHD file. What should you do?

Use Disk Management to attach the VHD file as read-only.

Your Windows Server has two volumes, C: and D:. For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow modify NTFS permission. You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible. What should you do?

Use the robocopy command to copy the file to the C:\Reports2 folder.

Specific services running within clustered virtual machines can be monitored in Failover Cluster Manager. Before Failover Cluster Manager can be configured to monitor services, you must allow apps and features through the Windows firewall on the virtual machines you want to monitor. The image below shows the Allow apps and features dialog in Windows Server VM. Select the boxes in this dialog that must be enabled to allow Failover Cluster Manager to monitor services on this VM. (Select two.

Virtual Machine Monitoring [] Domain

Allows network traffic to be distributed across multiple CPU cores

Virtual Machine Queue (VMQ)

Which of the following file types are supported by data deduplication? (Select two)

Virtual hard disk files Text files


Related study sets

Chapter 2.1: Classical Atomic Theory

View Set

Potter and Perry, Fundamentals: Chapter 36 - The Experience of Loss, Death, and Grief

View Set

Gastrointestinal Structural & Inflammatory Disorders (Ch. 23 ATI)

View Set

Gem and Gem Minerals Old Final Exam Questions

View Set

OSHA 30 Module 17 Fall Protection

View Set

Chapter 14: Money, Banks and the Federal Reserve System

View Set