Win Server Test Chapters 1 - 9 Final Exam
What administrative share on a Windows machine will provide network access to the Windows folder on the boot volume? $Admin SYSVOL NETLOGON $IPC
$Admin
Roles and features can be installed to an offline VHD file by using the _____________ option.
-VHD
Security templates make use of the _________ file extension.
.inf
In CIDR notation, the subnet mask 255.255.255.0 is represented by what prefix? /21 /22 /23 /24
/24
Each Group Policy Object is assigned a globally unique identifier (GUID) of what length? 16 bits 32 bits 64 bits 128 bits
128 bits
Select below the prefix used by all Teredo related addresses: 2002::/16 2001::/32 2005:900d::1/16 2001::/64
2001::/32
Edition of Windows Server 2012? 10 15 25 50
25
How many bits make up an IPv4 address, versus an IPv6 address? 16; 32 32; 48 32; 128 48; 128
32; 128
A workstation line of processors typically supports up to how many physical CPUs?
4 CPUs
On which UDP port do DHCP servers listen for DHCP client messages? 66 67 68 69
67
Match each item with a statement below. *An IPv4-to-IPv6 transition protocol that provides automatic tunneling of IPv6 traffic over an IPv4 network.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
6to4
By default, the Windows password policy requires a minimum password of what length? 4 characters 6 characters 7 characters 9 characters
7 characters
What is a fully qualified domain name (FQDN)?
A domain name that includes all parts of the name, including the top-level domain.
What happens to the permissions of a file or folder that is moved within the same NTFS volume?
A file or folder moved within the same NTFS volume retains its original permissions.
A physical printer containing paper and ink or toner to which print jobs are sent is known as? A print server A printer A print device A printer queue server
A print device
What is a page file used for within the Windows operating system?
A system file in Windows used as a virtual memory and to store dump data after a system crash.
Which of the following scenarios would provide for an ideal use of the ReFS file system? A small storage drive in which users will use compression to save disk space A volume which should maintain high reliability A volume requiring strict encryption of confidential information A volume on which administrators can control disk space utilization
A volume which should maintain high reliability
Match each item with a statement below. *An entry in a discretionary access control list (DACL); includes a security principal object and the object's assigned permissions.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Access control entry (ACE)
What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest? Active Directory Schema Master Active Directory Consistency Checker Active Directory Certificate Services Active Directory Recycle Bin
Active Directory Recycle Bin
Match each item with a statement below. *The transfer of information between all domain controllers to make sure they have consistent and up-to-date information* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Active Directory replication
The ______________ resolves a computer's IPv4 address to its physical, or Media Access Control (MAC) address.
Address Resolution Protocol (ARP)
What load balancing mode utilizes an algorithm based on an outgoing packet's properties? Dynamic LACP Address hash Hyper-V Port
Address hash
What special identity group is used when a user accesses an FTP server that doesn't require user account logon? IIS_IUSR Anonymous logon Everyone Domain Users
Anonymous logon
Match each item with a statement below. *A process that confirms a user's identity, and the account is assigned permissions and rights that authorize the user to access resources and perform certain tasks on the computer or domain* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Authentication
What service option can be used to force a service to start automatically after all other automatic services have started?
Automatic (Delayed Start)
Match each item with a statement below. *A method of automatic IP address assignment that occurs when a computer can't contact a DHCP server.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Automatic Private IP Addressing (APIPA)
The IP address 129.53.82.20 falls under what class of IP addresses? A B C D
B
Match each item with a statement below. *A connection system that uses a printed circuit board instead of traditional cables to carry signals* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Backplane
Match each item with a statement below. *A traditional Windows or DOS disk arrangement, in which the disk is partitioned into primary and extended partitions.* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Basic disk
Why is it unnecessary to create trust relationships between domains in the same forest?
Because they are established automatically between all domains in a forest
Why might the use of a virtual disk be preferable to the use of a physical volume?
Because virtual disks have the advantage of being portable
Match each item with a statement below. *A packet addressed to all computers on the network.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Broadcast
How can a shared printer provide support to multiple versions of the Windows operating system?
By installing different printer divers
How can an administrator create a hidden shared folder? By placing a $ at the end of the share name By selecting the "hidden" NTFS attribute By renaming the folder to include [hidden] at the beginning of the folder name By removing the "Everyone" group from the Share permissions tab
By placing a $ at the end of the share name
What folder is selected by default for scanning when using the Automatically Generate Rules option in creating AppLocker policies? C:\Users\user\ProgramData C:\System32 C:\Program Files C:\Users\user\Program Files
C:\Program Files
Match each item with a statement below. *The use of IP addresses with their default subnet masks according to their address class: A, B, or C* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Classful addressing
Match each item with a statement below. *The use of IP addresses without requiring the default subnet mask. * Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Classless Interdomain Routing (CIDR)
Match each item with a statement below. *A license required by law for each user who logs on to a Windows Server 2012 server* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Client access licenses (CAL)
________ is a collection of technologies for abstracting the details of how applications, storage, network, and other computing resources are delivered to users.
Cloud computing
Match each item with a statement below. *A directory partition that stores configuration information that can affect the entire forest, such as details on how domain controllers should replicate with one another.* Active Directory replication Authentication Configuration partition Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Configuration partition
Why might an administrator use the "arp -d" command?
Contains the entire contents of the ARP cache or a single entry specified by IP address
What are the three ways in which a user can become the owner of a file system object?
Create the file or folder; Take ownership of the file or folder; Assigned ownership
Windows Server 2012 R2 can provide fault tolerance and/or load balancing for file sharing using what service?
DFS
Which Windows Server 2012 R2 role provides automatic IP address assignment and configuration for client computers? AD CS AD DS DHCP DNS
DHCP
What new feature within PowerShell 4.0 allows for the use of declarative statements to manage and maintain servers?
DSC
What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and reduce the identical sets to a single instance, in order to reduce space? Data deduplication Data multiplexing Storage optimizing Disk pooling
Data deduplication
What edition of Windows Server 2012 R2 can have up to 4 TB of RAM, and function as a virtualization host with unlimited virtual instances? Foundation Datacenter Essentials Standard
Datacenter
Match each item with a statement below. *A section of an Active Directory database stored on a domain controller's hard drive.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Directory partition
Match each item with a statement below. *A list of security principals; each has permissions that define access to an object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Discretionary access control list (DACL)
Match each item with a statement below. *The core structural unit of Active Directory; contains OUs and represents administrative, security, and policy boundaries* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Domain
Match each item with a statement below. *A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Domain controller
Match each item with a statement below. *The access a security principal has to a file system object when taking sharing permissions, NTFS permissions, and group memberships into account.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Effective access
Match each item with a statement below. *The combination of permissions assigned to an account from explicit and inherited permissions.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Effective permissions
How can an administrator make only the files and folders to which a user has at least Read permissions visible? Enable share data encryption Add a $ to the end of the file / folder names Enable access-based enumeration (ABE) Use the "Hide files that I don't have permissions to" option within Windows Explorer
Enable access-based enumeration (ABE)
To enable PowerShell remote management, what command must be run? Enable-PSRemoting -allow Enable-PSremoting -force set-Remotemanage -enable Set-Property remote-management -o on
Enable-PSremoting -force
What edition of Windows Server 2012 supports 25 or fewer users, and automatically configures itself as a root domain controller?
Essentials Edition
Due to the limitations of MBR partitioning, what type of partition must be created in order to utilize logical drives? Extended partition Primary partition Logical partition Extra partition
Extended partition
A Server Core installation can't be converted to a Minimal Server Interface. True False
False
NTFS permissions on a file only apply when a file or folder is accessed locally. True False
False
Routing tables are static items, in that entries within the table never change, and no new entries are ever added. True False
False
The 32 bit version of Windows Server 2012 R2 can be upgraded to the 64-bit version using an install disc. True False
False
The Foundation Edition of Windows Server 2012, although limited, supports Hyper-V, and can be installed within a virtual machine. True False
False
The dcpromo.exe command is the preferred method for installing Active Directory on Server Core. True False
False
The first server in a Windows domain network is an ideal candidate for a Server Core installation. True False
False
Thin provisioning allocates all configured space immediately, ensuring that the space is available for the specified virtual disk. True False
False
By default, the Windows Server 2012 firewall does not block incoming ICMP Echo Request packets. True False
False
Windows Server 2012 is the first Windows Server release to have ______________, which allows for the removal of installation files for features that are not used.
Features on demand
Match each item with a statement below. *A collection of one or more Active Directory trees.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Forest
A ____________ is a formatted unit of data that's ready to be transferred to the network medium. It contains a destination and source MAC address and an error-checking code called the frame check sequence (FCS).
Frame
What PowerShell cmdlet can be used to add permissions to a share? GrantSmbShareAccess Set-SmbAccess Set-SmbShare AllowSmbShareAccess
GrantSmbShareAccess
Match each item with a statement below. *A list of settings that administrators use to configure user and computer operating environments remotely through Active Directory.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Group Policy Object (GPO)
Match each item with a statement below. *The operating system running in a virtual machine installed on a host computer* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Guest OS
The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.
HKEY_LOCAL_MACHINE
When installing Active Directory, what must be done to ensure minimal fault tolerance capabilities?
Have at least 2 domain controllers
What is the potential security risk of utilizing a naming standard for user accounts?
He can guess usernames easily
Match each item with a statement below. *The virtualization software component that creates and monitors the virtual hardware environment* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Hypervisor
The use of static teaming requires a switch that is compatible with what IEEE standard?
IEEE 802.3ad
Select below the built-in group that facilitates anonymous access to web resources by Internet Information Services IIS_ANON Users IIS_IUSRS Anonymous logon
IIS_IUSRS
Under what conditions can a hard drive be inserted into a server while it is powered on?
If the server hardware supports hot-add or hot-swap
What is the importance of the forest root domain?
In fact, the first domain is the forest root and is referred to as the Forest root domain. It has a number of important responsibilities and serves as an anchor for other trees and domains added to the forest. Certain functions that affect all domains in the forest are conducted only through the forest root domain, and if this domain becomes inoperable, the entire Active Directory structure ceases functioning.
Remote computers attempting to connect to the local computer are examples of what type of connection? Inbound connections Outbound connections Concurrent connections Firewalled connections
Inbound connections
Select the operations master role responsible for ensuring that changes made to object names in one domain are updated in references to the object in other domains: Schema master RID master Infrastructure master Domain naming master
Infrastructure master
Match each item with a statement below. *A permission that comes from an object's parent instead fo being assigned explicitly.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Inherited permission
What CPU extensions are a prerequisite for installing the Hyper-V role? 32 bit or 64-bit MMX3 or MMX4 Intel-VT or AMD-V SAS or SATA
Intel-VT or AMD-V
Match each item with a statement below. *An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)
The IEEE 802.1ax standard, which allows for the dynamic creation of a team, is known as which protocol below? Switch independent LACP Static teaming PPPoE
LACP
A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage? Direct-Attached Storage Storage Area Network Network Attached Storage Local storage
Local storage
What is a downlevel user logon name used for? Logging into older Windows OSs or using older Windows applications Assigning access to lower security shared folders Logging into servers further down in the domain structure Logging into servers that are marked as "Down" in Server Manager
Logging into older Windows OSs or using older Windows
Match each item with a statement below. *The IP address 127.0.0.1, which always refers to the local computer and is used to test the functioning of TCP/IP* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Loopback address
An administrator needs to install a domain controller in a remote office, with the requirement that the domain controller does not store password information. What type of domain controller should the administrator install?
Member server
Match each item with a statement below. *A Windows server that's in the management scope of a Windows domain but doesn't have Active Directory installed* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Member server
Modern file systems use what component to describe information about files, such as time stamps and attributes? Metadata Data storage methods Filenaming conventions Hierarchical organization
Metadata
Match each item with a statement below. *A value assigned to the gateway based on the speed of the interface used to access the gateway.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Metric
Which permission below can be granted to a user to allow the user to execute applications or scripts? List folder contents Write Read Modify
Modify
What file system in Windows Server 2012 supports features such as encryption, file and folder permissions, and compression?
NTFS
What file system below supports encryption, compression, and use of volumes? FAT16 FAT32 NTFS ISO9660
NTFS
Match each item with a statement below. *The native file-sharing protocol in UNIX and Linux OSs* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Network File System (NFS)
What specifies the rules and format of communication between network devices?
Network Protocols
Match each item with a statement below. *The part of the OS that sends requests to a server to access network resources* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Network client
A _____________ is composed of two parts: NIC hardware and device drivers.
Network interface
Match each item with a statement below. *Software that specifies the rules and format of communication between devices on a network* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Network protocol
If an administrator wants to create a new service, what PowerShell cmdlet should be used?
New-Service
What is the primary container object for organizing and managing resources in a domain? OUs Computer accounts Groups Security principals
OUs
Match each item with a statement below. *Usually the user account that created the object or a group or user who has been assigned ownership of the object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Object owner
Match each item with a statement below. *A domain controller with sole responsibility for certain domain or forest-wide functions.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Operations master
Match each item with a statement below. *An Active Directory container used to organize a network's users and resources into logical administrative units.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Organizational Unit (OU)
Match each item with a statement below. *A system file in Windows used as virtual memory and to store dump data after a system crash* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Page file
Match each item with a statement below. *A logical unit of storage that can be formatted with a file system* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Partition
Match each item with a statement below. *A method for defining how permissions are transmitted from a parent object to a child object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Permission inheritance
What command line utility can be used to upgrade an evaluation edition of Windows Server 2012 R2 to Standard or Datacenter licensed editions?
PowerShell
Match each item with a statement below. *A cloud computing service provided by a company's internal IT Department.* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Private cloud
A simple space storage layout is similar to which non-fault tolerant RAID technology? RAID6 RAID0 RAID1 RAID5
RAID0
Select below the file system that can repair minor file system issues automatically, and supports up to 1 yottabyte volume sizes. FAT32 NTFS FAT16 ReFS
ReFS
What use does the new file system introduced in Windows Server 2012 have?
ReFS for large data storage
If an administrator wants to view the Event Viewer snap-in using a remote machine, what firewall rule group should be enabled?
Remote Event Log Management
The _____________ cmdlet within PowerShell can be used to rename an object in Active Directory.
Rename-ADObject
Which disk subsystem is considered to be the most reliable for use in enterprise and high-utilization environments? SAS SATA SCSI PATA
SAS
Entry-level or departmental servers are typically capable of getting by utilizing what cheaper disk subsystem?
SATA or PATA
What option in the New Share Wizard creates a share that is suitable for Hyper-V? NFS Share - Quick SMB Share - Advanced SMB Share - Applications SMB Share - Quick
SMB Share - Applications
A(n) __________ uses flash memory and the same type of high-speed interfaces, such as SATA or SATA express, as traditional hard disks.
SSD
The __________ folder is a shared folder containing file-based information that's replicated to other domain controllers.
SYSVOL
What Active Directory partition contains the information needed to define objects and object attributes for all domains in the forest? Application directory partition Schema directory partition Global catalog partition Domain directory partition
Schema directory partition
Match each item with a statement below. *An object that can be assigned permission to access the file system; includes user, group, and computer accounts.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Security Principle
Match each item with a statement below. *A file system object's security settings, composed of the DACL, owner, and SACL.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle
Security descriptor
What are the two different types of GPO filtering? Security filtering and permissions filtering SACL filtering and DACL filtering Security filtering and WMI filtering SACL filtering and security filtering
Security filtering and WMI filtering
Match each item with a statement below. *A numeric value assigned to each object in a domain that uniquely identifies the object; composed of a domain identifier and a RID.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)
Security identifier (SID)
Match each item with a statement below. *A common disk interface technology that's inexpensive, fast, and fairly reliable with transfer speeds up to 6 Gb/s* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Serial ATA (SATA)
Match each item with a statement below. *A newer, serial form of SCSI with transfer rates up to 6 Gb/s and higher, typically used in servers and high end workstations* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Serial Attached SCSI (SAS)
What type of Windows Server 2012/R2 installation takes up the least amount of space? Minimal Server Server Core Upgrade Full Installation
Server Core
Match each item with a statement below. *OSs designed to emphasize network access performance and run background processes.* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Server operating systems
If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services over from an older server, what type of upgrade is being performed? Server role migration In-place upgrade Standard upgrade Microsoft Server Transfer
Server role migration
What is the term used by Microsoft to describe a collection of bug fixes and security updates made since an OS release? Service bundle Service patch Service pack Service release
Service pack
An administrator working on a Windows Server 2012 R2 Server Core installation needs to disable DHCP all interfaces on the server. What PowerShell command should be used? Set-NetIPInterface Change-NetIPInterface Set-DHCPClientSettings Set-NetIf
Set-NetIPInterface
Why should an administrator enable the "Encrypt data access" option on a share containing sensitive information?
So when someone is using that share all the data that they copy is encrypted and can't be read in clear text
Match each item with a statement below. *A volume that extends across two or more physical disks, such as a simple volume that has been extended to a second disk* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Spanned volume
Match each item with a statement below. *A storage device that uses high-speed networking technologies to give servers fast access to large amounts of shared disk storage.* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Storage Area Network (SAN)
Match each item with a statement below. *A volume that extends across two or more dynamic disks, but data is written to all disks in the volume equally; provides no fault tolerance but does have a performance advantage* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Striped volume
What PowerShell cmdlet can be utilized to pause a specified running service, or multiple services, separated by a comma? Suspend-Service Stop-Service Halt-Service Pause-Service
Suspend-Service
Which of the following is not a standard component of Teredo tunneling? Teredo client Teredo server Teredo proxy Teredo relay
Teredo proxy
How does a computer determine the network ID based on the IP address and the subnet mask?
The AND operation
What does a file system do?
The method and format an OS uses to store, locate, and retrieve files from electronic storage media
Under what circumstances would a multi-domain structure not be an ideal choice? The structure should allow for different name identities The structure should facilitate easier access to resources The structure should provide replication control The structure should provide differing account policies
The structure should facilitate easier access to resources
In Active Directory, what do the schema classes define?
The types of objects that can be stored in Active Directory, such as user or computer accounts
If shadow copies are enabled on a heavily used volume, how should shadow copies be configured?
They should be there own volume
A Group Policy Container (GPC) stores GPO properties and status information, but no actual policy settings. True False
True
A disk that is initialized via the Disk Management MMC is initialized as a MBR disk by default. True False
True
A solid state drive is a good candidate for storing the page file. True False
True
Active Directory's use of multimaster replication ensures that changes to AD objects are automatically replicated to all domain controllers. True False
True
Every IP address configuration requires the use of a subnet mask, and all hosts on the same network must share the same network ID in their IP addresses. True False
True
GPOs linked to a site object can facilitate IP address based policy settings. True False
True
In order for a software package to be published in Active Directory, it must be configured in the User Configuration node of an applicable group policy. True False
True
The Active Directory Recycle Bin is disabled by default, and can be enabled in the Active Directory Administrative Center (ADAC) True False
True
The recommended minimum number of Active Directory domain controllers in a domain environment is two. True False
True
The shadow copies feature must be enabled on an entire volume. True False
True
Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing. True False
True
Server roles can be installed and uninstalled on an offline VHD file. True False
True
The Disk Management snap-in can be utilized to create redundant disk configurations, such as RAID 1 and RAID 5. True False
True
Match each item with a statement below. *A common network protocol technique that allows transmitting a packet in a format that would otherwise be incompatible for the network architecture by encapsulating the packet in a compatible header format* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
Tunneling
What different types of objects can be members of a distribution group?
User accounts and contacts can be used for distribution group.
What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software? DaaS Remote Desktop IaaS Virtual Desktop Infrastructure
Virtual Desktop Infrastructure
Match each item with a statement below. *The virtual environment that emulates a physical computers hardware and BIOS* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine
Virtual Machine
Match each item with a statement below. *A logical unit of storage that can be formatted with a file system* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume
Volume
The shadow copies feature utilize what service within Windows Server? Volume Backup Service (VBS) Volume Shadow Copy Service (VSS) Windows Backup Service (WBS) Windows Shadow Copy Service (WSS)
Volume Shadow Copy Service (VSS)
The ____________ MMC snap-in can be utilized to configure firewall rules.
WFAS
What purpose does an anycast IPv6 address fulfill?
When more than one router exists on a subnet
If a new shadow copy of a volume needs to be created, but no space is available on the volume for the new shadow copy, what happens?
When the disk space that shadow copies use reaches the specified limit or available space on the volume can no longer accommodate a new shadow copy, older copies are deleted.
How can an administrator configure and manage a remote Windows Server 2012 R2 installation using Windows 8.1?
Windows Workgroup
Which of the following is not a special character that can be utilized in an NTFS file's name? $ ! # \
\
How can an administrator mount an install image to install features? mount-image wim-open mount dism
dism
If the wrong server edition is installed, what command can be used to change to a different edition? netdom Change-Edition dism netsh
dism
When using the ping utility, what type of ICMP packet is sent to the remote ping target?
echo reply
What are the four different character types that can make up a Windows password?
give out random passwords with characters
What is the most critical component to consider when evaluating disk performance?
how fast the drive can transfer data for an extended period
What command when entered in a command prompt will display information related to IP address settings, such as DHCP server and DNS server information?
ipconfig /all
Match each item with a statement below. *A reserved name that corresponds to the loopback address 127.0.0.1.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4
localhost
What command can be used to send test queries to a target DNS server? nslookup ping tracert route
nslookup
A(n) ___________ is a grouping of information that describes a network resource, such as a shared printer; an organizing structure, such as a domain or OU; or an account, such as a user or group.
object
The default location for computer accounts that are created automatically after joining the domain can be changed using which command? netdom computer account location redircmp Add-Computer -OU djoin OU
redircmp
What command line utility can be used to display the default route, as well as all routing table entries? ipconfig route show route net print route
route
When working with a Server Core installation of Windows Server 2012, what utility should be used to perform initial configuration tasks? MMC Server Manager sconfig netdom
sconfig
Services that require other services in order to run properly are said to have _____________.
server dependencies
The ____________ command is known as the trace route command, because it displays the route packets take between two computers.
tracert
If an administrator wants to test the results of a PowerShell cmdlet without actually performing the cmdlet's operations, what option should be used? -TestOnly -WhatIf -TestRun -Results
-WhatIf
Which of the following is a valid IPv6 address? FE80:0:0:9F28::10::1 2001::0:0:0:9:: 2001::1 fe80:0:0:0:18ff::0024:8e5a:60
2001::1
What is the maximum number of virtual processors supported by Hyper-V 3.0? 8 16 32 64
32
How often are Group Policy Objects updated on domain controllers? 90 minutes 30 minutes 5 minutes 70 minutes
5 minutes
When using Shadow Copies, how many different versions of a file can be kept? 32 64 128 16
64
Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forests, domains, and domain controllers. AD DS AD LDS AD FS AD RMS
AD LDS
What role provides services for creating, issuing, and managing digital certificates that can be used to verify identities? Active Directory Domain Services Active Directory Certificate Services Active Directory Federation Services Active Directory Rights Management Services
Active Directory Certificate Services
A network administrator can join a computer to a domain using what PowerShell cmdlet? Add-Computer netdom Join-Domain Set-Domain
Add-Computer
Which of the following choices is not one of the three teaming modes? LACP Address hashing Static teaming Switch independent
Address hashing
Disks that are formatted using the GUID Partitioning Table (GPT) can hold larger volume sizes, and benefit from increased reliability provided by which feature below? Message Digest 5 (MD5) Journaling Secure Hash Algorithm (SHA) Cyclic Redundancy Check (CRC)
Cyclic Redundancy Check (CRC)
What is the most typically used group type conversion? Distribution group -> security group Security group -> distribution group Universal group -> domain local group Domain local group -> global group
Distribution group -> security group
Select the true statement regarding the conversion of group scope: Universal groups that are members of other universal groups can be converted to domain local groups Universal groups can be members of global groups Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups Global groups can't be converted to universal groups
Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups
Which load balancing mode is the default mode within Windows Server 2012 R2, and uses an even distribution of traffic among all team members, including virtual NICs? LACP Address hash Dynamic Hyper-V Port
Dynamic
Which version of Windows Server 2012 is available through OEMs only, and is limited to a maximum of 15 users? Foundation Edition Essentials Edition Datacenter Standard
Foundation Edition
In what order are Group Policy Objects applied? Local policies, site-linked GPOs, domain-linked GPOs, OU-linked GPOs Site-linked GPOs, domain-linked GPOs, OU-linked GPOs, local policies Domain-linked GPOs, OU-linked GPOs, local policies, site-linked GPOs Site-linked GPOs, local policies, domain-linked GPOs, OU-linked GPOs
Local policies, site-linked GPOs, domain-linked GPOs, OU-linked GPOs
Which of the following statements is true regarding permission inheritance? Permission inheritance is disabled by default The "Replace all child object permissions" option is only available at the root folder A folder inherits a subfolder's permissions Permission inheritance is enabled by default
Permission inheritance is enabled by default
What printer property, enabled by default, might allow a lower priority print job already in the queue to start printing even if a job with a higher priority starts spooling? Render print jobs on client computers Print spooled documents first Print smaller documents first Hold mismatched documents
Print spooled documents first
Dropbox, SkyDrive, and Google Apps are all examples of what type of computing? Public cloud Private cloud Domain Open cloud
Public cloud
Which firewall rule group must be enabled in order to allow for the remote use of the Task Scheduler snap-in? Remote Scheduled Tasks Management Remote Service Management Remote Tasks Remote Task Scheduler
Remote Scheduled Tasks Management
Select the utility below that provides a single interface for installing, configuring, and removing a variety of server roles and features, as well as providing a place to view server status. Server Manager Active Directory Users and Computers MMC PowerShell
Server Manager
Which of the following statements is false? Windows Server 2008 and 2008 R2 can be upgraded to Server 2012 A Server Core install of Windows Server can only be upgraded to a Server Core installation. Cross platform upgrades (such as 32-bit to 64-bit) are not supported You can upgrade to a different language
You can upgrade to a different language
In what order are group policy settings applied? local, site, OU, domain site, OU, domain, local local, site, domain, OU domain, site, OU, local
local, site, domain, OU