Win Server Test Chapters 1 - 9 Final Exam

Ace your homework & exams now with Quizwiz!

​What administrative share on a Windows machine will provide network access to the Windows folder on the boot volume? ​$Admin ​SYSVOL ​NETLOGON ​$IPC

$Admin

Roles and features can be installed to an offline VHD file by using the _____________ option.

-VHD

Security templates make use of the _________ file extension.​

.inf

​In CIDR notation, the subnet mask 255.255.255.0 is represented by what prefix? ​/21 ​/22 ​/23 ​/24

/24

​Each Group Policy Object is assigned a globally unique identifier (GUID) of what length? ​16 bits ​32 bits ​64 bits ​128 bits

128 bits

Select below the prefix used by all Teredo related addresses:​ ​2002::/16 ​2001::/32 ​2005:900d::1/16 ​2001::/64

2001::/32

Edition of Windows Server 2012?​ ​10 ​15 ​25 ​50

25

How many bits make up an IPv4 address, versus an IPv6 address?​ ​16; 32 ​32; 48 ​32; 128 ​48; 128

32; 128

A workstation line of processors typically supports up to how many physical CPUs?

4 CPUs

On which UDP port do DHCP servers listen for DHCP client messages? ​66 ​67 ​68 ​69

67

Match each item with a statement below. *​An IPv4-to-IPv6 transition protocol that provides automatic tunneling of IPv6 traffic over an IPv4 network.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

6to4

By default, the Windows password policy requires a minimum password of what length?​ ​4 characters ​6 characters ​7 characters ​9 characters

7 characters

What is a fully qualified domain name (FQDN)?

A domain name that includes all parts of the name, including the top-level domain.

What happens to the permissions of a file or folder that is moved within the same NTFS volume?

A file or folder moved within the same NTFS volume retains its original permissions.

A physical printer containing paper and ink or toner to which print jobs are sent is known as? ​A print server ​A printer ​A print device ​A printer queue server

A print device

What is a page file used for within the Windows operating system?

A system file in Windows used as a virtual memory and to store dump data after a system crash.

Which of the following scenarios would provide for an ideal use of the ReFS file system? A small storage drive in which users will use compression to save disk space ​A volume which should maintain high reliability ​A volume requiring strict encryption of confidential information ​A volume on which administrators can control disk space utilization

A volume which should maintain high reliability

Match each item with a statement below. *An entry in a discretionary access control list (DACL); includes a security principal object and the object's assigned permissions.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Access control entry (ACE)

​What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest? ​Active Directory Schema Master ​Active Directory Consistency Checker ​Active Directory Certificate Services ​Active Directory Recycle Bin

Active Directory Recycle Bin

Match each item with a statement below. *The transfer of information between all domain controllers to make sure they have consistent and up-to-date information* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Active Directory replication

The ______________ resolves a computer's IPv4 address to its physical, or Media Access Control (MAC) address.​

Address Resolution Protocol (ARP)

What load balancing mode utilizes an algorithm based on an outgoing packet's properties? ​Dynamic ​LACP ​Address hash ​Hyper-V Port

Address hash

What special identity group is used when a user accesses an FTP server that doesn't require user account logon?​ ​IIS_IUSR ​Anonymous logon ​Everyone ​Domain Users

Anonymous logon

Match each item with a statement below. *A process that confirms a user's identity, and the account is assigned permissions and rights that authorize the user to access resources and perform certain tasks on the computer or domain​* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Authentication

What service option can be used to force a service to start automatically after all other automatic services have started?

Automatic (Delayed Start)

Match each item with a statement below. *A method of automatic IP address assignment that occurs when a computer can't contact a DHCP server.​* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Automatic Private IP Addressing (APIPA)

The IP address 129.53.82.20 falls under what class of IP addresses?​ ​A ​B ​C ​D

B

Match each item with a statement below. *A connection system that uses a printed circuit board instead of traditional cables to carry signals* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Backplane

Match each item with a statement below. *A traditional Windows or DOS disk arrangement, in which the disk is partitioned into primary and extended partitions.* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Basic disk

Why is it unnecessary to create trust relationships between domains in the same forest?

Because they are established automatically between all domains in a forest

Why might the use of a virtual disk be preferable to the use of a physical volume?

Because virtual disks have the advantage of being portable

Match each item with a statement below. *A packet addressed to all computers on the network.​* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Broadcast

How can a shared printer provide support to multiple versions of the Windows operating system?

By installing different printer divers

​How can an administrator create a hidden shared folder? ​By placing a $ at the end of the share name ​By selecting the "hidden" NTFS attribute ​By renaming the folder to include [hidden] at the beginning of the folder name ​By removing the "Everyone" group from the Share permissions tab

By placing a $ at the end of the share name

What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies? ​C:\Users\​user​\ProgramData ​C:\System32 ​C:\Program Files ​C:\Users\​user​\Program Files

C:\Program Files

Match each item with a statement below. *The use of IP addresses with their default subnet masks according to their address class: A, B, or C​* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Classful addressing

Match each item with a statement below. *The use of IP addresses without requiring the default subnet mask. * Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Classless Interdomain Routing (CIDR)

Match each item with a statement below. *A license required by law for each user who logs on to a Windows Server 2012 server* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Client access licenses (CAL)

________ is a collection of technologies for abstracting the details of how applications, storage, network, and other computing resources are delivered to users.

Cloud computing

Match each item with a statement below. *A directory partition that stores configuration information that can affect the entire forest, such as details on how domain controllers should replicate with one another.​* Active Directory replication Authentication Configuration partition Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Configuration partition

Why might an administrator use the "arp -d" command?

Contains the entire contents of the ARP cache or a single entry specified by IP address

What are the three ways in which a user can become the owner of a file system object?

Create the file or folder; Take ownership of the file or folder; Assigned ownership

Windows Server 2012 R2 can provide fault tolerance and/or load balancing for file sharing using what service?

DFS

Which Windows Server 2012 R2 role provides automatic IP address assignment and configuration for client computers? ​AD CS ​AD DS ​DHCP ​DNS

DHCP

What new feature within PowerShell 4.0 allows for the use of declarative statements to manage and maintain servers?

DSC

What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and reduce the identical sets to a single instance, in order to reduce space? ​Data deduplication ​Data multiplexing ​Storage optimizing ​Disk pooling

Data deduplication

​What edition of Windows Server 2012 R2 can have up to 4 TB of RAM, and function as a virtualization host with unlimited virtual instances? ​Foundation ​Datacenter ​Essentials ​Standard

Datacenter

Match each item with a statement below. *A section of an Active Directory database stored on a domain controller's hard drive.​* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Directory partition

Match each item with a statement below. *A list of security principals; each has permissions that define access to an object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Discretionary access control list (DACL)

Match each item with a statement below. *The core structural unit of Active Directory; contains OUs and represents administrative, security, and policy boundaries* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Domain

Match each item with a statement below. *​A Windows server that has Active Directory installed and is responsible for allowing client computers access to domain resources* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Domain controller

Match each item with a statement below. *The access a security principal has to a file system object when taking sharing permissions, NTFS permissions, and group memberships into account.​* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Effective access

Match each item with a statement below. *​The combination of permissions assigned to an account from explicit and inherited permissions.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Effective permissions

​How can an administrator make only the files and folders to which a user has at least Read permissions visible? ​Enable share data encryption Add a $ to the end of the file / folder names ​Enable access-based enumeration (ABE) ​Use the "Hide files that I don't have permissions to" option within Windows Explorer

Enable access-based enumeration (ABE)

To enable PowerShell remote management, what command must be run? ​Enable-PSRemoting -allow ​Enable-PSremoting -force set-Remotemanage -enable Set-Property remote-management -o on

Enable-PSremoting -force

What edition of Windows Server 2012 supports 25 or fewer users, and automatically configures itself as a root domain controller?

Essentials Edition

​Due to the limitations of MBR partitioning, what type of partition must be created in order to utilize logical drives? ​Extended partition ​Primary partition ​Logical partition ​Extra partition

Extended partition

A Server Core installation can't be converted to a Minimal Server Interface. True False

False

NTFS permissions on a file only apply when a file or folder is accessed locally. True False ​

False

Routing tables are static items, in that entries within the table never change, and no new entries are ever added.​ True False

False

The 32 bit version of Windows Server 2012 R2 can be upgraded to the 64-bit version using an install disc. True False

False

The Foundation Edition of Windows Server 2012, although limited, supports Hyper-V, and can be installed within a virtual machine. True False

False

The dcpromo.exe command is the preferred method for installing Active Directory on Server Core.​ True False

False

The first server in a Windows domain network is an ideal candidate for a Server Core installation. True False

False

Thin provisioning allocates all configured space immediately, ensuring that the space is available for the specified virtual disk.​ True False

False

​By default, the Windows Server 2012 firewall does not block incoming ICMP Echo Request packets. True False

False

Windows Server 2012 is the first Windows Server release to have ______________, which allows for the removal of installation files for features that are not used.

Features on demand

Match each item with a statement below. *A collection of one or more Active Directory trees.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Forest

A ____________ is a formatted unit of data that's ready to be transferred to the network medium. It contains a destination and source MAC address and an error-checking code called the frame check sequence (FCS).​

Frame

What PowerShell cmdlet can be used to add permissions to a share? ​GrantSmbShareAccess ​Set-SmbAccess ​Set-SmbShare ​AllowSmbShareAccess

GrantSmbShareAccess

Match each item with a statement below. *A list of settings that administrators use to configure user and computer operating environments remotely through Active Directory.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Group Policy Object (GPO)

Match each item with a statement below. *The operating system running in a virtual machine installed on a host computer* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Guest OS

The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.​

HKEY_LOCAL_MACHINE

When installing Active Directory, what must be done to ensure minimal fault tolerance capabilities?

Have at least 2 domain controllers

What is the potential security risk of utilizing a naming standard for user accounts?

He can guess usernames easily

Match each item with a statement below. *The virtualization software component that creates and monitors the virtual hardware environment* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Hypervisor

The use of static teaming requires a switch that is compatible with what IEEE standard?

IEEE 802.3ad

​Select below the built-in group that facilitates anonymous access to web resources by Internet Information Services ​IIS_ANON ​Users ​IIS_IUSRS ​Anonymous logon

IIS_IUSRS

Under what conditions can a hard drive be inserted into a server while it is powered on?

If the server hardware supports hot-add or hot-swap

What is the importance of the forest root domain?

In fact, the first domain is the forest root and is referred to as the Forest root domain. It has a number of important responsibilities and serves as an anchor for other trees and domains added to the forest. Certain functions that affect all domains in the forest are conducted only through the forest root domain, and if this domain becomes inoperable, the entire Active Directory structure ceases functioning.

Remote computers attempting to connect to the local computer are examples of what type of connection? ​Inbound connections ​Outbound connections ​Concurrent connections ​Firewalled connections

Inbound connections

​Select the operations master role responsible for ensuring that changes made to object names in one domain are updated in references to the object in other domains: ​Schema master ​RID master ​Infrastructure master ​Domain naming master

Infrastructure master

Match each item with a statement below. *A permission that comes from an object's parent instead fo being assigned explicitly.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Inherited permission

What CPU extensions are a prerequisite for installing the Hyper-V role? ​32 bit or 64-bit ​MMX3 or MMX4 ​Intel-VT or AMD-V ​SAS or SATA

Intel-VT or AMD-V

Match each item with a statement below. *​An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

The IEEE 802.1ax standard, which allows for the dynamic creation of a team, is known as which protocol below? ​Switch independent ​LACP ​Static teaming ​PPPoE

LACP

​A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage? ​Direct-Attached Storage ​Storage Area Network ​Network Attached Storage ​Local storage

Local storage

What is a downlevel user logon name used for?​ ​Logging into older Windows OSs or using older Windows applications ​Assigning access to lower security shared folders ​Logging into servers further down in the domain structure ​Logging into servers that are marked as "Down" in Server Manager

Logging into older Windows OSs or using older Windows

Match each item with a statement below. *The IP address 127.0.0.1, which always refers to the local computer and is used to test ​the functioning of TCP/IP* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Loopback address

An administrator needs to install a domain controller in a remote office, with the requirement that the domain controller does not store password information. What type of domain controller should the administrator install?

Member server

Match each item with a statement below. *A Windows server that's in the management scope of a Windows domain but doesn't have Active Directory installed* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Member server

​Modern file systems use what component to describe information about files, such as time stamps and attributes? ​Metadata ​Data storage methods ​Filenaming conventions ​Hierarchical organization

Metadata

Match each item with a statement below. *​A value assigned to the gateway based on the speed of the interface used to access the gateway.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Metric

​Which permission below can be granted to a user to allow the user to execute applications or scripts? ​List folder contents ​Write ​Read ​Modify

Modify

What file system in Windows Server 2012 supports features such as encryption, file and folder permissions, and compression?

NTFS

​What file system below supports encryption, compression, and use of volumes? ​FAT16 ​FAT32 ​NTFS ​ISO9660

NTFS

Match each item with a statement below. *The native file-sharing protocol in UNIX and Linux OSs* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Network File System (NFS)

What specifies the rules and format of communication between network devices?

Network Protocols

Match each item with a statement below. *​The part of the OS that sends requests to a server to access network resources* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Network client

A _____________ is composed of two parts: NIC hardware and device drivers.

Network interface

Match each item with a statement below. *​Software that specifies the rules and format of communication between devices on a network* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Network protocol

If an administrator wants to create a new service, what PowerShell cmdlet should be used?

New-Service

​What is the primary container object for organizing and managing resources in a domain? ​OUs ​Computer accounts ​Groups ​Security principals

OUs

Match each item with a statement below. *​Usually the user account that created the object or a group or user who has been assigned ownership of the object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Object owner

Match each item with a statement below. *​A domain controller with sole responsibility for certain domain or forest-wide functions.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Operations master

Match each item with a statement below. *​An Active Directory container used to organize a network's users and resources into logical administrative units.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Organizational Unit (OU)

Match each item with a statement below. *A system file in Windows used as virtual memory and to store dump data after a system crash* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Page file

Match each item with a statement below. *​A logical unit of storage that can be formatted with a file system* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Partition

Match each item with a statement below. *A method for defining how permissions are transmitted from a parent object to a child object.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Permission inheritance

What command line utility can be used to upgrade an evaluation edition of Windows Server 2012 R2 to Standard or Datacenter licensed editions?

PowerShell

Match each item with a statement below. *A cloud computing service provided by a company's internal IT Department.* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Private cloud

A simple space storage layout is similar to which non-fault tolerant RAID technology?​ ​RAID6 ​RAID0 ​RAID1 ​RAID5

RAID0

Select below the file system that can repair minor file system issues automatically, and supports up to 1 yottabyte volume sizes.​ ​FAT32 ​NTFS ​FAT16 ​ReFS

ReFS

What use does the new file system introduced in Windows Server 2012 have?

ReFS for large data storage

If an administrator wants to view the Event Viewer snap-in using a remote machine, what firewall rule group should be enabled?

Remote Event Log Management

The _____________ cmdlet within PowerShell can be used to rename an object in Active Directory.​

Rename-ADObject

Which disk subsystem is considered to be the most reliable for use in enterprise and high-utilization environments? ​SAS ​SATA ​SCSI ​PATA

SAS

Entry-level or departmental servers are typically capable of getting by utilizing what cheaper disk subsystem?

SATA or PATA

What option in the New Share Wizard creates a share that is suitable for Hyper-V? ​NFS Share - Quick ​SMB Share - Advanced ​SMB Share - Applications ​SMB Share - Quick

SMB Share - Applications

​A(n) __________ uses flash memory and the same type of high-speed interfaces, such as SATA or SATA express, as traditional hard disks.

SSD

​The __________ folder is a shared folder containing file-based information that's replicated to other domain controllers.

SYSVOL

​What Active Directory partition contains the information needed to define objects and object attributes for all domains in the forest? ​Application directory partition ​Schema directory partition ​Global catalog partition ​Domain directory partition

Schema directory partition

Match each item with a statement below. *An object that can be assigned permission to access the file system; includes user, group, and computer accounts.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Security Principle

Match each item with a statement below. *A file system object's security settings, composed of the DACL, owner, and SACL.* Access control entry (ACE) Discretionary access control list (DACL) Effective access Effective permissions Inherited permission Object owner Network File System (NFS) Permission inheritance Security descriptor Security Principle

Security descriptor

What are the two different types of GPO filtering?​ ​Security filtering and permissions filtering ​SACL filtering and DACL filtering ​Security filtering and WMI filtering ​SACL filtering and security filtering

Security filtering and WMI filtering

Match each item with a statement below. *A numeric value assigned to each object in a domain that uniquely identifies the object; composed of a domain identifier and a RID.* Active Directory replication Authentication Configuration Domain Directory partition Forest Group Policy Object (GPO) Organizational Unit (OU) Operations master Security identifier (SID)

Security identifier (SID)

Match each item with a statement below. *​A common disk interface technology that's inexpensive, fast, and fairly reliable with transfer speeds up to 6 Gb/s* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Serial ATA (SATA)

Match each item with a statement below. *​A newer, serial form of SCSI with transfer rates up to 6 Gb/s and higher, typically used in servers and high end workstations* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Serial Attached SCSI (SAS)

What type of Windows Server 2012/R2 installation takes up the least amount of space? ​Minimal Server ​Server Core ​Upgrade ​Full Installation

Server Core

Match each item with a statement below. *​OSs designed to emphasize network access performance and run background processes.* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Server operating systems

If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services over from an older server, what type of upgrade is being performed? ​Server role migration ​In-place upgrade Standard upgrade Microsoft Server Transfer

Server role migration

​What is the term used by Microsoft to describe a collection of bug fixes and security updates made since an OS release? ​Service bundle ​Service patch ​Service pack ​Service release

Service pack

An administrator working on a Windows Server 2012 R2 Server Core installation needs to disable DHCP all interfaces on the server. What PowerShell command should be used? ​Set-NetIPInterface ​Change-NetIPInterface ​Set-DHCPClientSettings ​Set-NetIf

Set-NetIPInterface

Why should an administrator enable the "Encrypt data access" option on a share containing sensitive information?

So when someone is using that share all the data that they copy is encrypted and can't be read in clear text

Match each item with a statement below. *​A volume that extends across two or more physical disks, such as a simple volume that has been extended to a second disk* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Spanned volume

Match each item with a statement below. *​A storage device that uses high-speed networking technologies to give servers fast access to large amounts of shared disk storage.* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Storage Area Network (SAN)

Match each item with a statement below. *A volume that extends across two or more dynamic disks, but data is written to all disks in the volume equally; provides no fault tolerance but does have a performance advantage* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Striped volume

​What PowerShell cmdlet can be utilized to pause a specified running service, or multiple services, separated by a comma? ​Suspend-Service ​Stop-Service ​Halt-Service ​Pause-Service

Suspend-Service

Which of the following is not a standard component of Teredo tunneling?​ ​Teredo client ​Teredo server ​Teredo proxy ​Teredo relay

Teredo proxy

How does a computer determine the network ID based on the IP address and the subnet mask?

The AND operation

What does a file system do?

The method and format an OS uses to store, locate, and retrieve files from electronic storage media

Under what circumstances would a multi-domain structure not be an ideal choice?​ ​The structure should allow for different name identities The structure should facilitate easier access to resources ​The structure should provide replication control The structure should provide differing account policies

The structure should facilitate easier access to resources

In Active Directory, what do the schema classes define?

The types of objects that can be stored in Active Directory, such as user or computer accounts

If shadow copies are enabled on a heavily used volume, how should shadow copies be configured?

They should be there own volume

A Group Policy Container (GPC) stores GPO properties and status information, but no actual policy settings. True False

True

A disk that is initialized via the Disk Management MMC is initialized as a MBR disk by default. True False

True

A solid state drive is a good candidate for storing the page file. True False

True

Active Directory's use of multimaster replication ensures that changes to AD objects are automatically replicated to all domain controllers.​ True False

True

Every IP address configuration requires the use of a subnet mask, and all hosts on the same network must share the same network ID in their IP addresses.​ True False

True

GPOs linked to a site object can facilitate IP address based policy settings.​ True False

True

In order for a software package to be published in Active Directory, it must be configured in the User Configuration node of an applicable group policy.​ True False

True

The Active Directory Recycle Bin is disabled by default, and can be enabled in the Active Directory Administrative Center (ADAC)​ True False

True

The recommended minimum number of Active Directory domain controllers in a domain environment is two.​ True False

True

The shadow copies feature must be enabled on an entire volume. True False

True

Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing.​ True False

True

​Server roles can be installed and uninstalled on an offline VHD file. True False

True

​The Disk Management snap-in can be utilized to create redundant disk configurations, such as RAID 1 and RAID 5. True False

True

Match each item with a statement below. *A common network protocol technique that allows transmitting a packet in a format that would otherwise be incompatible for the network architecture by encapsulating the packet in a compatible header format* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

Tunneling

What different types of objects can be members of a distribution group?

User accounts and contacts can be used for distribution group.

​What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software? ​DaaS Remote Desktop IaaS ​Virtual Desktop Infrastructure

Virtual Desktop Infrastructure

Match each item with a statement below. *​The virtual environment that emulates a physical computers hardware and BIOS* Client access licenses (CAL) Domain controller Guest OS Hypervisor Member server Network protocol Network client Private cloud Server operating systems Virtual Machine

Virtual Machine

Match each item with a statement below. *A logical unit of storage that can be formatted with a file system* Backplane Basic disk Partition Page file Serial Attached SCSI (SAS) Serial ATA (SATA) Storage Area Network (SAN) Spanned volume Striped volume Volume

Volume

The shadow copies feature utilize what service within Windows Server? ​Volume Backup Service (VBS) ​Volume Shadow Copy Service (VSS) ​Windows Backup Service (WBS) ​Windows Shadow Copy Service (WSS)

Volume Shadow Copy Service (VSS)

​The ____________ MMC snap-in can be utilized to configure firewall rules.

WFAS

What purpose does an anycast IPv6 address fulfill?

When more than one router exists on a subnet

If a new shadow copy of a volume needs to be created, but no space is available on the volume for the new shadow copy, what happens?

When the disk space that shadow copies use reaches the specified limit or available space on the volume can no longer accommodate a new shadow copy, older copies are deleted.

How can an administrator configure and manage a remote Windows Server 2012 R2 installation using Windows 8.1?

Windows Workgroup

Which of the following is not a special character that can be utilized in an NTFS file's name? ​$ ​! ​# ​\

\

How can an administrator mount an install image to install features? ​mount-image ​wim-open ​mount ​dism

dism

If the wrong server edition is installed, what command can be used to change to a different edition?​ ​ netdom ​Change-Edition ​dism ​netsh

dism

When using the ping utility, what type of ICMP packet is sent to the remote ping target?

echo reply

What are the four different character types that can make up a Windows password?

give out random passwords with characters

What is the most critical component to consider when evaluating disk performance?

how fast the drive can transfer data for an extended period

What command when entered in a command prompt will display information related to IP address settings, such as DHCP server and DNS server information?

ipconfig /all

Match each item with a statement below. *A reserved name that corresponds to the loopback address 127.0.0.1.* Automatic Private IP Addressing (APIPA) Broadcast Classful addressing Classless Interdomain Routing (CIDR) Loopback address localhost Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) Metric Tunneling 6to4

localhost

What command can be used to send test queries to a target DNS server?​ nslookup ​ping ​tracert ​route

nslookup

A(n) ​___________ is a grouping of information that describes a network resource, such as a shared printer; an organizing structure, such as a domain or OU; or an account, such as a user or group.

object

The default location for computer accounts that are created automatically after joining the domain can be changed using which command?​ ​netdom computer account location ​redircmp ​Add-Computer -OU ​djoin OU

redircmp

​What command line utility can be used to display the default route, as well as all routing table entries? ​ipconfig ​route ​show route ​net print route

route

When working with a Server Core installation of Windows Server 2012, what utility should be used to perform initial configuration tasks? ​MMC ​Server Manager ​sconfig ​netdom

sconfig

Services that require other services in order to run properly are said to have _____________.

server dependencies

The ____________ command is known as the trace route command, because it displays the route packets take between two computers.​

tracert

If an administrator wants to test the results of a PowerShell cmdlet without actually performing the cmdlet's operations, what option should be used? ​-TestOnly ​-WhatIf ​-TestRun ​-Results

​-WhatIf

Which of the following is a valid IPv6 address?​ ​FE80:0:0:9F28::10::1 ​2001::0:0:0:9:: ​2001::1 ​fe80:0:0:0:18ff::0024:8e5a:60

​2001::1

​What is the maximum number of virtual processors supported by Hyper-V 3.0? ​8 ​16 ​32 ​64

​32

How often are Group Policy Objects updated on domain controllers?​ ​90 minutes ​30 minutes ​5 minutes ​70 minutes

​5 minutes

When using Shadow Copies, how many different versions of a file can be kept?​ ​32 ​64 ​128 ​16

​64

Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forests, domains, and domain controllers. ​AD DS ​AD LDS ​AD FS ​AD RMS

​AD LDS

What role provides services for creating, issuing, and managing digital certificates that can be used to verify identities? ​Active Directory Domain Services ​Active Directory Certificate Services ​Active Directory Federation Services ​Active Directory Rights Management Services

​Active Directory Certificate Services

​A network administrator can join a computer to a domain using what PowerShell cmdlet? ​Add-Computer ​netdom ​Join-Domain ​Set-Domain

​Add-Computer

Which of the following choices is not one of the three teaming modes? ​LACP ​Address hashing ​Static teaming ​Switch independent

​Address hashing

​Disks that are formatted using the GUID Partitioning Table (GPT) can hold larger volume sizes, and benefit from increased reliability provided by which feature below? ​Message Digest 5 (MD5) ​Journaling ​Secure Hash Algorithm (SHA) ​Cyclic Redundancy Check (CRC)

​Cyclic Redundancy Check (CRC)

​What is the most typically used group type conversion? ​Distribution group -> security group ​Security group -> distribution group ​Universal group -> domain local group ​Domain local group -> global group

​Distribution group -> security group

Select the true statement regarding the conversion of group scope:​ ​Universal groups that are members of other universal groups can be converted to domain local groups ​Universal groups can be members of global groups ​Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups ​Global groups can't be converted to universal groups

​Domain local groups can be converted to universal, as long as the domain local group does not contain other domain local groups

​Which load balancing mode is the default mode within Windows Server 2012 R2, and uses an even distribution of traffic among all team members, including virtual NICs? ​LACP ​Address hash ​Dynamic ​Hyper-V Port

​Dynamic

​Which version of Windows Server 2012 is available through OEMs only, and is limited to a maximum of 15 users? ​Foundation Edition ​Essentials Edition ​Datacenter ​Standard

​Foundation Edition

In what order are Group Policy Objects applied?​ ​Local policies, site-linked GPOs, domain-linked GPOs, OU-linked GPOs ​Site-linked GPOs, domain-linked GPOs, OU-linked GPOs, local policies ​Domain-linked GPOs, OU-linked GPOs, local policies, site-linked GPOs ​Site-linked GPOs, local policies, domain-linked GPOs, OU-linked GPOs

​Local policies, site-linked GPOs, domain-linked GPOs, OU-linked GPOs

​Which of the following statements is true regarding permission inheritance? ​Permission inheritance is disabled by default ​The "Replace all child object permissions" option is only available at the root folder ​A folder inherits a subfolder's permissions ​Permission inheritance is enabled by default

​Permission inheritance is enabled by default

What printer property, enabled by default, might allow a lower priority print job already in the queue to start printing even if a job with a higher priority starts spooling?​ ​Render print jobs on client computers ​Print spooled documents first ​Print smaller documents first ​Hold mismatched documents

​Print spooled documents first

Dropbox, SkyDrive, and Google Apps are all examples of what type of computing? ​Public cloud ​Private cloud Domain ​Open cloud

​Public cloud

​Which firewall rule group must be enabled in order to allow for the remote use of the Task Scheduler snap-in? ​Remote Scheduled Tasks Management ​Remote Service Management ​Remote Tasks ​Remote Task Scheduler

​Remote Scheduled Tasks Management

Select the utility below that provides a single interface for installing, configuring, and removing a variety of server roles and features, as well as providing a place to view server status. ​Server Manager ​Active Directory Users and Computers ​MMC ​PowerShell

​Server Manager

Which of the following statements is false? ​Windows Server 2008 and 2008 R2 can be upgraded to Server 2012 ​A Server Core install of Windows Server can only be upgraded to a Server Core installation. ​Cross platform upgrades (such as 32-bit to 64-bit) are not supported ​You can upgrade to a different language

​You can upgrade to a different language

In what order are group policy settings applied?​ ​local, site, OU, domain ​site, OU, domain, local ​local, site, domain, OU ​domain, site, OU, local

​local, site, domain, OU


Related study sets

Chapter 1 - Leading Edge Management

View Set

Structural Units of The Human Body

View Set

Chapter 5: The Lipids; Triglycerides, Phospholipids, and Sterols

View Set

Network Pro Part 3 ++++++++++++++++++++++++

View Set

Management 310- LATech Dickerson (Test II)

View Set

Chapter 43: Nursing Care of the Child With an Alteration in Urinary Elimination/Genitourinary Disorder - ML4

View Set