Assessment test Flashcards

1
Q
Which of the following is a valid role for a Windows Server 2016 computer? 
A. Standalone server
B. Member server
C. Domaincontroller
D. Alloftheabove
A

D. Based on the business needs of an organization ,a Windows 2016 Server computer can be configured in any of the roles listed. See Chapter 1 for more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to add a new Windows Server 2016 image to your WDS server. You want to use a command-line command to complete this task. What command would you use?
A. WDSUTIL /Add
B. WDSUTIL /image
C. WDSUTIL /prepareimage D. WDSUTIL /addimage

A

A. The WDSUTIL/Add command allows an administrator to add an image to a WDS server. See Chapter 1 for more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been hired to help a small company setup its first Windows network. It has had the same 13 users for the entire two years it has been open, and the company has no plans to expand. What version of Windows Server 2016 would you recommend?
A. Windows Server 2016 Datacenter (Desktop Experience)
B. Windows Server 2016 Standard (Desktop Experience) C. Windows Server 2016 Datacenter
D. Windows Server 2016 Essentials

A

D. Windows Server 2016 Essentials is ideal for small businesses that have as many as 25 users and 50 devices. Windows Server 2016 Essentials has a simpler interface and preconfigured connectivity to cloud-based services but no virtualization rights. See Chapter 1 for more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
You are using WDS to deploy Windows Server 2016 images across your organization, and you are using the WDSUTIL command-line utility to perform this task. You want to copy a previously created image from the image store using this utility. Which option of WDSUTIL should you use?
A. /move
B. /copy-image 
C. /get
D. /enable
A

B. You should use the /copy-image option of the WDSUTIL utility to copy an image from the image store. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You want to install a group of 25 computers using disk images created in conjunction with the System Preparation Tool. Your plan is to create an image from a reference computer and then copy the image to all the machines. You do not want to create an SID on the destination computer when you use the image. Which Sysprep.exe command-line option should you use to set this up? 
A. /specialize
B. /generalize
C. /oobe
D. /quiet
A

B.The /generalize option prevents system-specific information from being included in the image. The Sysprep.exe command can be used with a variety of options. You can see a complete list by typing sysprep/? at a command-line prompt. See Chapter 2 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have a Hyper-V host that runs Windows Server 2016. The host contains a virtual machine named Virtual1. Virtual1 has resource metering enabled. You need to use resource metering to track the amount of network traffic that Virtual1 sends to the 10.10.16.0/20 network. Which command would you run?
A. Add-VMNetworkAdapteiAd
B. Set-VMNetworkAdapter
C. New-VMResourcePool
D. Set-VMNetworkAdapterRoutingDomamMapping

A

B. The Set-VMNetworkAdapter command allows an administrator to configure features of the virtual network adapter in a virtual machine or the management operating system. See Chapter 3 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to ensure that the company’s two Virtual Machines, VM1 and VM2, can communicate with each other only. The solution must prevent VM1 and VM2 from communicating with Server1. Which cmdlet should you use?
A. Set-NetNeighbor
B. Remove-VMSwitchTeamMember C. Set-VMSwitch
D. Enable-VMSwitchExtension

A

C. The Set-VMSwitch cmdlet allows an administrator to configure a virtual switch. See Chapter 3 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You want to make sure the hard disk space for your virtual machines is occupied only when needed. What type of virtual hard disk would you recommend?
A. Dynamicallyexpandingdisk B. Fixed-size disk
C. Differencingdisk
D. Physicalorpass-throughdisk

A

A.The only virtual hard disk that increases in size is the dynamically expanding disk.See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
What is the command to install Hyper-V on a Windows Server 2016 machine that was installed in Server Core?
A. start /w ocsetup Hyper-V
B. start /w ocsetup microsoft-hyper-v 
C. start /w ocsetup Microsoft-Hyper-V 
D. start /w ocsetup hyper-v
A

C.This question relates to the setup command used to install the Hyper-V server role on a Windows Server 2016 Server Core machine. It’s important to remember that these commands are case sensitive, and that the correct command is start /wocsetup Microsoft-Hyper-V. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
You are a network administrator for a small company that uses Hyper-V. You need to reboot your virtual machine. What PowerShell command can you use?
A. Restart-VM 
B. Reboot-VM
C. Shutdown-VM 
D. ShutStateOff
A

A. The PowerShell command Restart-VM restarts a virtual machine. See Chapter 4 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
You are the administrator for a mid-size organization. You have been asked by the owner to set up an NLB cluster. You want to use PowerShell to set up the cluster. What command would you use?
A. New-NlbCluster
B. Create-NlbCluster 
C. Setup-NlbCluster 
D. Set-NlbCluster
A

A. To create a new NLB cluster, you would use the PowerShell command New- NlbCluster. See Chapter 5 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following actions should be performed against an NLB cluster node if maintenance needs to be performed while not terminating current connections?
A. Evict
B. Drainstop 
C. Pause
D. Stop
A

B.If an administrator decides to use the drain stop command, the cluster stops after answering all of the current NLB connections. So the current NLB connections are finished but no new connections to that node are accepted. See Chapter 5 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
If you have a running cluster and need to run the Validate a Configuration Wizard again, which of the following tests may require cluster resources to be taken offline?
A. Network tests
B. Storage tests
C. System configuration tests 
D. Inventory tests
A

B.The storage tests require the clustered disk resource to be offline. If you need to run the storage tests, the Validate a Configuration Wizard will prompt you to make sure you want to take the resources offline. See Chapter 6 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What PowerShell command would you use to run a validation test on a cluster? 
A. Test-Cluster
B. Validate-Cluster
C. Set-Cluster
D. Add-Cluster
A

A. Administrators would use the Test-Cluster to complete validation tests for a cluster. See Chapter 6 for more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You download the wrong image from Docker. What command allows you to delete an image?

A

B.The docker rm command is the command that is used to delete an image. You should run docker images first and get the ID number or name of the image that you want to delete. See Chapter 7 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
You have built a bunch of Containers. What Power Shell command allows you to view the Containers?
A. docker view
B. docker see
C. View-Container 
D. Get-Container
A

D.The Get-Container PowerShell command allows an administrator to view information about Containers. See Chapter 7 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
What command allows you to see your container images? 
A. docker images
B. docker info
C. docker view
D. docker see
A

A. The docker images command gives you the ability to see your images. The docker info command allows you to see how many images you have on a host but it does not give you details about the images. See Chapter 7 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You need to use an Active Directory application data partition. Which command can you
use to create and manage application data partitions? A. DCPromo.exe
B. NTDSUtil.exe
C. ADUtil.exe
D. ADSI.exe

A

B.The primary method by which system administrators create and manage application data partitions is through the ntdsutil tool. See Chapter 8 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
What command-line command would you type to start Performance Monitor?
A. Netmon.exe
B. Perfmon.exe 
C. Performon.exe 
D. Resmon.exe
A

B. Perfmon.exe is the command-line command to start Performance Monitor. See Chapter 9 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
What command-line command would you type to start Resource Monitor? 
A. Netmon.exe
B. Perfmon.exe 
C. Performon.exe 
D. Resmon.exe
A

D. Resmon.exe is the command-line command to start Resource Monitor. See Chapter 9 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following subnetmasks is represented with the CID Rof/27? A. 255.255.255.254
B. 255.255.255.248
C. 255.255.255.224
D. 255.255.255.240

A

C.TheCIDR/27 tells you that 27 1s are turned on in the subnet mask.Twenty-seven1s equals 11111111.11111111.11111111.11100000. This would then equal 255.255.255.224. See Chapter 10 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
You are  the network administrator for a mid size organization that has installed Windows Server 2016 onto the network. You are thinking of moving all machines to Windows 10 and IPv6. You decide to set up a test environment with four subnets. What type of IPv6 addresses do you need set up?
A. Global addresses
B. Link-local addresses 
C. Unique local addresses 
D. Site-local addresses
A

C. The unique local address can be FC00 or FD00, and it is used like the private address space of IPv4. Unique local addresses are not expected to be routable on the global Internet, but they are used for private routing within an organization. See Chapter 10 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are the network administrator for ABC Company. You have an IPv6 prefix of 2001:DB8:BBCC:0000::/53, and you need to set up your network so that your IPv6 addressing scheme can handle 1,000 more subnets. Which network mask would you use?
A. /60 B. /61 C. /62 D. /63

A

D.To calculate the network mask, you need to figure out which power number(2x)is greater than or equal to the number you need. Since we are looking for 1000, 210 = 1024. You then add the power (10) to the current network mask (53 + 10 = 63). See Chapter 10 for more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You assign two DNS server addresses aspart of the options for a scope.Later you find a client workstation that isn’t using those addresses. What’s the most likely cause?
A. The client didn’t get the option information as part of its lease.
B. The client has been manually configured with a different set of DNS servers.
C. The client has a reserved IP address in the address pool.
D. There’s a bug in the DHCP server service.

A

B. Manual settings override DHCP options. See Chapter 11 for more information.

25
Q
You download the wrong image fromDocker. What command allows you to delete an image?
A. docker del 
B. docker rm 
C. docker kill 
D. docker dl
A

A.When the DHCP server crashed, the scope was effectively deactivated.Deactivatinga scope has no effect on the client until it needs to renew the lease. See Chapter 11 for more information.

26
Q
You have built a bunch of Containers. What PowerShell command allows you to view the Containers?
A. docker view
B. docker see
C. View-Container 
D. Get-Container
A

A.Microsoft’s jetpack.exe utility allows you to compact a JET database.Microsoft JET databases are used for WINS and DHCP databases. See Chapter 12 for more information.

27
Q
You are the network admin for an Active Directory domain named Stormwind.com .You have a new security policy that states that whenever possible, you should install new Nano Servers. Which server role can be deployed on a Nano Server?
A. ActiveDirectoryDomainServices 
B. DHCPServer
C. NetworkPolicyandAccessServices 
D. Web Server (IIS)
A

B.One of the nice advantages of DHCP is that it is one of the only Roles that can be installed onto a Nano Server. See Chapter 12 for more information.

28
Q
You have been asked to explain how DHCP works. What abbreviation can you explain to show how DHCP operates?
A. DORA 
B. RODA 
C. DHRA 
D. AORD
A

A.The abbreviation that helps you remember how DHCP works is DORA:Discover, Offer, Request, and Acknowledge. See Chapter 12 for more information.

29
Q
You are the network administrator for a large training company. You have been asked to set up the default gateway setting using DHCP. Which option would you configure?
A. 003 Router
B. 006 DNS
C. 015DNSDomainName 
D. 028BroadcastAddress
A

A.003 Router is used to provide a list of available routers or default gateways on the same subnet. See Chapter 12 for more information.

30
Q
You are the network administrator for your organization. You need to view the DNS server information from the IPAM database. What PowerShell command would you use? 
A. View-IpamDnsServer
B. Get-IpamDnsServer
C. View-DnsServer
D. Get-DnsServer
A

B. The Get-IpamDnsServer command allows an administrator to view DNS server information from the IPAM database. See Chapter 13 for more information.

31
Q

You are the administrator for Storm Wind Studios online training company. You need to
change the IPAM discovery configuration. What PowerShell command do you use?
A. Get-IpamDiscovery
B. Get-IpamDiscoveryDomain
C. Set-IpamDiscovery
D. Set-IpamDiscoveryDomain

A

D. Administrators can use the Set-IpamDiscoveryDomain PowerShell command to change the IPAM discovery configuration. See Chapter 13 for more information.

32
Q
Your network contains an Active Directory domain named contoso.com. Network Access Protection (NAP) is deployed to the domain. You need to create NAP event trace log files on a client computer. What should you run?
A. Register-ObjectEvent 
B. Register-EngineEvent 
C. tracert
D. logman
A

D.Logman creates and manages Event Trace Session and Performance logs and allows an administrator to monitor many different applications through the use of the command line. See Chapter 14 for more information

33
Q
Your network contains an Active Directory domain named Stormwind.com. The domain contains a RADIUS server named Server1 that runs Windows Server 2016. You add a VPN server named Server2 to the network. On Server1, you create several network policies. You need to configure Server1 to accept authentication requests from Server2. Which tool should you use on Server1?
A. Set-RemoteAccessRadius 
B. CMAK
C. NPS
D. Routing and Remote Access
A

C.The NPS snap-in allows you to setup RADIUS servers and which RADIUS server would accept authentication from other RADIUS servers. You can do your entire RADIUS configuration through the NPS snap-in. See Chapter 14 for more information.

34
Q
You are the administrator for a large communications company. Your company uses Windows Server 2016, and your user’s files are encrypted using EFS. What command-line command would you use to change or modify the EFS files?
A. Convert 
B. Cipher 
C. Gopher 
D. Encrypt
A

B.Cipher is a command-line utility that allows you to configure or change EFS files and folders. See Chapter 15 for more information

35
Q
You want to  publish a printer to Active Directory. Where would you click in order to accomplish this task?
A. TheSharing tab
B. The Advanced tab
C. The Device Settings tab
D. ThePrintingPreferencesbutton
A

A.The Sharing tab contains a checkbox that you can use to list the printer in Active Directory. See Chapter 15 for more information.

36
Q
You have been hired by a small company to implement new Windows Server 2016 systems. The company wants you to set up a server for users’ home folder locations. What type of server would you be setting up?
A. PDC server
B. Web server
C. Exchange server 
D. File server
A

D.File servers are used for storage of data,especially for users’ home folders.Home folders are folder locations for your users to store data that is important and that needs to be backed up. See Chapter 15 for more information.

37
Q
In a three-node cluster set to a node majority quorum model, how many cluster nodes can be offline before the quorum is lost?
A. Zero 
B. One 
C. Two 
D. Three
A

B.In a three-node cluster, only one node can be offline before the quorum is lost; a majority of the votes must be available to achieve the quorum. See Chapter 16 for more information.

38
Q
You are the administrator for a mid-size company who wants to setup and test a cluster. What PowerShell command would you use to run a validation test on a cluster?
A. Test-Cluster
B. Validate-Cluster 
C. Set-Cluster
D. Add-Cluster
A

A. Administrators would use the Test-Cluster to complete validation tests for a cluster. See Chapter 16 for more information

39
Q

You are a network administrator for a small company that uses Hyper-V. You needto reboot your virtual machine. What PowerShell command can you use?
A. Restart-VM B. Reboot-VM
C. Shutdown-VM D. ShutStateOff

A

A. The PowerShell command Restart-VM restarts a virtual machine. See Chapter 17 for more information.

40
Q
What is the maximum number of domains that a Windows Server 2016 computer configured as a domain controller may participate in at one time?
A. Zero
B. One
C. Two
D. Any number of domains
A

B.A domain controller can contain Active Directory information for only one domain. If you want to use a multi-domain environment, you must use multiple domain controllers configured in either a tree or a forest setting. See Chapter 18 for more information.

41
Q

Which of the following file systems are required for Active Directory? A. FAT
B. FAT32 C. HPFS D. NTFS

A

D.NTFS has file-level security, and it makes efficient usage of disk space. Since this machine is to be configured as a domain controller, the configuration requires at least one NTFS partition to store the Sysvol information. See Chapter 18 for more information.

42
Q

Which of the following services and protocols are required for Active Directory?(Choose all that apply.)
A. NetBEUI B. TCP/IP C. DNS
D. DHCP

A

B, C.TCP/IP and DNS are both required when installing Active Directory. See Chapter 18 for more information.

43
Q

Which of the following PowerShell commands allows you to view Active Directory users? A. Get-ADUser
B. Get-User C. View-User D. See-ADUser

A

A. The Get-ADUser command allows you to view Active Directory user accounts using PowerShell. See Chapter 19 for more information.

44
Q
Which of the following PowerShell commands  allows you to enable an ActiveDirectory account after it’s been locked out?
A. release-ADAccount
B. enable-ADAccount 
C. Unlock-ADAccount 
D. enable-Account
A

C.Administrators can use the Unlock-ADAccount command to unlock an Active Directory account. See Chapter 19 for more information.

45
Q
You need to create a new user account using the command prompt. Which command would you use?
A. dsmodify 
B. dscreate 
C. dsnew
D. dsadd
A

D. The dsadd command allows you to add an object (user’s account) to the Active Directory database. See Chapter 19 for more information

46
Q

Whatkindoftrustissetupbetweenonedomainandanotherdomaininthesameforest? A. External trust
B. Foresttrust C. Shortcuttrust D. Domaintrust

A

C.Shortcuttrustsaretrustssetupbetweentwodomainsinthesameforest.SeeChapter20 for more information.

47
Q

You need to deactivate the Global Catalog option on some of your domain controllers.At which level in Active Directory would you deactivate Global Catalogs?
A. Server B. Site
C. Domain D. Forest

A

B. The NTDS settings for the site level are where you would activate and deactivate Global Catalogs. See Chapter 20 for more information.

48
Q
  1. You want to allow the new Sales Director to have permissions to reset passwords for all users within the sales OU. Which of the following is the best way to do this?
    A. Create a special administration account within the OU and grant it full permissions for all objects within Active Directory.
    B. Move the user’s login account into the OU that he or she is to administer.
    C. Move the user’s login account to an OU that contains the OU (that is, the parent OU of the one that he or she is to administer).
    D. Use the Delegation of Control Wizard to assign the necessary permissions on the OU that he or she is to administer.
A

D. The Delegation of Control Wizard is designed to allow administrators to setup permissions on specific Active Directory objects. See Chapter 20 for more information.

49
Q

You need to create OUs in Active Directory. In which MMC scan you accomplish this task? (Choose all that apply.)
A. Active Directory Administrative Center
B. Active Directory Sites and Services C. Active Directory Users and Computers D. Active Directory Domains and Trusts

A

A,C.Administrators can create new Organizational Units (OUs) by using either the Active Directory Administrative Center or Active Directory Users and Computers. See Chapter 20 for more information.

50
Q
You want a GPO to take effect immediately, and you need to use Windows PowerShell. Which PowerShell cmdlet command would you use?
A. Invoke-GPUpdate 
B. Invoke-GPForce 
C. Invoke-GPResult 
D. Invoke-GPExecute
A

A. You would use the Windows PowerShell Invoke-GPUpdate cmdlet. This PowerShell cmdlet allows you to force the GPO to reapply the policies immediately. See Chapter 21 for more information.

51
Q
GPOsassignedatwhichofthefollowinglevel(s)willoverrideGPOsettingsatthedomain level?
A. OU
B. Site
C. Domain
D. BothOUandsite
A

A.GPOs at the OU level take precedence over GPOs at the domain level.GPOs at the domain level, in turn, take precedence over GPOs at the site level. See Chapter 21 for more information.

52
Q
A system administrator wants to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this (assuming that all other GPO settings are the defaults)?
A. The Enforced option
B. The Block Policy Inheritance option 
C. The Disable option
D. TheDeny permission
A

B.The Block Policy Inheritance option prevents group policies of higher-level Active Directory objects from applying to lower-level objects as long as the Enforced option is not set. See Chapter 21 for more information

53
Q
To disable GPO settings for a specific security group, which of the following permissions should you apply?
A. Deny Write
B. Allow Write
C. Enable Apply Group Policy 
D. Deny Apply Group Policy
A

D.To disable the application of Group Policy on a security group, you should deny the Apply Group Policy option. This is particularly useful when you don’t want GPO settings to apply to a specific group, even though that group may be in an OU that includes the GPO settings. See Chapter 21 for more information.

54
Q

You want to configure modifications of the Certification Authority role service to be logged. What should you enable? (Choose all that apply.)
A. Enable auditing of system events.
B. Enable logging.
C. Enable auditing of privilege use.
D. Enable auditing of object access.
E. You should consider enabling auditing of process tracking.

A

B,D.To enable ADFS auditing, you must check the boxes for Success Audits and Failure Audits on the Events tab of the Federation Service Properties dialog box. You must also enable Object Access Auditing in Local Policy or Group Policy. See Chapter 22 for more information.

55
Q

You need to add a certificate template to the Certificate Authority. What PowerShell command would you use?
A. Get-CS Template B. Add-CS Template C. Add-CA Template D. New-Template

A

C. The Add-CATemplate command allows an administrator to add a certificate template to the CA. See Chapter 22 for more information.

56
Q
You need to see all of the location sets for the CRL distribution point(CDP).What PowerShell command would you use?
A. View-CACrlDistributionPoint 
B. See-CACrlDistributionPoint 
C. Add-CACrlDistributionPoint 
D. Get-CACrlDistributionPoint
A

D. Administrators can use the Get-CACrlDistributionPoint command to view all the locations set for the CRL distribution point (CDP). See Chapter 22 for more information.

57
Q
You have a server named Server1 that runs Windows Server 2016.You need to configure Server1 as a Web Application Proxy. Which server role or role service should you install on Server1?
A. Remote Access
B. Active Directory Federation Services 
C. Web Server (IIS)
D. Direct Access and VPN(RAS)
A

A.To use the Web Application Proxy , you must install the Remote Access role.See Chapter 23 for more information.

58
Q
You have installed Active Directory Federation Services server and the Web Application Proxy. Which two inbound TCP ports should you open on the firewall? Each correct answer presents part of the solution. (Choose two.)
A. 443 
B. 390 
C. 8443 
D. 49443
A

A,D.TouseaWebApplicationProxyandADFS,youshouldsetyourfirewalltoallow for ports 443 and 49443. See Chapter 23 for more information.

59
Q
You need to modify configuration settings for a server application role of an application in AD FS. What PowerShell command do you use?
A. Add-AdfsServer Application
B. Set-AdfsServer Application
C. Get-AdfsServer Application
D. Install-AdfsServer Application
A

B. The Set-AdfsServerApplication command allows an administrator to modify configuration settings for a server application role of an application in AD FS See Chapter 23 for more information.