Post-Assessment Quiz Flashcards

1
Q

Microsoft Hyper-V is a Type 2 hypervisor.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Peer-to-peer networking offers only moderate network security because user account information must be maintained on each workstation.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a BPA scan used to verify server roles, the analysis of each role yields a report that shows four levels of severity.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows Deployment Services can be used to rapidly deploy Windows Server 2019 to physical servers that are connected to the network.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Read-only Domain Controller (RODC) cannot be used to update information in Active Directory, and it does not replicate to regular DCs.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Windows Server 2019 allows you to enable data deduplication for NTFS and ReFS volumes that are not the boot or system volume.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fault-tolerant RAID volumes ensure that you no longer need backups.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modern operating systems such as Windows 10 do not support NetBIOS and use FQDNs instead.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Windows 7 clients can be allowed to use DirectAccess.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a WSUS server is implemented in an organization, updates must be approved on the WSUS server before they can be installed on computers.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Norman installs the Windows Server 2019 Essentials Edition on a server. He needs to send out a note to his team explaining the features and limitations of the server.

Which of the following statements should Norman include in his email?

a. It is limited to a maximum of 100 concurrent remote access connections.

b. It does not include the Hyper-V role that is used to manage virtual machines.

c. It can join a preexisting domain and function as a domain controller in the domain.

d. It is limited to a maximum of 64 CPU sockets and 24 TB of memory.

A

b. It does not include the Hyper-V role that is used to manage virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Booker is the IT administrator for Juan Computing. He receives a request to install Windows Server 2019. One of the accompanying requests is that the data stored on the server will be accessed and modified frequently by hundreds of users.

Which of the following should Booker consider using for the installation?

a. An SSD	
b. A regular hard disk	
c. A 1.4 GHz processor	
d. A full HD monitor
A

a. An SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your organization uses Windows Server 2019, and you recently installed a fresh copy of Windows Server 2019 Standard Edition on a system.

Which of the following statements is true if the domain controller automatically activated the license on this new system?

a. You forgot to connect the computer to the same network as that of the domain controller.

b. The newly installed server has the Active Directory-based Activation role installed.

c. You received a generic volume license key (GVLK) with Windows Server 2019 installation media.

d. Your organization has purchased a retail product key or Multiple Activation Key (MAK).

A

c. You received a generic volume license key (GVLK) with Windows Server 2019 installation media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Maryann is working on a system that is connected to the Active Directory domain of her company, Fixvent. She is performing a few server administration tasks using Server Manager. The server that requires these administration tasks is running Windows Server 2019.

If Maryann uses the Remote Server Administration Tools (RSAT) to complete these tasks, which is the most likely operating system on her computer?

a. Windows Server 2016	
b. Windows XP	
c. Windows 10 Professional	
d. Windows Server 2019
A

c. Windows 10 Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Registry root key has information about the current hardware profile?

a. HKEY_CURRENT_CONFIG	
b. HKEY_USERS	
c. HKEY_CURRENT_USER	
d. HKEY_LOCAL_MACHINE
A

a. HKEY_CURRENT_CONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One of the common applications running on Safara’s system has not been receiving automatic updates. She suspects that the update service for the application has turned off. She wants to view a list of services on the system.

Which of the following PowerShell cmdlets should Safara run?

a. Get-Service	
b. Start-Service	
c. Set-Service	
d. Net-Service
A

a. Get-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Read the script below and answer the question that follows.

$answer = Read-Host “Would you like to run the WebsiteCache script?

Yes/No/Quit”

if ($answer -eq “Yes” -or $answer -eq “Y”)

{“Caching Websites - Please Wait”; & C:\WebsiteCache.ps1}

elseif($answer -eq “No” -or $answer -eq “N”)

{“Caching Aborted”}

elseif($answer -eq “Quit” -or $answer -eq “Q”)

{“End Program”; Start-Sleep 3; exit}

else

{“Caching Websites - Please Wait”; & C:\WebsiteCache.ps1}

If a user executes this code in Windows PowerShell and enters “Okay,” what is the result?

a. End Program will appear on screen and the PowerShell window will close in 3 seconds.

b. The WebsiteCache script will be executed successfully.

c. The user will be prompted to enter another response.

d. The PowerShell window will display Caching Aborted.

A

b. The WebsiteCache script will be executed successfully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fang creates external and internal virtual switches on a server that has Hyper-V installed.

Which of the following statements is true of the physical network interface in this scenario?

a. The Hyper-V Extensible Virtual Switch protocol is disabled by default.

b. IPv4 and IPv6 are enabled on the physical network interface by default.

c. The physical network interface should not be configured to use IP.

d. The physical network interface will not appear within the Network Connections area of Control Panel.

A

c. The physical network interface should not be configured to use IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Keanu, a system administrator, created a virtual machine using the default settings. After a few weeks, he notices that the virtual hard disk is almost full, so he decides to expand the hard disk. He opens the virtual hard drive settings and is faced with multiple options.

Help Keanu pick the correct settings option.

a. Inspect	
b. Browse	
c. Edit	
d. Remove
A

c. Edit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019, installs server roles and features, and adds third-party software. The next step is to remove all unique information from this computer.

Which of the following tools should Abu use?

a. System Preparation Tool

b. NIC Teaming

c. File System Freeze

d. Windows Deployment Services

A

a. System Preparation Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the feature that allows a WDS server to send a bootable WIM copy to be installed by multiple clients simultaneously?

a. Live migration	
b. Multicast	
c. Kerberos	
d. Port mirroring
A

b. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Nargiza, a system administrator, is setting up user accounts for a newly recruited graphic designer whose name is Philip Thomson. Active Directory is set up on Windows 2019 Server.

Which of the following can Nargiza use as the account name?

a. Philip,Thomson	
b. Philip[Thomson	
c. Philip:Thomson	
d. Philip.Thomson
A

d. Philip.Thomson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is true of the Infrastructure Master Active Directory FSMO role?

a. It is limited to one role per forest.

b. It is limited to one role per domain controller.

c. It is used to coordinate group membership.

d. It is used to coordinate user password changes.

A

c. It is used to coordinate group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Trent is the system administrator at an organization that has offices in three countries. The Human Resources department has its own domain, domainHR.com, and has two domain controllers in each country. The domain controllers are named DC1, DC2, DC3, DC4, DC5, and DC6. To improve the efficiency of Active Directory replication, Trent decides to create sites for each location. Trent creates the only site in the domain HR.com root forest at the location that contains the domain controllers DC3 and DC4.

Which of the following is true of this scenario?

a. The site will be named Default-First-Site-Name.

b. The site will be named Default_domainHR_Site1.

c. The site will contain all domain controllers.

d. The site will contain the domain controllers DC3 and DC4.

A

a. The site will be named Default-First-Site-Name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Ayan is a system administrator at an organization that has a high rate of employee churn. This means that a high percentage of employees leave the organization over a specific time period. In addition, the organization also sees a high percentage of previous employees returning to the company.

When a user leaves this organization, which of the following cmdlets is Ayan most likely to use?

a. Remove -ADUser	
b. New -ADUser	
c. Enable -ADAccount	
d. Disable -ADAccount
A

d. Disable -ADAccount

26
Q

Jsmith is a member of two groups in your organization, the Accounting group and the Contractor group. He wants to save a file to Folder A on his local computer but finds he has no access. Upon investigating, you discover the Accounting group has Full control over Folder A, but the Contractor group has been denied all access to the folder.

What is Jsmith’s effective access?

a. Jsmith’s membership in the Contractor group limits him to read and execute permissions.

b. Jsmith’s membership in the Contractor group allows him to edit files in the folder only after he takes control of the folder using the Accounting group permissions.

c. Because the two groups have opposite levels of access, the two cancel out and Jsmith is left with only read permissions.

d. Jsmith’s membership in the Contractor group means that he has been denied all access to the folder.

A

d. Jsmith’s membership in the Contractor group means that he has been denied all access to the folder.

27
Q

Gabriela attempts to share a folder with other users via NFS sharing. However, she is unable to do so because of a restriction.

Which of the following limitations placed by Windows Server 2019 may be causing this issue?

a. The Server for NFS role is installed.

b. Gabriela is trying to share the folder to a Linux or UNIX computer.

c. Gabriela is not an administrator or part of the Administrator group.

d. The folder is on a FAT32 filesystem.

A

d. The folder is on a FAT32 filesystem.

28
Q

Which of the following statements is true of Distributed File System (DFS) namespaces?

a. It must be installed on all the servers that synchronize folder contents.

b. It cannot be accessed through File Explorer.

c. It does not have to be installed on all the servers within an organization.

d. The access-based enumeration feature is enabled by default after DFS namespace is created.

A

c. It does not have to be installed on all the servers within an organization.

29
Q

Which of the following refers to a temporary space for files that need to replicate to other systems?

a. DFS staging folder	
b. Hub and spoke topology	
c. DFS replication group	
d. Full mesh topology
A

a. DFS staging folder

30
Q

Which of the following is true of user quotas?

a. They contain a list of filename extensions used in screening.

b. They limit the space that users can consume within the filesystem.

c. They limit the space consumed by a folder on the filesystem.

d. They prevent users from storing files of a certain category within folders.

A

b. They limit the space that users can consume within the filesystem.

31
Q

Identify the next step in the printing process after a document to be printed has been generated.

a. The document is rendered using the printer driver.

b. The print server sends the print job to the locally attached print device.

c. The print job is sent from the print server to the print client across the network.

d. The software application contacts a print API.

A

d. The software application contacts a print API.

32
Q

Which of the following statements accurately reflects the default permissions applied to printers?

a. Manage Printers permission is assigned to all users.

b. CREATORs are denied Manage Documents permission.

c. The Everyone group has Print permission.

d. Users can configure the print server by default.

A

c. The Everyone group has Print permission.

33
Q

Nancy is a system administrator working in a multinational corporation. She often receives complaints from her colleagues that people take the wrong printed documents because of the large number of print jobs.

How can Nancy sort this issue?

a. She should reinstall the printer driver.

b. She should configure a separator page.

c. She should move the spool folder to a different storage device.

d. She should cancel all existing print jobs.

A

b. She should configure a separator page.

34
Q

Lisa attempts to increase the priority of a print job to allow it to print before other print jobs are submitted by other users. However, she is unable to do so because of a restriction.

Which of the following limitations placed by Windows Server 2019 may be causing this issue?

a. Lisa does not have Print permission to the shared printer.

b. Lisa does not have Manage Documents permission.

c. Lisa has not enabled Branch Office Direct Printing (BODP) on the shared printer.

d. Lisa has not installed the Internet Printing component of Print and Document Services on a print server.

A

b. Lisa does not have Manage Documents permission.

35
Q

The queue status in the Print Management window shows Attention Required. The print server does not have the LPD service installed. Which command will you use to mitigate this problem?

a. Restart-Service spooler
b. Suspend-PrintJob
c. Restart-Service spooler-force
d. Net start lpdsvc

A

a. Restart-Service spooler

36
Q

Which of the following statements is true of the primordial storage pool?

a. The primordial storage pool contains the boot and system partitions.

b. It stores 1 MB of its space to convert to a dynamic disk.

c. The primordial storage pool is used to create an MBR on new storage devices.

d. It lists the four available local storage devices in the physical disks.

A

d. It lists the four available local storage devices in the physical disks.

37
Q

Riya has an external storage area network device that she wants to connect to the Windows Server 2019 operating system. Which of the following protocols can she use to connect her device to the operating system?

a. SMB	
b. iSCSI	
c. NFS	
d. FTP
A

b. iSCSI

38
Q

Which of the following commands can be run to perform a check on F: drive and fix any errors found with the filesystem?

a. chkdsk F:\ /f	
b. checkdsk /c F:\	
c. chkdsk /c F:\	
d. chkdsk /f F:\
A

d. chkdsk /f F:\

39
Q

Barack configures a Window 2019 server as a DNS server. He creates forward and reverse lookup zones on the server to provide authoritative responses. A client contacts the DNS server for a lookup request, but the request cannot be resolved using the zones.

Which of the following is true of this scenario?

a. Barack needs to set up the DNS server as a default forwarder to resolve the lookup request using root hints.

b. The DNS server will automatically forward the request to another DNS server that is capable of resolving the lookup request.

c. Barack needs to set up cached entries and root hints on the server after deleting the zones.

d. The DNS server will attempt to resolve the request by performing a recursive query using the root hints.

A

d. The DNS server will attempt to resolve the request by performing a recursive query using the root hints.

40
Q

Ksenia sets up the DNS Server role on SERVERX. Next, she sets up a primary and secondary zone, followed by a stub zone.

Which of the following is true of this scenario?

a. The stub zone will contain NS records.

b. The stub zone cannot access a primary zone on another DNS server.

c. The stub zone cannot contain host records.

d. The stub zone will function as the authoritative zone.

A

a. The stub zone will contain NS records.

41
Q

Runako is configuring DHCP options on his organization’s DHCP server. He has configured the default router option and the time server option. Next, he wants to configure the DNS Servers option.

Which option number is Runako likely to choose to complete this task?

a. 006	
b. 015	
c. 046	
d. 003
A

a. 006

42
Q

Aslam is configuring a DHCP server in his organization. During the creation of a new scope, he is prompted to enter an exclusion range.

If Aslam chooses to leave this range empty, which of the following will indicate that Aslam has made an incorrect choice?

a. The network does not contain other DHCP servers that lease IP addresses.

b. The organization does not contain any DHCP relay agents in other locations.

c. The network contains DHCP servers configured in a DHCP failover configuration.

d. The organization contains computers with manually configured IP addresses.

A

d. The organization contains computers with manually configured IP addresses.

43
Q

Which TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

a. 1812	
b. 443	
c. 500	
d. 1723
A

b. 443

44
Q

Dorene, a system administrator, is configuring a DHCP relay on the remote access server. She adds an IPv4 relay agent and specifies the IP address of the DHCP server that contains the scope for the DMZ network.

What should Dorene do next?

a. She should reboot the remote access server.

b. She should configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.

c. She should configure the DHCP relay agent to forward authentication requests to a RADIUS server.

d. She should add a DHCP relay agent for IPv6.

A

b. She should configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.

45
Q

Raisa is configuring the logging properties for the sales department on the RADIUS server. She wants the server to only log specific events. Raisa selects Sales on the Network Policy Server tool.

Which of the following options should Raisa select next?

a. Configure Accounting
b. Change Log File Properties
c. Configure Sales
d. Change SQL Server Logging Properties

A

b. Change Log File Properties

46
Q

Pascal installs the Remote Desktop Services server role on multiple servers in his organization. He intends to allow users remote access to the organization’s resources in the DMZ. Because multiple users will be creating remote sessions, Pascal wants to ensure that this load is balanced across the servers with the Remote Desktop Services server role installed.

Which of the following role services will allow Pascal to accomplish this?

a. Remote Desktop Virtualization Host

b. Remote Desktop Connection Broker

c. Remote Desktop Web Access

d. Remote Desktop Gateway

A

b. Remote Desktop Connection Broker

47
Q

Anita logs into her personal computer and begins streaming a movie from ArkanShotz. She simultaneously opens a Microsoft Word file on her laptop and starts jotting down notes to help her write a review of the movie. To calculate some numbers that she needs to plug into the article, she opens a calculator on her smartphone.

Which of the following is true of this scenario?

a. ArkanShotz is an example of a Web app.

b. Anita’s calculator is an example of a Web app.

c. Anita’s laptop is an example of a cloud server.

d. Microsoft Word is an example of a Web app.

A

a. ArkanShotz is an example of a Web app.

48
Q

Priscilla is configuring a new Web server in her organization. A common complaint across the organization is that Web apps load slowly. Her manager asks her to configure IIS in a way that improves the loading of Web apps.

Which of these IIS role services should Priscilla install to help with this?

a. IIS Management Tools	
b. FTP Server	
c. Web Server Performance	
d. Web Server Security
A

c. Web Server Performance

49
Q

Nova, a Web app developer, builds an application that she wants to make available to other developers. She wants to distribute it along with the container image that is configured to run the app.

Which of the following can host Nova’s Web app?

a. Docker client program	
b. Docker daemon	
c. Docker Hub	
d. DockerProvider
A

c. Docker Hub

50
Q

You set up a Windows Server 2019 system and install the Docker EE package. Next, you run the following command to enable LCOW: PS C:> [Environment]::SetEnvironmentVariable(“LCOW_SUPPORTED”, “1”, “Machine”)

Which of the following commands should you run next to complete setting up LCOW?

a. PS C:> docker tag microsoft/iis iis

b. PS C:> docker search apache

c. PS C:> docker images

d. PS C:> Restart-Service Docker

A

d. PS C:> Restart-Service Docker

51
Q

Malcolm installs Windows Server 2019 on a physical server in his organization to run Windows Web apps. One of the Web apps that Malcolm intends to run on this server requires a large amount of object storage.

How can Malcolm address this requirement?

a. Malcolm can use SANs to provide object storage options for the app.

b. Malcolm can run the Web app on an Apache Web server instead of running it on IIS.

c. Malcolm can install a software package that provides object storage options on the private cloud.

d. Malcolm can configure the app to access object storage on a cloud provider.

A

d. Malcolm can configure the app to access object storage on a cloud provider.

52
Q

Sakura, a system administrator, is making some changes to the domain-level GPO in her organization. These changes must be applied to all users and computer accounts. She knows that some of the OUs in the Active Directory have GPO settings that prevent the application of any domain-level GPO changes.

What should Sakura do to ensure that changes in the domain-level GPO are applied to all users and computer accounts?

a. She should create a new OU and move the users under that OU.

b. She should configure the Block Inheritance setting on the OUs.

c. She should configure the GPU link with the Enforced setting.

d. She should ask the users under the OUs to accept the domain-level setting when prompted.

A

c. She should configure the GPU link with the Enforced setting.

53
Q

Nathaniel, a system administrator of a marketing firm, has noticed unusual activity consistent with a malware attack. After some research, he finds out that the firm’s private key has been compromised, and he needs to revoke the compromised certificate.

What steps should Nathaniel follow to find the option to revoke the compromised certificate?

a. Go to Issued Certificates, right-click the relevant certificate, and click All Tasks

b. Go to Revoked Certificates, right-click, select All Tasks, and click Publish

c. Go to Pending Requests, right-click, click All Tasks, and click Issue

d. Go to Revoked certificates, right-click the relevant certificate, and click Move

A

a. Go to Issued Certificates, right-click the relevant certificate, and click All Tasks

54
Q

A small-scale organization uses a WPA2 wireless LAN to provide Internet access to its regular visitors. It was later found that some people passing by the office building used Aircrack, a cracking tool, to access the Internet through the organization’s WLAN. Upon consulting with experts, the organization decides to use a RADIUS server to block such tools.

What do you think made it so easy for outsiders to crack and use the organization’s WLAN in the first place?

a. The WPA generated random symmetric encryption keys that are easy to identify.

b. The WLAN was not password protected.

c. The WPA does not encrypt the traffic between the devices and the WAP.

d. The WLAN allowed users to connect to the Internet using the same password.

A

d. The WLAN allowed users to connect to the Internet using the same password.

55
Q

Which of the following commands can be used on the Command Prompt Window to run the Windows Defender Firewall with Advanced Security tool?

a. wf.msc	
b. certmgr.msc	
c. gpedit.msc	
d. certlm.msc
A

a. wf.msc

56
Q

As a system administrator, you will be tasked with performing both proactive and reactive maintenance of a Windows Server 2019 machine.

Which of the following tasks will you perform as part of proactive maintenance?

a. Ensure that 20% free space is always available for file caches.

b. Gather as much as information about a problem as soon as it occurs.

c. Monitor the system and take backup if it had not been already done.

d. Document the solutions you provided for problems.

A

a. Ensure that 20% free space is always available for file caches.

57
Q

In the past, you have faced issues with the response time of a Windows Server 2019 system, SERVERZ, in your organization. To avoid future problems, you create a data collector set called SERVERZ Data Collector Set.

Which of the following predefined data collector configurations will you use?

a. Basic	
b. WDAC Diagnostics	
c. System Performance	
d. System Diagnostics
A

d. System Diagnostics

58
Q

Which of the following is a tool that a server administrator would typically use first while facing a problem with the performance of a system?

a. Resource Monitor	
b. Performance Monitor	
c. Task Manager	
d. Event Viewer
A

c. Task Manager

59
Q

You are troubleshooting a network issue on your server and suspect the issue exists beyond your gateway/router, in another LAN. Which of the following commands will you use to test the connectivity to the router in the other LAN?

a. tracert	
b. ping	
c. nslookup	
d. arp -a
A

a. tracert

60
Q

What statement correctly describes the pathping command?

a. It is used to check the connectivity within a network.

b. It should be used in Windows PowerShell.

c. It can be used to test network latency in milliseconds.

d. It cannot be used along with a target IP address.

A

c. It can be used to test network latency in milliseconds.