Pre-Assessment Quiz Flashcards

1
Q

Identify the true statement about Type 2 hypervisors.

a. They can run independent of a host operating system.
b. They can run multiple operating systems on a single host.
c. They self-contain a small operating system.
d. They can interact with the hardware directly.

A

They can run multiple operating systems on a single host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns.

In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

a. The server will be dedicated to web services and accessed via the Internet.

b. The server will not be dedicated to a specific function but will serve multiple functions.

c. The server will be managed by a novice administrator that fulfills other roles in the company.

d. The server will also function as an Active Directory domain controller.
A

The server will be dedicated to web services and accessed via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX.

If SERVERX has Web server software installed using port 443, which of the following must be true?

a. SERVERX is also a domain controller and has the Active Directory Domain Services role installed.

b. Jenaro should avoid modifying the local computer's trusted host settings.

c. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443.	

d. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.
A

Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for programs and system software that can query WMI?

a. WMI providers	
b. WMI classes	
c. WMI consumers	
d. WMI infrastructure
A

c. WMI consumers

(why) WMI consumers are the programs and system software that can query WMI. WMI infrastructure refers to the components of the operating system that respond to these WMI queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the advantage of using production checkpoints over standard checkpoints?

a. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system.	
b. Production checkpoints are applied without shutting down the guest operating system.	
c. Production checkpoints cause fewer problems than standard checkpoints when applied.	
d. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts.
A

c. Production checkpoints cause fewer problems than standard checkpoints when applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process.

Which of the following Hyper-V features should Orana use?

a. Virtual machine templates
b. Replication
c. Live migration
d. Production checkpoints

A

a. Virtual machine templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the term for domain and forest functions that must be coordinated from a single domain controller?

a. Universal Group Membership Caching	
b. User Principle Name	
c. Flexible Single Master Operations	
d. Role seizure
A

c. Flexible Single Master Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system administrator wants to give NTFS folder permission to a project manager so that the manager can add or remove the read-only, hidden, archive, index, compress, and encrypt attributes.

Which of the following permissions should the administrator give to the project manager?

a. Write extended attributes
b. Read extended attributes
c. Read attributes
d. Write attributes

A

a. Write extended attributes

(why)
The administrator should give Write extended attributes permission to the project manager. Write extended attributes permission allows the user to add or remove the archive, index, compress, and encrypt attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access to a shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions.
a. True
b. False

A

a. True

(why)
You must be granted both shared folder permissions and NTFS/ReFS permissions to access files within a shared folder on an NTFS or ReFS filesystem. For example, if you have a Read/Write share access to a shared folder and a Read NTFS/ReFS permission to a file within the shared folder, you will only be able to read the contents of the file even though you have a Write access to the folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following print server permissions allows users to configure print server settings within the Print Management tool?

a. Manage Documents	
b. Manage Server	
c. Manage Printers	
d. View Server
A

b. Manage Server

(why)
Manage Server allows users to configure print server settings within the Print Management tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following options on a print queue webpage refreshes the list of print jobs within the print queue when selected?

a. Document List	
b. Properties	
c. All Printers	
d. Cancel All Documents
A

a. Document List

(why)
Document List is selected to refresh the list of print jobs within the print queue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool?
a. 1 KB
b. 10 KB
c. 1 MB
d. 10 MB

A

c. 1 MB

(why)
The last 1 MB of storage on the device is automatically reserved to ensure that it can be converted to a dynamic disk, if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements is true of SAN devices?

a. SAN devices are functionally like an external USB drive.

b. SAN devices use hardware RAID externally to provide fault tolerance for the storage device that they contain.

c. SAN devices use SAN protocols to manage and format filesystems.

d. SAN devices are the same as network-attached storage.

A

a. SAN devices are functionally like an external USB drive.

(why)
SAN devices only provide storage to other systems using a SAN protocol and do not format or manage filesystems on this storage. Instead, the operating system that connects to the SAN device provides this functionality. As a result, a SAN device is functionally like an external USB drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is true of WINS?

a. It is enabled by default on all Windows Server systems.

b. If a computer is configured to use WINS, it resolves NetBIOS names using broadcasts.

c. It can only resolve NetBIOS names to IPv4 addresses.

d. If NetBIOS is enabled, a WINS server does not need to be installed on the network.

A

c. It can only resolve NetBIOS names to IPv4 addresses.

(why)
WINS can only be used to resolve NetBIOS names to IPv4 addresses.

17
Q

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory.

What RAS capability will allow the organization’s applications to be accessible to users outside of the organization?

a. Virtual Private Networks	
b. RemoteApp	
c. DirectAccess	
d. Web Application Proxy
A

d. Web Application Proxy

(why)
Instead of performing remote access, the Web Application Proxy role service is used to relay Internet requests for Web apps to a Web server in the organization.

18
Q

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

a. Remote Desktop Licensing
b. Remote Desktop Gateway
c. Remote Desktop Virtualization Host
d. Remote Desktop Web Access

A

b. Remote Desktop Gateway

(why)
When users connect to a Remote Desktop Session Host or Remote Desktop Virtualization Host server using RDP, the Remote Desktop Gateway service ensures that all RDP traffic between the remote access server and client is encrypted by enclosing each RDP packet in an HTTPS packet.

19
Q

Block storage can easily be shared by several different Web apps, virtual machines, or containers.
a. True
b. False

A

b. False

(why)
Block storage is normally associated with a single Web app, virtual machine, or container only. Object storage can easily be shared by several different Web apps, virtual machines, or containers.

20
Q

TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data.

Which of the following is true of this scenario?

a. The TravelBugz app communicates with the Web app using the HTTPS protocol.

b. The TravelBugz app communicates with the Web app using the TCP/IP protocol.

c. The app and website communicate with each other using the TCP/IP protocol.

d. The TravelBugz website can be accessed from a browser using the TCP/IP protocol.

A

b. The TravelBugz app communicates with the Web app using the TCP/IP protocol.

(why)
Client programs and mobile apps can also be used as the front end for Web apps, either by connecting to a website using the HTTP or HTTPS protocol or by communicating directly to a Web app on a cloud server using a different TCP/IP protocol.

21
Q

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.
a. True
b. False

A

b. False

(why)
If multiple GPOs are linked to the same site, domain, or OU, they will be applied in link order, with the highest link order applied first and the lowest link order applied last.

22
Q

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?
a. 256-bit encryption
b. 257-bit encryption
c. 1024 -bit encryption
d. 2048-bit encryption

A

d. 2048-bit encryption

(why)
The default selections shown during the AD CS Configuration wizard configure an enterprise root CA called domain-server-CA that contains a 2048-bit public/private key pair.

23
Q

You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system’s performance.

What does the % Idle Time counter indicate?

a. The percentage of time the processor spends executing processes that do not require privileged access

b. The percentage of time a storage device was not performing a read or write function

c. The percentage of time the processor spends responding to interrupts

d. The percentage of free space on a volume

A

b. The percentage of time a storage device was not performing a read or write function

(why)
% Idle Time is the percentage of time a storage device was not performing a read or write function.

24
Q

What command can you use to determine if a network service is listening on the correct port number?

a. netstat -a	
b. tracert	
c. Test-NetConnection	
d. ping
A

a. netstat -a

(why)
The netstat -a command is used to check if a network service is listening on the correct port number.