Set 3 Windows Server 2019 Flashcards

1
Q

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory Domain. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need multiple boot images on a WDS server, one for each operating system. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.

Why does Dmitry’s computer reboot the second time?

A

To allow Hyper-V to start the host operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kenshin builds a collaboration tool using ASP.NET that allows users to discuss and share files with each other. The files are stored in a Web server on a platform managed by a cloud service provider.

Which of the following IIS role services is integral to the file-sharing feature in Kenshin’s Web app?

A

FTP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website.

Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website?

A

The first website is using port 443, so the second website cannot use the same port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Theodore installs a Fedora Linux distribution on a Windows Server 2019 server. He initially uses the sudo command to perform system administration on the Linux system. Later, he opens a new command prompt and runs some more administrative commands.

Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes?

A

Theodore used the sudo passwd root command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks.

Which of the following options should Merlyn choose?

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote users must manually initiate a VPN connection each time they wish to connect to the resources in their organization when using DirectAccess. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Remote Desktop app uses Secure Socket Tunneling Protocol (SSTP) to transfer desktop graphics, keystrokes, and mouse movements to and from the remote access server. True or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can obtain a Remote Desktop session by navigating to https:// server/RdWeb in a Web browser, where server is the FQDN of the Remote Desktop Web Access server. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kelsan Informatics has its client computers connected to a router through which the clients can access the organization’s servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering.

What is the term for this type of NAT router?

A

Next Generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router.

In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology?

A

Demarcation point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server?

A

The NAT router should be a Next Generation Firewall

17
Q

You are configuring a Windows Server 2016 VPN server using L2TP and NAT.

Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work?

A

1701/TCP

18
Q

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method.

Which of the following methods should Kyra ensure is supported on both the client and the server?

A

Extensible Authentication Protocol (EAP)

19
Q

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory.

What RAS capability will allow the organization’s applications to be accessible to users outside of the organization?

A

Web Application Proxy

20
Q

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service.

On the next configuration screen, which of the following services should you select?

A

LAN routing

21
Q

Trang, a system administrator, is configuring a DHCP relay on the remote access server. She needs to configure the DHCP relay agent to listen for DHCPDISCOVER packets on a network interface.

Which of the following statements is true of this scenario?

A

Trang should select the network interface that is connected to the DMZ

22
Q

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties.

In which of the following circumstances will this permission be used?

A

When a user account has the Control access through NPS Network Policy option set

23
Q

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users’ computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they’re unable to use DirectAccess.

If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use?

A

Remote Clients

24
Q

Hiro is working remotely. His current role requires him to access his organization’s resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system.

If Hiro was able to launch Microsoft Outlook directly from his computer, without accessing the desktop of the remote server, which of the following options is he using?

A

RemoteApp

25
Q

Zahara is accessing an application installed on her organization’s remote access server from her laptop. She saves output from the application into a file on the server. She opens the saved file on the server and prints it using her local printer.

Which of the following protocols is employed in this scenario?

A

Remote Desktop Protocol

26
Q

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS?

A

Remote Desktop Gateway

27
Q

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode.

If Michaela selects the Per User licensing mode, which of the following statements is true?

A

Michaela’s organization allows users to connect remotely using their personal computers.