Short Answers Flashcards

1
Q

What are the four main features provided by Windows Defender that can be configured? Give a brief description of each feature.

A

Virus & threat protection lets you scan for malware, schedule scans, and activate real-time and cloud-based malware protection.
Firewall & network protection controls firewall settings for different network types.
App & browser control manages how the system handles new apps from the Internet and app exploit protection.
Device security shows if a computer uses UEFI secure boot and supports core isolation through processor virtualization extensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a starter GPO, and how is it created?

A

A starter GPO is a template with preset Administrative Templates settings for new GPOs. You can make one by right-clicking the Starter GPOs folder in Group Policy Management, clicking New, and naming it. Then, you customize the settings. When editing a starter GPO, only the Administrative Templates folder is available under Computer Configuration and User Configuration. Other GPO folders’ settings cannot be adjusted in a starter GPO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the advantages of implementing a Windows Server Update Services (WSUS) server in an organization?

A

A WSUS server can fetch updates from Microsoft for all software in an organization and share them with computers. You can also reject updates that shouldn’t be installed and set up WSUS to remove updates already installed, which helps avoid issues with other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the DHCP lease process.

A

When a DHCP client wants an IP configuration, it starts by sending a request to all hosts on the LAN. The DHCP server replies with an offer containing a potential IP configuration. The client then accepts the offer by sending a DHCPREQUEST packet to the server. The server acknowledges by sending a DHCPACK packet, specifying how long the client can use the IP configuration. Finally, the client configures itself with the provided IP configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do organizations configure default forwarders?

A

To speed up the connection between the client and the DHCP networks. They also do this to reduce the load that the DHCP server would be getting hammered with had this not been enabled and the default forwarder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dev is configuring the DHCP server in his organization. He wants to restrict some computers from obtaining an IP lease from the DHCP. How can he achieve this?

A

He can manually create an ip configuration that will be available for use, or he can create a pool of acceptable ip addresses that can be used within the network that he can manually input into computers. You could also use MAC filtering in order to filter certain MAC addresses from obtaining an IP lease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the events that occur in a system before a document is successfully printed?

A
  1. The user selects “Print” in an application like Microsoft Word.
  2. The application talks to a printing system in Windows.
  3. The document is stored in a folder.
  4. It’s converted to a format the printer understands by the printer driver.
  5. The print job is sent to the printer.
  6. The printer prints the document.
  7. The user is notified when printing is done.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List and explain the different Print and Document Services components that are available while installing the Print and Document Services server role?

A

The components within the Print and Document Services role include:
• Print Server—Installs the Print Management tool.

• Internet Printing—Allows Windows Server 2019 to share printers using IPP. This component will install and configure IIS to provide the HTTP or HTTPS functionality required by IPP.

• LPD Service—Allows Windows Server 2019 to share printers using LPD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bellamy, an administrator, identifies that one of the printers on the network is having an issue where long print jobs are mixing pages from other print jobs. What should Bellamy do to resolve this issue?

A

He needs to adjust the printer settings to start printing only after all pages are ready. To do this, he should:
1. Right-click the printer in Print Management.
2. Choose Properties.
3. Go to the Advanced tab.
4. Select “Spool print documents so program finishes printing faster” and “Start printing after last page is spooled.”
5. Click OK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sheryl is configuring an SMB shared folder using Server Manager. She notices that there is an option that allows her to “Encrypt data access.” Is this the same as encrypting a file or folder?

A

No, this means that the data being transferred between the Server Manager and the client will be encrypted however the file or folder will not. Although you can encrypt it and also encrypt the data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the different server roles that comprise the Distributed File System (DFS) component in Windows Server 2019.

A

DFS consists of two server roles: DFS Namespaces and DFS Replication. They can be managed using the DFS Management tool. DFS Namespaces offers a central access point to shared folders in the organization and can be set up on multiple file servers. DFS Replication synchronizes folder contents between servers and must be installed on all servers involved in the synchronization process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two different types of ACLs used by Windows Server 2019?

A

In Windows Server 2019, there are two types of ACLs: discretionary and system. A discretionary access control list (DACL) manages permissions for user and group accounts, deciding who can access a resource. A system access control list (SACL) records information for auditing resource access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three Active Directory group scopes and their restrictions regarding the objects that the groups can contain and the domains within the forest that can access them?

A
  • Global: Members are from the same domain, but any domain in the forest can access it.
  • Domain local: Members can be from any domain in the forest, but only the local domain can access it.
  • Universal: Members can be from any domain in the forest, and any domain in the forest can access it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a Read-only Domain Controller?

A

For smaller branch offices lacking dedicated IT staff and robust physical security measures, like security guards and secure server closets, secure domain authentication can be ensured by installing a Read-only Domain Controller (RODC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the process of restoring a deleted user account object using the Active Directory Administrative Center.

A

If you have the recycling bin service enabled you are able to look for the username and reinstate it within the domain with the same credentials and group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is driver signing, and how does it affect drivers that are not signed in Windows Server 2019?

A

When you add a new hardware device, Windows Server 2019 verifies its driver for security. This verification involves incorporating a unique Microsoft digital signature into the driver, known as driver signing. To ensure support from Microsoft, all device drivers added to Windows Server 2019 should be signed.

17
Q

How does TCP provide reliable end-to-end delivery of data?

A

It uses checksums to confirm with the receiving end that the packets are being transmitted and received fully. These checksum packets are then relayed back to the original computer to let it know that they were received.