Looks like no one added any tags here yet for you.
Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. Previously, all the marketing and sales employees worked as a single team. Recently, the employees in these teams were reorganized into two separate teams. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure.
What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?
A. One
B. Two
C. Three
D. Zero
B.
The minimum number of domain controllers for a domain is two. Ahmad should add two domain controllers each to the two new domains. If one domain controller fails, the other domain controller can continue to ensure domain authentication.
By default, the only site created within a new forest does not contain any domain controller.
True
False
False
By default, the only site created within a new forest is called Default-First-Site-Name, and it contains the first domain controller object within the forest.
Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication.
What is a cost-effective method of dealing with this issue?
A. Hiroshi should reduce the number of domain controllers to just one per physical location.
B. Hiroshi should create site objects and specify timed intervals for replication using site link objects.
C. Hiroshi should create separate domains for each location to avoid the need for replication.
D. Hiroshi should remove all domain controllers and have only one domain controller for the domain.
B.
Creating site objects and connecting them using site link objects will help Hiroshi specify the time when changes need to be replicated. He can then have the replication occur after business hours or when the Internet bandwidth usage is low.
If a site cannot hold a copy of the global catalog, which of the following features can be enabled on the site to provide fast authentication?
A. Universal Group Membership Caching
B. Flexible Single Master Operations
C. User Principle Name
D. Role seizure
A.
You can enable Universal Group Membership Caching (UGMC) on sites that are unable to hold a copy of the global catalog to provide fast authentication.
Which of the following organizations should consider using Azure Active Directory?
A. An organization that subscribes to Office 365 services
B. An organization that uses IIS as a web server
C. An organization that deploys Internet accessible services, such as FTP or DNS
D. An organization that has a substantially onsite workforce
A.
An organization that subscribes to Office 355 would benefit from using Azure Active Directory. It is an Active Directory service within the Microsoft Azure cloud. It provides the same single sign-on features of Active Directory, but it is designed to allow access to cloud applications such as Office 365.
Arpita is adding FSMO roles to domain controllers in the domainG.com forest. The forest contains other domains. domainG.com contains two domain controllers, DC1 and DC2. DC1 contains a copy of the global catalog.
Which of the following is a best practice that Arpita should follow?
A. She should create the Domain Naming Master role on DC2.
B. She does not need to create the Infrastructure Master role because the forest contains multiple domains.
C. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog.
D. She should create the Infrastructure Master role on DC1.
D.
The Infrastructure Master role provides similar functionality to the global catalog. Because DC1 contains the global catalog, Arpita should install the Infrastructure Master role on DC2.
Faustino is the system administrator at an organization that has offices in multiple locations. The domain controllers in each location are within location-specific sites to improve Active Directory replication. Faustino notices performance issues in the Active Directory replication across sites.
Which of the following measures can Faustino use to improve the performance?
A. He change the bridgehead server to one with a faster network interface.
B. He can use SMTP instead of IP to improve performance.
C. He can increase the number of domain controllers to spread the replication load.
D. He can restrict the number of domain controllers to one per site.
A.
Using a bridgehead server with a faster network interface will help increase replication performance.
Which of the following statements about directory partitions is true?
A. Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships.
B. Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.
C. If any change is made to a configuration partition, the change is also replicated in the schema partition.
D. The largest section of the Active Directory database is the configuration partition.
B.
When a change is made to the domain partition on a domain controller, such as the addition of a user object, that change is replicated to other domain controllers within the same domain only.
Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient.
Which of the following features of Active Directory can Priyanka use to provide a solution?
A. Universal Group Membership Caching
B. Selective authentication
C. User Principle Name
D. Distribution groups
D.
Implementing distribution groups will allow Alfons to send emails or meeting invites to his team without requiring him to type out individual email IDs. When you send an email to a distribution group, the email system sends it to all of the user accounts that are members of the distribution group.
Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics.
What is the appropriate security measure that Shannon should take?
A. Disable user accounts in the branch office
B. Delete the RODC computer account
C. Shut down all RODCs
D. Create a new RODC
B.
The RODC most likely contains a password attribute for user accounts specific to the branch location. Deleting the RODC computer account will reset the passwords for the branch office users.
Latanya, a system administrator, is creating computer objects. She uses the Active Directory Users and Computers tool instead of the Active Directory Administrative Center.
What is the most likely reason for not using the Active Directory Administrative Center?
A. It can only be used to manage OU, user, group, and computer objects, but not to create these objects.
B. It is a command line tool similar to Windows PowerShell that requires the use of cmdlets.
C. It does not support features introduced within Windows Server 2008 R2 and later functional levels.
D. It uses a minimal color interface that is similar to the one provided by Server Manager.
D.
It uses a minimal color interface that is similar to the one provided by Server Manager. As a result, many administrators prefer using the Active Directory Users and Computers tool for object management.
You are the system administrator tasked with raising the domain functional level of domainA.com from Windows Server 2008 to Windows Server 2012 R2. First, you upgrade the domain controllers running Windows Server 2008 to Windows Server 2012 R2.
Which of the following commands must you run next in Windows PowerShell to complete your task?
A. netdom.exe
B. Set-ADForestMode –Identity domainA.com -ForestMode Windows2012R2Domain
C. Set-ADDomainMode –Identity domainA.com -DomainMode Windows2012R2Domain
D. Get-ADDomain | select PDCEmulator,RIDMaster,InfrastructureMaster
C.
This command is used to raise the domain functional level to Windows Server 2012 R2 for the domainA.com domain.
Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service.
True
False
True
If domain1.com is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2.
True
False
False
The domain name is missing in the command. If domain1.com is the forest root domain, you can use the Set-ADForestMode –Identity domain1.com -ForestMode Windows2012R2Domain command to raise the forest functional level to Windows Server 2012 R2.
Which of the following statements regarding a domain functional level is accurate?
A. It represents the oldest Windows Server version that can be used on a domain controller.
B. It applies to domain controllers, clients, and other servers that are present in the domain.
C. A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level.
D. Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised.
A.
Each domain function level defines the oldest version of Windows Server that can be used on domain controllers within a domain. All Active Directory features released since that version of Window Server are disabled automatically on newer domain controllers.
A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline.
What is the most likely outcome?
A. Petra.T will be locked out of their account until the domain controller can access the global catalog.
B. Petra.T will be allowed to log in and access resources across the domain.
C. Petra.T will be allowed to log in to the system with cached credentials.
D. Petra.T will not be allowed to log in to the system because the global catalog server is not available.
C.
If a global catalog cannot be contacted, the user will not be able to complete the authentication process and log into the domain but may be able to use cached credentials to access their system.
Anahira is the system administrator at an organization that has offices in two different locations, New York and Sao Paulo. She decides to create sites for each location, NewYorkSite and SaoPauloSite, to improve Active Directory replication. Once she creates the sites, she associates NewYorkSite with the IP address 10.1.0.0/16.
Which of the following is true of this scenario?
A. Anahira will not be able to install or use Simple Mail Transfer Protocol (SMTP) to perform Active Directory replication.
B. This restricts the creation of bridgehead servers, and only NewYorkSite will contain bridgehead servers.
C. Assigning an IP address to a site indicates that domain controllers within this site contain the global catalog.
D. When new domain controllers are added to this network, they will be added to NewYorkSite by default.
D.
When new domain controllers are added to the 10.1.0.0/16 network, they will be added to NewYorkSite by default.
You are the system administrator at an organization. Most of the servers in your organization, including domain controllers, are running Windows Server 2012 and above. Some servers, excluding domain controllers, are running Windows Server 2008 R2. Most of the clients are running Windows 10, but a few systems are running Windows 7. You have been tasked with improving the security measures of the Active Directory forest by restricting malicious access to Active Directory. You decide to use Privilege Access Management.
What should you do next?
A. Update the clients that are running Windows 7 to Windows 10
B. Update all the domain controllers running Windows Sever 2012 to Windows Server 2016
C. Update the servers running Windows Server 2008 R2 to Windows Server 2019
D. Revert the domain functional level of each domain in the forest to Windows Server 2016
B.
To obtain the Privilege Access Management feature using Microsoft Identity Management, you must raise the forest functional level to Windows Server 2016. You can only do this by first raising the domain functional levels of each domain to Windows Server 2016.
By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User.
True
False
False
By default, a new domain only has one organization unit called Domain Controllers that contains the computer accounts for the domain controllers within the domain.
Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources.
If Minisha is able to accomplish this task successfully, which of the following must be true?
A. Minisha is a member of the Enterprise Admins group in both organizations.
B. Minisha has run the following command: Set-ADDomainMode –Identity domainX.com -DomainMode Windows2012R2Domain.
C. Minisha has run the following command: Get-ADForest | select SchemaMaster,DomainNamingMaster.
D. Minisha is a member of the Domain Admins group in both organizations.
A.
Minisha can accomplish this task successfully only if she is a member of the Enterprise Admins group.
Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change.
What tab under a user object's properties will allow Glenna to make this change?
A. Profile
B. Account
C. Organization
D. General
B.
The Logon Hours button on the Account tab will allow Glenna to set up an account so that the user only signs in to the domain at designated times, such as only from 8:00am to 7:00pm Monday through Friday.
What is the use of the New-ADReplicationSite Windows PowerShell cmdlet?
A. It can be used to create a new site object.
B. It can be used configure the replication settings within a site link object.
C. It can be used to launch the Active Directory Sites and Services tool.
D. It can be used to change the bridgehead server in a site.
A.
The New-ADReplicationSite cmdlet can be used to create a new site object.
Raven is adding FSMO roles to domain controllers in the domain1.com forest. The forest contains a single domain and three domain controllers, DC1, DC2, and DC3. DC1 contains a copy of the global catalog, and all three domain controllers have the latest version of Windows Server 2019 installed.
Which of the following is a best practice that Raven should follow?
A. She should create three Domain Naming Master roles, one for each domain controller.
B. She should create the Domain Naming Master role on DC1.
C. She should use DC2 or DC3 as the Domain Naming Master.
D. She does not need to create the Domain Master role because DC1 contains a copy of the global catalog.
B.
For the best performance, the domain controller that holds the Domain Naming Master should also hold a copy of the global catalog. For this reason, Raven should create this role on DC1.
After an RODC gets stolen along with a few other computers, Shania, the system administrator, resets the computer accounts of the stolen computers that were cached on the RODC. She accomplishes this task by using the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option.
Which of the following is true of this scenario?
A. Any computers that were not stolen will need to rejoin the domain.
B. The stolen computers can rejoin the domain after resetting their passwords.
C. Shania does not need to delete the stolen RODC computer account if the other computer accounts are reset.
D. The Active Directory database on the stolen RODC is deleted automatically.
A.
Once Shania uses the Reset all passwords for computer accounts that were cached on this Read-only Domain Controller option, any computers that were not stolen will need to rejoin the domain.
Sanya, an IT administrator for an organization, installs a new application on 150 computers used by programmers in the organization. She does this with a few clicks only for this specific set of users without impacting the rest of the organization.
Which of the following features of Active Directory is exemplified by Sanya's actions in this scenario?
A. Group Policy
B. Access Control List
C. A standalone server
D. A member server
A.
This scenario exemplifies the Group Policy feature of Active Directory. The Group Policy feature of Active Directory can be used to automatically deploy software, or configure security, operating system, and application settings on computers within an Active Directory domain based on the location of the user or computer object within the Active Directory database.
Kiora is setting up an RODC for the first time at one of her organization's branch offices. She creates a prestaged RODC computer account. Next, she installs a Windows Server 2019 system that will function as the RODC.
What is the most appropriate step that Kiora should take next?
A. Use the Active Directory Domain Services Configuration Wizard to configure the RODC
B. Create new user accounts for the branch office users
C. Add branch office user accounts to the Allowed RODC Password Replication Group
D. Run the Active Directory Domain Services Installation Wizard
C.
Kiora needs to add branch office user accounts to the Allowed RODC Password Replication Group before she runs the Active Directory Domain Services Installation Wizard. By default, only users that are members of the Allowed RODC Password
A recently promoted employee at your company has called you because they attempted to log in to their computer several times with a password created after a password expiry notice, but the attempts made were unsuccessful. You have reset the user's account password, but the user is still unable to log in.
What is most likely the cause of the failure?
A. The user is in a new OU and lacks permission to log into the computer used.
B. The computer is having issues communicating with the domain and is attempting to use cached credentials.
C. The user's account has been locked because of frequent failed password attempts.
D. The global catalog server has not replicated the user's account information to the rest of the domain.
C.
The most likely cause of failure is that the user's account has been locked because of frequent failed password attempts. You can unlock the user's account so that they can log into the system.
What is the term for domain and forest functions that must be coordinated from a single domain controller?
A. Role seizure
B. User Principle Name
C. Universal Group Membership Caching
D. Flexible Single Master Operations
D.
Certain domain and forest functions must be coordinated from a single domain controller. These functions are called Flexible Single Master Operations (FSMO).
Catelin creates a virtual machine template named WindowsServer2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS\Win2019VM1 for the configuration files and virtual hard disks.
When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?
A. WindowsServer2019VMTemplate
B. SERVERX
C. Win2019VM1
D. It will not have a name.
A.
When a new virtual machine is created based on the virtual machine template, it will be given the same name as the virtual machine template within Hyper-V Manager. Catelin should select it, click Rename in the Actions pane, and supply the same name chosen within the virtual machine folder paths, Win2019VM1.
Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets.
True
False
True
Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine named VM1. On VM1, he installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool.
What will this tool most likely to do?
A. Remove the computer name SERVERX
B. Uninstall third-party software
C. Rename the virtual machine VM1
D. Uninstall server roles and features
A.
The System Preparation Tool will remove the computer name SERVERX. This tool is used to remove all unique information from the Windows Server 2019 operating system installed within the virtual machine, including the computer name, unique system identifiers within the Windows Registry, regional settings, license information, Administrator password, and so on.
Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine.
Which of the following reasons justifies Lehana’s choice?
A. The virtual machine will need to emulate a UEFI BIOS to provide faster boot time.
B. The virtual machine will need to emulate a Serial Attached SCSI disk.
C. The generation of the virtual machine can be changed later, so this choice does not matter.
D. The guest operating system on the virtual machine is a 32-bit version of Windows 7.
D.
Generation 1 virtual machines support 32-bit versions of Windows 7 and later. Generation 2 virtual machines support 64-bit versions of Windows 8 and later.
What is the advantage of using production checkpoints over standard checkpoints?
A. Unlike production checkpoints, standard checkpoints use a backup service provided by the guest operating system.
B. Unlike standard checkpoints, production checkpoints are created automatically whenever a virtual machine starts.
C. Production checkpoints cause fewer problems than standard checkpoints when applied.
D. Production checkpoints are applied without shutting down the guest operating system.
C.
Compared with standard checkpoints, production checkpoints cause fewer problems, as they do not save the state of running programs. Hyper-V uses production checkpoints by default.
To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated.
True
False
False
To replicate a virtual machine, the target Hyper-V host must have replication enabled.
Gyaltsen is a system administrator who is managing the operation of virtual machines at her company. One of her key responsibilities is to ensure maximum uptime of virtual machines. She uses replication to ensure this. She is configuring replication for a virtual machine called VM1 on SERVERX to be replicated to SERVERY.
If the replication is successful, which of the following tasks did Gyaltsen most likely complete?
A. She enabled the Kerberos protocol for replication on SERVERY.
B. She enabled replication on SERVERY.
C. She enabled replication on SERVERX.
D. She enabled the Credential Security Support Provider protocol for replication on SERVERX.
B.
To successfully replicate VM1 from SERVERX to SERVERY, Gyaltsen has to enable replication on SERVERY.
Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made.
Which of the following is true of this scenario?
A. The checkpoint file that is used to reverse the changes will be deleted from the system.
B. Devansh can choose to reverse the Windows Registry modifications while retaining other modifications.
C. The modifications within the checkpoint file will be merged into the virtual hard disk.
D. The checkpoint file will replace the current virtual hard disk file.
A.
When Devansh applies the checkpoint to revert the virtual system to its earlier state, the checkpoint file that is used will be deleted.
Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process.
Which of the following Hyper-V features should Orana use?
A. Replication
B. Virtual machine templates
C. Production checkpoints
D. Live migration
B.
Orana can use virtual machine templates to enable rapid server deployment. A virtual machine template contains a server installation that can be copied multiple times to create new virtual machines.
Minato has created multiple virtual machines. He is using the Virtual Switch Manager to configure virtual switches. He wants to create an external virtual switch that will allow Hyper-V to manage network requests from these different machines. The purpose of this is to optimize performance across the network.
Which of the following options should Minato enable?
A. Credential Security Support Provider
B. Hyper-V Extensible Virtual Switch protocol
C. Single-root I/O virtualization
D. N-tier security
C.
Minato should enable single-root I/O virtualization (SR-IOV). SR-IOV optimizes performance by allowing the network interface to work with Hyper-V to separate network requests from different virtual machines.
Rozalia installs the Windows Deployment Services (WDS) role on SERVERX. She intends to use SERVERX to enable rapid server deployment across her organization’s network. She opens the Windows Deployment Services tool and notices a yellow warning icon on the SERVERX server object in the navigation pane.
What does this indicate?
A. The WDS role was not installed successfully.
B. The Transport Server service is not running.
C. The WDS service is not yet configured.
D. The Deployment Server service is not running.
C.
When the Windows Deployment Services tool is opened for the first time, a yellow warning icon can be observed on the server object in the navigation pane. This indicates that the WDS service is yet to be configured.
Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs.
Where will the virtual machine configuration files be stored?
A. E:\VMs
B. E:\VMs\Virtual Machines
C. E:\VMs\Config Files
D. C:\VMs
B.
When Ananya specifies D:\VMs as the location, the configuration files will be stored in the E:\VMs\Virtual Machines subdirectory.
Yihana has configured a WDS server with the appropriate boot and install images. Next, she starts the WDS service to respond to PXE requests from other computers and virtual machines on the network. She wants to enable rapid server deployment using WDS to install Windows Server 2019 on these virtual machines and computers.
If Yihana can successfully install the operating system, which of the following tasks has she completed?
A. Turned off the WDS service on the WDS server
B. Turned off the DHCP service
C. Listed the network interface at the top of the boot order
D. Pressed F1 or Esc keys
C.
The network interface should be listed at the top of the boot order for computers or virtual machines. Yihana most likely made this change.
Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.
True
False
False
Live Migration can only be enabled if the Hyper-V host operating system is joined to an Active Directory domain.
Isabella configures three virtual machines, VM1, VM2, and VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database.
Where should Isabella place the database?
A. On the host server
B. On VM2
C. On VM3
D.On VM1
B.
VM2 is the best choice to place the database because VM2 and the host are connected to an internal virtual switch. Any users trying to access the database in VM2 can only do so through the application running on the host. This type of data security design is called N-tier, as it requires that users pass through a number of systems (N) that implement security measures before gaining access to sensitive data.
Achelle Electronics purchases hardware to set up 25 servers. The IT department must deploy Windows Server 2019 on these machines.
Which of the following Hyper-V features should Achelle Electronics use?
A. Replication
B. Live migration
C. Windows Deployment Services
D. Virtual machine templates
C.
Windows Deployment Services can be used to rapidly deploy Windows Server 2019 to physical servers that are connected to the network. With the use of rapid server deployment, Achelle Electronics can simplify the process of deploying multiple servers.
Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects “Move the virtual machine’s storage.”
Which of the following is true of this scenario?
A. VM1 will be copied to the destination server and renamed as VM2.
B. VM1’s virtual machine configuration files will be moved to the destination server.
C. VM1’s virtual hard disk files will be moved to the destination server.
D. VM1’s virtual hard disk files and virtual machine configuration files will be moved to the destination server.
C.
If Andrei selects “Move the virtual machine’s storage,” only VM1’s virtual hard disk files will be moved to the destination server.
You need multiple boot images on a WDS server, one for each operating system.
True
False
False
You only need one boot image on a WDS server, even if that server has multiple install images for different operating systems. The boot.wim from a Windows Server 2019 installation media can be used to install Windows Server 2019 and earlier server operating systems, as well as Windows 10 and earlier client operating systems.
Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time.
Which of the following statements is true if Miguel creates a virtual machine with default settings?
A. The virtual machine will be named VM1.
B. The virtual machine will have a 127 GB dynamically expanding hard disk.
C. The virtual machine will have 4 GB of memory, which is expandable up to 36 GB.
D. The virtual machine will be a Generation 1 virtual machine.
B.
The virtual machine will have a 127 GB dynamically expanding hard disk.
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.
Why does Dmitry’s computer reboot the second time?
A. To add Hyper-V in a Type 2 configuration
B. To allow Hyper-V to start the host operating system
C. To allow Hyper-V to start the Kerberos protocol
D. To add Hyper-V in a Type 1 configuration
B.
Dmitry’s computer reboots the second time to allow Hyper-V to start the host operating system that is used to manage virtual machines.
Hamza installs the Windows Deployment Services role on SERVERX. He intends to use SERVERX to enable rapid server deployment across his organization’s network. He wants SERVERX to be able to send WIM images to each computer on the network in response to their PXE requests.
Which component of the Windows Deployment Services role provides this feature?
A. Transport Server
B. Single-root I/O virtualization
C. Live migration
D. Deployment Server
A.
The Transport Server is a role service in Windows Deployment Services that responds to PXE requests from the network and uses IP multicast to send the contents of WIM images to each computer.
What is the use of adding tags to servers in the Windows Admin Center?
A. Tags allow you to monitor and manage DHCP server configuration.
B. Tags allow you to upload and download files to and from the filesystems on the server.
C. Tags help configure additional areas of the system via MMC tools.
D. Tags help identify servers and can be searched using the Search dialog box.
D.
Tags help identify servers and can be searched using the Search dialog box. This is useful if you have many servers added to the Windows Admin Center.
The System File Checker is useful in recovering system files that have been corrupted.
True
False
True
Decision constructs such as If and Switch allow you to perform a task multiple times.
True
False
False
Loop constructs allow you to perform a task several times. Decision constructs allow you to modify the flow of your PowerShell script.
Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option.
What should Ivan do?
A. Enable file caching and flushing
B. Enable file caching and disable flushing
C. Disable file caching and enable flushing
D. Disable file caching and flushing
D.
This will enable Ivan to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use.
Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation.
What is the most likely execution policy on Dillon's system?
A. AllSigned
B. Unrestricted
C. Restricted
D. Bypass
D.
The execution policy on Dillon's system is most likely set to Bypass, which is the reason he can execute the downloaded script without any additional prompts.
Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted.
Which of the following commands should Asmara run?
A. sigverif
B. regedit
C. sfc/scannow
D. Get-Command | more
C.
You can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell window by executing the sfc/scannow command to scan and replace damaged files.
A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.
True
False
False
Windows PowerShell can be used to view, install, and remove Windows roles and features. For example, Get-WindowsFeature | ogv will display installed and available roles and features, including the service name for each one.
Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side.
Which of the following features allowed Shae to start using the keyboard straightaway?
A. Gateway Server Mode
B. Devices and Printers utility
C. Plug and Play (PnP)
D. Remote Desktop Protocol (RDP)
C.
The feature that allowed Shae to start using the keyboard straightaway is called Plug and Play (PnP). PnP allows your operating system to work with hardware devices to automatically detect and configure recently installed hardware to work with the operating system.
Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website.
Which of the following PowerShell cmdlets should Caylin run first?
A. Get-NetIPConfiguration
B. Get-NetAdapterStatistics
C. Set-NetFirewallProfile
D. Test-NetConnection
D.
Caylin should use the Test-NetConnection cmdlet. She can run the cmdlet to identify problems with IP configuration, firewall configuration, and name resolution.
Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command:
X | ogv
Complete the command by selecting the missing component identified by X.
A. select -last 1
B. More
C. Get-WindowsFeature
D. Get-HotFix
D.
Get-HotFix | ogv is the command that Thandiwe needs to run to return the list of recently installed updates.
Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply.
What is the most likely explanation for this issue?
A. Computers contain a limited number of IRQ lines.
B. Hard disks are not PnP-friendly devices.
C. The display driver did not go through driver signing when Candice turned it on.
D. Candice did not open the Device Manager when attaching the hard disk.
A.
The video display, each disk drive, USB ports, and the sound card each use a dedicated IRQ to communicate with the processor. The recent addition of a hard disk drive may have left no available IRQ line for the display.
Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager.
Which of the following is a likely reason that he is unable to add SERVERY to the console?
A. SERVERY is joined to the same Active Directory domain as SERVERX.
B. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.
C. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX.
D. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.
D.
If SERVERY is part of a workgroup, it can be added to Server Manager on SERVERX only once the workgroup server is added to the trusted hosts list.
Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX.
If SERVERX has Web server software installed using port 443, which of the following must be true?
A. SERVERX is also a domain controller and has the Active Directory Domain Services role installed.
B. Jenaro should avoid modifying the local computer's trusted host settings.
C. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443.
D. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.
D.
The Web server software on SERVERX is using port 443 for HTTPS access, so Jenaro most likely used another port for HTTPS traffic to the Windows Admin Center. This means that Jenaro must append the port number to the URL to connect to the Windows Admin Center.
Which of the following statements regarding the use of system and user environment variables is accurate?
A. System environment variables are always set first.
B. User environment variables apply to any user logged onto the computer.
C. System environment variables can be applied on a per-user basis.
D. User environment variables are always set first.
A.
System environment variables are always set first, followed by user environment variables, which override any conflicting system environment variables.
Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute.
Which of the following names can Kristoffer use for the variable?
A. *number
B. $count
C. continue
D. $filter
B.
Kristofer can use $count because it follows the naming convention of using the $ symbol and does not violate any restrictions on variable naming conventions.
Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer.
Which Registry root key should Lucida access to change the font size?
A. HKEY_LOCAL_MACHINE
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_USER
D. HKEY_CURRENT_CONFIG
C.
Lucida can change the font size by accessing the HKEY_CURRENT_USER key. This key contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and other profile settings for the current user.
What is the term for programs and system software that can query WMI?
A. WMI consumers
B. WMI infrastructure
C. WMI providers
D. WMI classes
A.
WMI consumers are the programs and system software that can query WMI. WMI infrastructure refers to the components of the operating system that respond to these WMI queries.
Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage.
Which of the following panes should she use to configure this setting?
A. Best Practices Analyzer
B. Events
C. Services
D. Performance
D.
Shweta needs to use the Performance pane to configure this setting. The Performance pane allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts.
Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file.
What is the most likely reason that Calvin's computer failed to create the dump file?
A. The paging file is disabled on the computer.
B. The paging file is not placed on a RAID volume.
C. The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM.
D. The paging file is not located on the same disk as the operating system.
A.
The most likely reason that Calvin's computer did not create a dump file is that the computer did not have a paging file. The paging file is important for computer performance and to create a crash dump file in the event of a crash.
Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.
True
False
True
You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup.
Where will the settings be found?
A. HKEY_CURRENT_CONFIG
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
D.
You will find the relevant settings under the HKEY_CLASSES_ROOT key. This key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER.
Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so.
Which is the following may be a reason for this?
A. SERVERX does not have an existing HTTPS certificate.
B. SERVERX is running a Windows Server 2016 operating system.
C. SERVERX is the domain controller for the Active Directory.
D. SERVERX has Web server software that is using port 443.
C.
The most likely reason is that SERVERX is the domain controller. You cannot install the Windows Admin Center on a Windows Server that has the Active Directory Domain Services (AD DS) role installed and configured as a domain controller for Active Directory.
Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command:
PS C:\Users\Administrator>Get-Command | More
Why does Alina use the pipe symbol (|) in this command?
A. To create an output file called More in which the results of Get-Command are stored
B. To create a customized Windows PowerShell session
C. To control execution in the same way as the –whatif option
D. To send the output from Get-Command to More, which displays the output page-by-page
D.
Alina uses the pipe symbol ( | ) to send the results of the Get-Command cmdlet to the MS-DOS more command within PowerShell. The more command then displays the output page-by-page, because the output is too large to fit on one page. This process is called piping.
Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue.
Which of the following tools did Emmitt most likely use to access the server?
A. Best Practices Analyzer
B. Remote Server Administration Tools
C. Server Manager
D. Windows Admin Center
D.
Emmitt most likely used the Windows Admin Center by connecting to it via a browser to access the Windows Server. Windows Admin Center can be used to remotely manage Windows Server 2019 from any computer that has a modern Web browser.
The Windows 10 Education edition supports Hyper-V but not nested virtualization.
True
False
False
Windows 10 Professional, Enterprise, and Education editions support Hyper-V and nested virtualization.Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.
Hyper-V supports nested virtualization that can be used to create virtual machines within another virtual machine.
True
False
True
Raphael has successfully installed the Essentials Edition of Windows Server 2019 on his computer. He’s completing some post-installation configuration tasks including naming the server. He has four options.
Which of the following names should Raphael pick for the newly installed server and why?
A. COR-WEB-12 because it contains allowed characters and is shorter than 15 characters
B. W@$h!nGT0n, because it contains special characters, numbers, upper case letters, and lower case letters
C. Home-FileServer-Raphael because it contains his name and is at least 15 characters
TEL COMP F3 because it contains a mix of letters, numbers, and spaces
A.
COR-WEB-12 is a good name because it only contains allowed characters and is shorter than 15 characters. The limit on NETBIOS names is 15 characters, so this is a good pick.
Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system.
Why should Eileen consider upgrading to Windows 10?
A. Windows 10 provides Server Core and Nano Server options.
B. Windows 10 automatically encrypts Linux containers.
C. Windows 10 has the Windows Server Azure Network Adapter.
D. Windows 10 has Windows Subsystem for Linux.
D.
The Windows Subsystem for Linux feature of Windows 10, a new feature in Windows Server 2019, allows users to create and test Linux apps on Windows 10 systems.
Don is the system administrator for an organization that conducts virtual IT training sessions. Each participant, during these training sessions, creates multiple unique applications to address various problems. The applications have different hardware resource requirements. Don needs to set up a virtual lab with twenty Windows operating systems on 1 TB storage space for two different training programs.
Help Don choose the right size of the virtual hard disk files.
A. Don should use thick provisioning
B. Don should use thin provisioning.
C. Don should use thin provisioning and fix the size of each virtual disk to 60 GB.
D. Don should use thick provisioning and fix the size of each virtual disk to 100 GB.
B.
Using thin provisioning will help the disk expand space to the appropriate needs of each user.
You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD.
Which of the following steps should you take next?
A. Change the boot order in the BIOS.
B. Download Burnaware or Rufus.
C. Copy the ISO image to a bootable USB drive.
D. Insert the DVD after turning on your computer.
A.
Once you have the installation media, a DVD in this scenario, you should change the boot order in the BIOS to boot from the DVD before other storage devices.
Identify the true statement about Type 2 hypervisors.
A. They can run multiple operating systems on a single host.
B. They can run independent of a host operating system.
C. They can interact with the hardware directly.
D. They self-contain a small operating system.
A.
Type 2 hypervisors can run multiple operating systems, called virtual machines, on an underlying host operating system.
Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company’s data. Linwood estimates the costs and suggests using an Internet-based service instead.
What is Linwood recommending in this scenario?
A. A client
B. A network
C. An on-premise server
D. A cloud-based server
D.
Linwood is recommending the use of a cloud-based server. A cloud-based server needs to be accessed via the Internet.
Janice has set up a Windows Server 2019 lab environment to practice labs related to her training. The base operating system is Windows 10. She has three Windows Server virtual machines running.
If one of the virtual machines is running inside another virtual machine, which of the following must also be true?
A. Janice is using a Type-2 hypervisor to control both virtual machines.
B. Janice has enabled nested virtualization on the Windows 10 operating system.
C. Janice is using the Windows Server 2012 R2 Edition in the virtual machines.
D. Janice has enabled nested virtualization on the Windows Server operating system.
B.
The ability to run one virtual machine inside another virtual machine is called nested virtualization. This feature must be enabled on the underlying operating system, which is Windows 10
Storage pinning is the process of planning hardware for a specific server within an organization.
True
False
False
Planning hardware for a specific server given its use within an organization is often called capacity planning. Storage pinning is an intelligent storage feature that allows you to force specific data to be stored on a particular device.
Satish wants to install Windows Server 2019 Essentials Edition on his computer. The hardware specifications of his system are as follows: 3 GHz 64-bit processor, 16 GB memory, and 50 GB storage.
If Satish installed the server using Rufus, which of the following is most likely true?
A. Satish has installed the server over the Internet from a remote device.
B. Satish installed Server Core instead of the full version.
C. Satish’s computer does not have an optical disk drive.
D. Satish’s computer does not meet the minimum storage requirements.
C.
In the absence of an optical disk drive, it is likely that Satish copied the Windows Server ISO image file to a bootable USB flash drive using Rufus. He then proceeded to install the server using this drive.
Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She’s looking for a way to test the web application across different operating systems on her own computer.
Which of the following features should she use?
A. Virtualization
B. Deduplication
C. Journaling
D. Sandboxing
A.
Virtualization will help Chen use multiple operating systems on her Windows 10 computer. She can use a hypervisor to run an operating system of her choice.
Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs.
Which feature should Candace enable to improve the efficiency of the server?
A. Data deduplication
B. Storage pinning
C. Capacity planning
D. Storage tiering
D.
Storage tiering is an intelligent storage feature that automatically moves frequently used data to faster storage devices such as SSDs. You can use the same feature to move infrequently used data to a slower storage device.
Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns.
In which of the following scenarios should Remtax use Windows Server Core or Nano Server?
A. The server will not be dedicated to a specific function but will serve multiple functions.
B. The server will be dedicated to web services and accessed via the Internet.
C. The server will also function as an Active Directory domain controller.
D. The server will be managed by a novice administrator that fulfills other roles in the company.
B.
Widows Server Core and Nano Server are small footprint installations that are best suited to run web services accessible via the Internet. Nano Server is ideal for use within cloud environments.
Which of the following is true of Storage Server 2019?
A. It can be download for free and used in any environment.
B. It can have a maximum memory of 24 TB.
C. It can host unlimited virtual machines.
D. It cannot be purchased from Microsoft directly.
D.
Windows Storage Server 2019 cannot be purchased directly from Microsoft. Instead, original equipment manufacturers (OEMs) that create storage solutions for organizations can offer Windows Storage Server 2019 on the server-based products they sell.
Tamara wants to install Server Core on a virtual machine on her Windows Server 2019 computer. She tries installing it but fails.
Which of the following is most likely to have caused the installation failure?
A. Tamara’s computer does not contain an optical drive.
B. Tamara’s computer has 30 GB free hard disk space.
C. Server Core requires at least a 1.4 GHz 64-bit processor.
D. Server Core cannot be installed on personal computers.
B.
If Tamara’s computer has less than 32 GB of free space, she will not be able to install Server Core. The minimum requirement for a Server Core installation is 32 GB.
Which of the following statements is true of a client on a computer network?
A. It is a computer that shares resources in response to a request from another computer.
B. It is a server that is located outside an organization’s premises and accessed via the Internet.
C. It is a computer that requests for resources from another computer on the network.
D. It is a server that is located within the physical premises of an organization.
C.
A client is a computer that requests for resources from another computer on a network. The computer that responds to this request is called a server.
Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be.
What would you advise Mahmood?
A. Increase the scalability of the system
B. Run these web applications in containers
C. Avoid sandboxing in a testing environment
D. Use nested virtualization instead
B.
Containers contain a subset of an operating system essential to running the web applications. This means that containers use fewer resources than virtual machines.
Rhonda’s company has a rack containing one email server, file server, web server, firewall server, UPS, SAN, and management station. Owing to a thunderstorm, a ten-block radius surrounding the company faces a power outage. Rhonda, who is working from home, tries sending an email to a colleague, but the email does not get sent.
Which of the following is the most likely cause for this issue?
A. The blackout took down the Internet, so Rhonda can’t reach the email server.
B. The SAN on the rack malfunctioned.
C. The management station on the rack malfunctioned.
D. The blackout caused all the servers on the rack to shut down because there is no power supply.
A.
The most likely cause is that the blackout took down the Internet. In the absence of the Internet, Rhonda would not be able to connect to the email server located on her company’s premises.
Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser.
Which of these entities is the server?
A. The responding computer
B. The Edge browser
C. The website address
D. Malaika’s computer
A.
The computer that responds to the request from Malaika’s computer is the server.
Walter Wells, Inc., a company that builds robotic process automation (RPA) applications, uses Windows Server 2016 to run several Linux and Windows virtual machines.
Which of the following statements, if true, would make upgrading to Windows Server 2019 a good choice?
A. Walter Wells is considering removing all the Linux virtual machines and switching entirely to Windows.
B. Walter Wells does not use storage replicas or storage spaces.
C. Walter Wells spends a considerable amount of money on encrypting Linux virtual machines.
D. Walter Wells currently outsources its hardware maintenance operations to an external vendor.
C.
If Walter Wells spends money on encrypting Linux virtual machines, switching to Windows Server 2019 is a good choice. Windows Server 2019, unlike previous versions, provides encryption for Linux machines out of the box.
Nadira is testing an application that needs to work on multiple operating systems. For this purpose, she uses Hyper-V to set up a Windows Server 2019 virtual machine (named VM1) and a Linux-based virtual machine (named VM2) on her host Windows 10 operating system. She sets up a third virtual machine, Windows Server 2012 (named VM3), to test the compatibility of the application between Windows Server 2019 and 2012 versions.
Which of the following must be true if VM3 was set up successfully using nested virtualization?
A. Nadira removed VM2 to accommodate VM3.
B. Nadira enabled nested virtualization in Windows 10 using a PowerShell command.
C. Nadira ran the following PowerShell command: Get-VMNetworkAdapter -VMName VM3 | Set-VMNetworkAdapter -MacAddressSpoofing On.
D. Nadira powered off VM1, ran a PowerShell command, and powered on VM1.
D.
If VM3 was set up successfully, Nadira most likely would have set it up within VM1. To do this, she would first have to power off VM1 and run a PowerShell command to enable nested virtualization.
What is the IP address that is assigned to the network loopback interface?
A. 0.0.0.0
B. 255.255.255.255
C. 10.0.0.0
D. 127.0.0.1
D.
127.0.0.1 is the loopback address and is used to refer to the local system or localhost. It derives its name from its functionality.