Looks like no one added any tags here yet for you.
What is the use of adding tags to servers in the Windows Admin Center?
A. Tags allow you to monitor and manage DHCP server configuration.
B. Tags allow you to upload and download files to and from the filesystems on the server.
C. Tags help configure additional areas of the system via MMC tools.
D. Tags help identify servers and can be searched using the Search dialog box.
D.
Tags help identify servers and can be searched using the Search dialog box. This is useful if you have many servers added to the Windows Admin Center.
The System File Checker is useful in recovering system files that have been corrupted.
True
False
True
Decision constructs such as If and Switch allow you to perform a task multiple times.
True
False
False
Loop constructs allow you to perform a task several times. Decision constructs allow you to modify the flow of your PowerShell script.
Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug his hardware devices without using the Safely Remove Hardware option.
What should Ivan do?
A. Enable file caching and flushing
B. Enable file caching and disable flushing
C. Disable file caching and enable flushing
D. Disable file caching and flushing
D.
This will enable Ivan to easily hot swap a disk drive or controller without using the Safety Remove Hardware notification area icon, which warns that a device is in use.
Dillon wants to create a PowerShell script that automatically opens a bunch of websites whenever his system boots. He downloads a script from an Internet forum for PowerShell scripts and runs it. The script executes without warnings or asking for any additional confirmation.
What is the most likely execution policy on Dillon's system?
A. AllSigned
B. Unrestricted
C. Restricted
D. Bypass
D.
The execution policy on Dillon's system is most likely set to Bypass, which is the reason he can execute the downloaded script without any additional prompts.
Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted.
Which of the following commands should Asmara run?
A. sigverif
B. regedit
C. sfc/scannow
D. Get-Command | more
C.
You can run the System File Checker manually from a Command Prompt window (MS-DOS shell) or Windows PowerShell window by executing the sfc/scannow command to scan and replace damaged files.
A limitation of Windows PowerShell is that it cannot be used to install or remove Windows roles.
True
False
False
Windows PowerShell can be used to view, install, and remove Windows roles and features. For example, Get-WindowsFeature | ogv will display installed and available roles and features, including the service name for each one.
Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side.
Which of the following features allowed Shae to start using the keyboard straightaway?
A. Gateway Server Mode
B. Devices and Printers utility
C. Plug and Play (PnP)
D. Remote Desktop Protocol (RDP)
C.
The feature that allowed Shae to start using the keyboard straightaway is called Plug and Play (PnP). PnP allows your operating system to work with hardware devices to automatically detect and configure recently installed hardware to work with the operating system.
Caylin, an IT administrator, receives an email from a coworker that the company website, eloxnet.com, is not accessible. She decides to check if there is an issue that is preventing access to the website.
Which of the following PowerShell cmdlets should Caylin run first?
A. Get-NetIPConfiguration
B. Get-NetAdapterStatistics
C. Set-NetFirewallProfile
D. Test-NetConnection
D.
Caylin should use the Test-NetConnection cmdlet. She can run the cmdlet to identify problems with IP configuration, firewall configuration, and name resolution.
Thandiwe is using a server running the Windows Server 2019 operating system. She notices some of the server's services are not functioning as intended. She suspects that a recent update may have caused this issue. While troubleshooting, she intends to look up the list of recently installed updates. She runs the following command:
X | ogv
Complete the command by selecting the missing component identified by X.
A. select -last 1
B. More
C. Get-WindowsFeature
D. Get-HotFix
D.
Get-HotFix | ogv is the command that Thandiwe needs to run to return the list of recently installed updates.
Candice, a graphic designer, attaches a new portable hard disk to her computer. She can connect to the hard disk immediately without installing any drivers. After some time, she turns on the second monitor attached to her computer. The display malfunctions despite being connected to the computer and receiving adequate power supply.
What is the most likely explanation for this issue?
A. Computers contain a limited number of IRQ lines.
B. Hard disks are not PnP-friendly devices.
C. The display driver did not go through driver signing when Candice turned it on.
D. Candice did not open the Device Manager when attaching the hard disk.
A.
The video display, each disk drive, USB ports, and the sound card each use a dedicated IRQ to communicate with the processor. The recent addition of a hard disk drive may have left no available IRQ line for the display.
Haruko is a system administrator at Notion Source, a company that specializes in digital marketing. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager.
Which of the following is a likely reason that he is unable to add SERVERY to the console?
A. SERVERY is joined to the same Active Directory domain as SERVERX.
B. SERVERX has the Welcome to Server Manager pane hidden from the Dashboard.
C. SERVERY has Windows Server 2016 installed, so it is not compatible with SERVERX.
D. SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.
D.
If SERVERY is part of a workgroup, it can be added to Server Manager on SERVERX only once the workgroup server is added to the trusted hosts list.
Jenaro installed the Windows Admin Center on a Windows Server 2019 system called SERVERX. He intends to manage other servers using SERVERX.
If SERVERX has Web server software installed using port 443, which of the following must be true?
A. SERVERX is also a domain controller and has the Active Directory Domain Services role installed.
B. Jenaro should avoid modifying the local computer's trusted host settings.
C. SERVERX does not have an existing HTTPS certificate, so the Windows Admin Center can use port 443.
D. Jenaro can connect to the Windows Admin Center only by appending the port number to the URL.
D.
The Web server software on SERVERX is using port 443 for HTTPS access, so Jenaro most likely used another port for HTTPS traffic to the Windows Admin Center. This means that Jenaro must append the port number to the URL to connect to the Windows Admin Center.
Which of the following statements regarding the use of system and user environment variables is accurate?
A. System environment variables are always set first.
B. User environment variables apply to any user logged onto the computer.
C. System environment variables can be applied on a per-user basis.
D. User environment variables are always set first.
A.
System environment variables are always set first, followed by user environment variables, which override any conflicting system environment variables.
Kristoffer creates a PowerShell script to automatically execute a set of tasks on system startup. He uses variables in his script to accomplish certain tasks. He is using a variable to filter out certain conditions during which the script should not execute.
Which of the following names can Kristoffer use for the variable?
A. *number
B. $count
C. continue
D. $filter
B.
Kristofer can use $count because it follows the naming convention of using the $ symbol and does not violate any restrictions on variable naming conventions.
Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer.
Which Registry root key should Lucida access to change the font size?
A. HKEY_LOCAL_MACHINE
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_USER
D. HKEY_CURRENT_CONFIG
C.
Lucida can change the font size by accessing the HKEY_CURRENT_USER key. This key contains data on color combinations, font sizes and type, the keyboard layout, the taskbar, clock configuration, and other profile settings for the current user.
What is the term for programs and system software that can query WMI?
A. WMI consumers
B. WMI infrastructure
C. WMI providers
D. WMI classes
A.
WMI consumers are the programs and system software that can query WMI. WMI infrastructure refers to the components of the operating system that respond to these WMI queries.
Shweta, a system administrator at Status Wire, is configuring Windows Server 2019 using Server Manager. She wants the Dashboard to display an alert whenever the server exceeds certain CPU usage.
Which of the following panes should she use to configure this setting?
A. Best Practices Analyzer
B. Events
C. Services
D. Performance
D.
Shweta needs to use the Performance pane to configure this setting. The Performance pane allows you to see the performance of the associated servers as well as configure processor (CPU) usage and memory alerts.
Calvin has installed Windows Server 2019 on his personal computer to take part in training program. During one of his lab exercises, his computer crashes. Upon investigation, he finds that the server has not created a crash dump file.
What is the most likely reason that Calvin's computer failed to create the dump file?
A. The paging file is disabled on the computer.
B. The paging file is not placed on a RAID volume.
C. The initial paging file size is configured to a size that is 1.5 times the installed amount of RAM.
D. The paging file is not located on the same disk as the operating system.
A.
The most likely reason that Calvin's computer did not create a dump file is that the computer did not have a paging file. The paging file is important for computer performance and to create a crash dump file in the event of a crash.
Cmdlets are case-insensitive, so Get-Host and get-host are equivalent.
True
False
True
You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need to restore the settings from a Registry backup.
Where will the settings be found?
A. HKEY_CURRENT_CONFIG
B. HKEY_CURRENT_USER
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
D.
You will find the relevant settings under the HKEY_CLASSES_ROOT key. This key holds data to associate file extensions with programs. This is a more extensive list than the one viewed under HKEY_CURRENT_USER.
Ryan, a server administrator, is attempting to install the Windows Admin Center on a server called SERVERX. However, he is unable to do so.
Which is the following may be a reason for this?
A. SERVERX does not have an existing HTTPS certificate.
B. SERVERX is running a Windows Server 2016 operating system.
C. SERVERX is the domain controller for the Active Directory.
D. SERVERX has Web server software that is using port 443.
C.
The most likely reason is that SERVERX is the domain controller. You cannot install the Windows Admin Center on a Windows Server that has the Active Directory Domain Services (AD DS) role installed and configured as a domain controller for Active Directory.
Alina is using Windows PowerShell on a Windows Server 2019 system for the first time. She wants a list of all cmdlets in PowerShell, so she types the following command:
PS C:\Users\Administrator>Get-Command | More
Why does Alina use the pipe symbol (|) in this command?
A. To create an output file called More in which the results of Get-Command are stored
B. To create a customized Windows PowerShell session
C. To control execution in the same way as the –whatif option
D. To send the output from Get-Command to More, which displays the output page-by-page
D.
Alina uses the pipe symbol ( | ) to send the results of the Get-Command cmdlet to the MS-DOS more command within PowerShell. The more command then displays the output page-by-page, because the output is too large to fit on one page. This process is called piping.
Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Emmitt accesses the server remotely and resolves the issue.
Which of the following tools did Emmitt most likely use to access the server?
A. Best Practices Analyzer
B. Remote Server Administration Tools
C. Server Manager
D. Windows Admin Center
D.
Emmitt most likely used the Windows Admin Center by connecting to it via a browser to access the Windows Server. Windows Admin Center can be used to remotely manage Windows Server 2019 from any computer that has a modern Web browser.