Windows Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/119

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

120 Terms

1
New cards

On which part of the maintenance cycle do server administrators spend the most time?

Monitoring

2
New cards

Many organizations store system documentation in help desk ticketing software.

True

3
New cards

Which of the following steps is not a common troubleshooting procedure?

Delegate responsibility

4
New cards

A baseline is a set of performance information for a system during normal times of operation.

True

5
New cards

Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.)

Rogue processes & Memory Leaks

6
New cards

Committed memory refers to the memory that is used by the Windows kernel and device drivers.

False

7
New cards

Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization?

Right-click the process and click Create dump file

8
New cards

Resource Monitor allows you to identify the storage devices and files that a single process is accessing.

True

9
New cards

Which of the following components represents a specific hardware device or software component that can be monitored?

Instance

10
New cards

Which of the following performance counters can be used to identify jabbering hardware?

% Interrupt Time

11
New cards

Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters.

True

12
New cards

Which two tools are commonly used to create performance baselines? (Choose two answers.)

Performance Monitor & Data Collector Sets

13
New cards

Performance baselines are typically created only after installing a new Windows Server 2019 system.

False

14
New cards

Which of the following can be included in a data collector set? (Choose all that apply.)

Performance counter, Event trace provider, & Windows Registry key

15
New cards

There are five event levels available in an event log: Information, Warning, Error, Audit Success, and Audit Failure.

False

16
New cards

What can you create in Event Viewer to display specific types of events from one or more event logs?

Custom view

17
New cards

Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters.

False

18
New cards

Which of the following actions can be performed to solve a performance problem? (Choose all that apply.)

All of the Above: Stop and disable unnecessary services, Move applications to other systems, Add additional hardware, & Upgrade hardware devices with bus mastering versions

19
New cards

Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem.

True

20
New cards

Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver?

Last Known Good Configuration (advanced)

21
New cards

Group Policy settings apply to which of the following objects? (Choose all that apply.)

Users & Computers

22
New cards

There are no GPOs created in an Active Directory domain by default.

False

23
New cards

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.)

OU, Site, & Domain

24
New cards

Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default.

True

25
New cards

You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?

Publish the software in the User Configuration

26
New cards

Which section of a GPO contains the most security-related settings for the Windows operating system?

Computer Configuration, Windows Settings

27
New cards

You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings.

True

28
New cards

Which of the following is not included in a certificate?

Private key

29
New cards

Which term refers to the process whereby a user or computer obtains a certificate from a CA?

Enrollment

30
New cards

Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA.

True

31
New cards

Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.)

Read, Enroll, & Autoenroll

32
New cards

Only schema version 1 certificate templates can be configured for auto-enrollment.

False

33
New cards

In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?

RADIUS server

34
New cards

You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless.

False

35
New cards

Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)

All of the Above: WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection, Group Policy is used to direct domain computers to a WSUS server for updates, Updates can be manually or automatically approved for distribution on a WSUS server & A WSUS server can be configured to remove updates from computers that have installed them.

36
New cards

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization.

True

37
New cards

Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?

8531

38
New cards

Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain).

True

39
New cards

Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?

Controlled folder access

40
New cards

What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?

Connection security rules

41
New cards

Which of the following cloud delivery models uses containers exclusively to run Web apps?

PaaS

42
New cards

Websites on a Web server provide the front end for most Web apps.

True

43
New cards

In a continuous deployment scenario, which software creates a container or virtual machine on a cloud server to test the functionality of a new Web app version?

Build Automation

44
New cards

Block storage is a cheaper alternative to object storage on public cloud providers.

False

45
New cards

To which of the following groups should you assign NTFS/ReFS permissions for Web app content in order to provide anonymous user access?

IIS_IUSRS

46
New cards

What must you configure in IIS Manager to allow users to access a help desk ticketing system Web app using the URL https://www.sample.com/helpdesk? (Choose all that apply.)

A helpdesk virtual directory & An HTTPS protocol binding

47
New cards

Which of the following IIS configuration features is used to specify the default webpage or Web app file that a client views?

Default Document

48
New cards

The docker command is also called the Docker daemon.

False

49
New cards

Which docker command displays container images available on Docker Hub?

docker search

50
New cards

Nano Server containers must be run as a Hyper-V container on Windows Server 2019.

True

51
New cards

Which command can you execute to create a container from the microsoft/iis container image that runs in the background and automatically maps port 80 in the container to a port above 32767 on the underlying operating system?

docker run -d -P microsoft/iis

52
New cards

After a container is running, you cannot configure its contents until the container is stopped.

False

53
New cards

Which of the following commands can be used to display containers that are no longer running?

docker ps -a

54
New cards

The Windows Subsystem for Linux (WSL) allows you to execute Web apps in a virtual machine on Windows Server 2019.

False

55
New cards

Which of the following Linux distributions are supported for use with WSL? (Choose all that apply.)

Fedora, Ubuntu, OpenSUSE Leap & Debian GNU/Linux

56
New cards

The Linux Containers on the Windows (LCOW) feature of Windows Server 2019 allows you to run Linux containers only if Docker EE was obtained using the DockerMsftProvider Windows PowerShell module.

False

57
New cards

Which of the following commands can be used to start the Apache Web server in a Linux container or WSL Linux distribution on a Windows Server 2019 system?

apachectl start

58
New cards

Each Linux container run on Windows Server 2019 using LCOW is automatically run as a Hyper-V container that executes on a Linux kernel provided by the LinuxKit component of Docker EE.

True

59
New cards

You are tasked with deploying a private cloud in your organization that needs to host both Windows and Linux Web apps using a SaaS delivery model on a single Windows Server 2019 system. What technology should you configure on the Windows Server 2019 system?

WSL

60
New cards

Your organization develops a containerized Linux Web app that is run on a public cloud provider. To minimize cloud costs, a continuous deployment process is not used. Instead, Web app developers must add new versions of their Linux Web app to a container and test its functionality locally before running it on the public cloud provider. What could you configure on an existing Windows Server 2019 system to allow the Web app developers in your organization to test new versions of their containerized Linux Web app? (Choose all that apply.)

Hyper-V, Docker EE & LCOW

61
New cards

Which of the following is not considered a remote access technology?

PPPoE

62
New cards

Split tunneling is used to ensure that all network traffic generated by a remote access client passes through a VPN to a remote access server.

False

63
New cards

Which of the following VPN protocols uses IPSec to encrypt network traffic? (Choose all that apply.)

IKEv2 & L2TP

64
New cards

What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet?

Demand-dial interface

65
New cards

The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS.

False

66
New cards

You have configured a remote access server in your DMZ for IKEv2 VPN access. Which ports on your NAT router must you configure for port forwarding to this remote access server? (Choose all that apply.)

TCP port 1701, UDP port 500, & UDP port 4500

67
New cards

Which of the following VPN authentication methods is considered the most secure?

EAP

68
New cards

Remote access servers can be configured as RADIUS clients.

True

69
New cards

What features does RADIUS provide for remote access connections?

Centralized logging, Remote access policies, & Centralized authentication

70
New cards

The user permission necessary for VPN remote access can be granted in the properties of a user account or remote access policy.

True

71
New cards

What section of a remote access policy contains characteristics that must be met for remote access, such as Session Timeout?

Constraints

72
New cards

DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server.

True

73
New cards

Which of the following network topologies should you choose if your DirectAccess remote access server is connected directly to the demarc, as well as to the DMZ?

Edge

74
New cards

DirectAccess supports Windows 7 and later remote access clients by default.

False

75
New cards

Which of the following Remote Desktop Services role services uses HTTPS to provide encryption for all RDP packets?

Remote Desktop Gateway

76
New cards

The Remote Desktop Licensing role service cannot be installed on the same computer as the Remote Desktop Session Host service.

False

77
New cards

Which of the following must you configure to ensure that a particular group of remote access servers grants Remote Desktop access only to members of the Accounting group?

Collection

78
New cards

At minimum, which Remote Desktop Services role services must you install to provide session-based desktop deployment across multiple remote access servers? (Choose all that apply.)

Remote Desktop Session Host, Remote Desktop Connection Broker, & Remote Desktop Licensing

79
New cards

As a server administrator, which of the following actions can you perform on a Remote Desktop connection to provide interactive user support for the user of the session?

Shadow

80
New cards

Organizations that allow Remote Desktop sessions from remote access clients that are not licensed by the organization should choose a Per Device licensing mode when configuring Remote Desktop Services.

False

81
New cards

Which of the following represents the maximum amount of time that a DNS server or resolver is allowed to cache the result of a forward lookup?

TTL

82
New cards

Windows computers contact their DNS server at boot time to create or update their host resource records. This feature is called zone transfer.

False

83
New cards

Which of the following are authoritative DNS server types? (Choose all that apply.)

Primary, Active Directory-integrated primary, & Secondary

84
New cards

If a DNS server does not contain a zone file that contains the resource records for a lookup, and is not configured as a conditional or default forwarder, it will use its root hints file to perform a recursive query.

True

85
New cards

Which resource record stores zone transfer settings?

SOA

86
New cards

You wish to provide access to Web resources in another organization. However, the associated A records for these resources are stored in a zone file on a DNS server in the other organization that is not publicly registered. What can you configure on your organization's DNS server to allow access to these resources? (Choose all that apply.)

A stub zone that forwards requests to the other organization's DNS server, A conditional forwarder that forwards requests to the other organization's DNS server, & A secondary zone that copies resource records from the zone on the other organization's DNS server.

87
New cards

Scavenging can be configured to remove stale resource records that were added to a zone using dynamic update.

True

88
New cards

A user complains that they are unable to contact a specific server in your organization. You remember that you recently modified the A record for this server on your organization's Active Directory-integrated DNS server. Which troubleshooting step should you try first to remedy the issue?

Clear the DNS cache on the user's computer

89
New cards

Which two resource records can you create in a zone to provide the FQDN of an email server for the zone, as well as associate this FQDN with an IPv6 address? (Choose two answers.)

MX & AAAA

90
New cards

Which of the following are valid reasons to deploy a WINS server? (Choose all that apply.)

To reduce NetBIOS name broadcasts on LANs in an organization & To allow computers in one LAN to resolve NetBIOS names in another LAN

91
New cards

NetBIOS name records are automatically created on a WINS server by computers that are configured to use the WINS server.

True

92
New cards

Your organization has two WINS servers to provide for NetBIOS name resolution. What can you do to ensure that each WINS server shares its NetBIOS name records with the other server?

Configure the two servers as replication partners

93
New cards

DHCP servers respond to DHCPDISCOVER packets received from DHCP clients or DHCP relay agents with a DHCPACK packet.

False

94
New cards

Which of the following are optional components of a DHCP scope?

IP address exclusions, DHCP options, DHCP policy, & Reservation.

95
New cards

The default lease time of 8 days for a DHCP scope is appropriate for networks that primarily contain mobile devices, but should be reduce for networks that primarily contain desktop PCs.

False

96
New cards

DHCP reservations must use the DHCP options from their scope.

False

97
New cards

Which DHCP option number provides a default gateway router?

003

98
New cards

DHCP servers can be configured to dynamically update host and PTR records for legacy DHCP clients and DHCP clients that do not use a Microsoft operating system.

True

99
New cards

Which two of the following tasks can you perform to provide fault tolerance for two DHCP servers in the DMZ? (Choose two answers.)

Ensure that DHCP relay agents in the organization are configured with the IP address of both DHCP servers & Configure DHCP failover in either load balance or hot standby mode for all scopes.

100
New cards

To prevent a DHCP server from leasing an IPv4 address that has been manually configured on a computer on the network, you can configure a DHCP server to send one or more ping requests to an IPv4 address before leasing it.

True