front 1 Chapter 7 Study Guide | back 1 no data |
front 2 1. When using the MBR method of partitioning, where is the MBR
located? | back 2 a. In the first sector and track of the hard disk. |
front 3 2. When using the GPT method of partitioning disks, where is the
partition information stored? | back 3 c. In each partition using main and backup tables. |
front 4 3. How many partitions can exist on a GPT disk in Windows Server
2016? | back 4 d. 128 |
front 5 4. Regarding the partition scheme on a disk using MBR, what statement
is true? | back 5 b. A primary partition must be marked as active in order for the system to boot. |
front 6 5. When using dynamic disks, what is the volume that contains the
\Windows folder called? | back 6 c. The boot volume |
front 7 6. What statement regarding spanned volumes is NOT accurate? | back 7 b. A spanned volume cannot be expanded once created. |
front 8 7. When using a Windows Server 2016 striped volume, what is the size
of the blocks that are striped across the members of the volume? | back 8 d. 64KB |
front 9 8. In order to convert a basic disk to a dynamic disk, how much free
space must be available on the disk? | back 9 b. 1MB |
front 10 9. What command can be run to perform a check of the C: drive and fix
any errors found with the file system? | back 10 c. chkdsk /f C:\ |
front 11 10. What chkdisk flag allows chkdsk to go directly to a corrupted
spot identified by the Spot Verifier service? | back 11 b. /spotfix |
front 12 11. What RAID level offers no redundancy features and is targeted
towards performance? | back 12 a. RAID-0 |
front 13 12. Disk duplexing is the same as what type of disk redundancy? | back 13 c. Disk mirroring |
front 14 13. What is NOT a RAID level supported by Windows Server 2016? | back 14 c. RAID-2 |
front 15 14. What statement regarding the implementation of RAID on Windows
Server 2016 is NOT accurate? | back 15 a. Boot and system files can be placed on RAID level 5, but not on RAID level 1. |
front 16 15. You are configuring a RAID-5 array with five disks, each disk is
3TB in size. What will be the total usable size of the RAID-5
volume? | back 16 c. 12 TB |
front 17 16. What is NOT one of the advantages of using a hardware RAID over a
software RAID? | back 17 d. Increased fault tolerance |
front 18 17. What communications protocol and interface has been created for
solid state drives to enable much faster data access and to reduce
data latency? | back 18 b. Non-volatile Memory Express (NVMe) |
front 19 18. In the Windows Backup window, what type of backup item option
creates a binary image of the operating system and all files that can
be used for a full restore? | back 19 d. Bare metal recovery |
front 20 19. In the Windows Backup window, what information is covered by a
backup including "system state" data? | back 20 a. Operating system and boot files, and extra components such as roles and features installed. |
front 21 20. What statement regarding the Windows Server Backup tool is NOT
accurate? | back 21 c. The Windows Server Backup tool can't perform a backup to an external drive. |
front 22 21. When using Windows Server 2016 Device Specific Module (DSM), what
configuration model allows you to cycle through functional paths in
order? | back 22 d. Round Robin |
front 23 22. When using GPT disk partitions, the size is limited only by the
operating system, rather than any physical limit. | back 23 a. True |
front 24 23. When using Windows Server 2016, you are limited to a maximum of
26 mounted drives. | back 24 b. False |
front 25 24. Converting from a basic disk to a dynamic disk wipes all data
from the disk's volumes. | back 25 b. False |
front 26 25. Using a RAID array, regardless of the level, ensures that you no
longer have to do backups. | back 26 b. False |
front 27 Chapter 10 Study Guide | back 27 no data |
front 28 1. What statement regarding the use of Group Policies is
accurate? | back 28 b. Group policy cannot be set for non-OU folder containers. |
front 29 2. What password security option ensures that a user must choose new
passwords when a password change is required? | back 29 d. Enforce password history |
front 30 3. What version of Kerberos is utilized by Windows Server 2016? | back 30 c. Kerberos v5 |
front 31 4. What type of an attack is the account lockout feature specifically
designed to prevent? | back 31 b. Brute force attack |
front 32 5. How long is a permanent ticket, or service ticket, good
for? | back 32 c. The ticket is good for the duration of the logon session. |
front 33 6. What encryption standard is utilized with Kerberos on Windows
Server 2016 and Windows 10? | back 33 c. AES |
front 34 7. What authentication standard is utilized for Windows Server 2016
if Active Directory is not installed? | back 34 c. Windows NT LAN Manager version 2 |
front 35 8. What Kerberos account policy can be configured to encourage users
to sign out after a certain amount of time? | back 35 b. Maximum lifetime for user ticket |
front 36 9. What security feature created by Microsoft enables the ability to
define security rights for documents, spreadsheets, e-mail, and other
types of files created by applications, going beyond what is possible
with ACLs and the Windows Firewall? | back 36 c. Rights Management Services |
front 37 10. What command provides the account using it with a new encryption
key, meaning that previous keys associated with other accounts are no
longer valid? | back 37 b. cipher /k |
front 38 11. You are utilizing BitLocker Drive Encryption, and are attempting
to update Windows Server 2016. What must be done so that the update
will be successful? | back 38 d. You must disable BitLocker Drive Encryption and then re-enable it after the update. |
front 39 12. What happens when a Group Policy setting is defined in User
Configuration and in Computer configuration? | back 39 c. The Computer configuration items take precedence over the User configuration items. |
front 40 13. What does the "Enforce user logon restrictions" option
do when configuring Kerberos? | back 40 a. It turns on Kerberos security. |
front 41 14. When using Rights Management Services security, documents are
encrypted using an AES key and what other additional key? | back 41 b. RSA |
front 42 15. If a computer is not equipped with a TPM chip, how can a computer
make use of BitLocker Drive Encryption? | back 42 d. The computer will require a USB flash drive that contains a personal identification number used to start the computer and secure the drive. |
front 43 16. When configuring Windows Firewall exceptions, what is NOT one of
the items that can be added as an exception? | back 43 d. Users |
front 44 17. What Group Policy option can be used to force off users who have
not logged off after hours, using logon hour controls? | back 44 b. Network security: Force logoff when logon hours expire |
front 45 18. What UAC mode allows for a program to prompt for permissions and
extensive access when required, while otherwise keeping administrator
accounts in a standard user mode? | back 45 c. Administrator Approval Mode |
front 46 19. What OU can be assigned Group Policy settings in Active
Directory? | back 46 b. Computers |
front 47 20. When considering GPO precedence between local GPO, default domain
GPO, domain controller GPO, site GPO and OU GPOs, what GPOs are
applied first? | back 47 b. default domain GPOs |
front 48 21. Why should event auditing policies be used sparingly? | back 48 b. Event auditing can fill the Security event log and consume considerable resources. |
front 49 22. What would be the reason to utilize the Windows NT LAN Manager
version 2 (NTLMv2) over Kerberos? | back 49 c. NTLMv2 provides compatibility with all versions of Windows, including legacy systems. |
front 50 23. What is the smallest Active Directory container or object with
which a GPO can be linked? | back 50 a. An organizational unit |
front 51 24. What flag used in conjunction with cipher will invoke the
recovery agent key so that a server administrator can set up a
recovery policy? | back 51 b. cipher /r |
front 52 25. BitLocker Drive Encryption prevents an attacker from bypassing
access control list file and folder protections on a stolen hard
drive. | back 52 a. True |
front 53 26. Group Policies can be used to prevent a user from being able to
access the Control Panel or specific Control Panel options. | back 53 a. True |
front 54 27. A computer that is not equipped with a TPM chip cannot use the
BitLocker Drive Encryption feature. | back 54 b. False |
front 55 28. The sc query windefend command can be used to determine the
status of Windows Defender. | back 55 a. True |
front 56 Chapter 11 Study Guide | back 56 no data |
front 57 1. What is NOT one of the four main categories that are monitored by
Resource Monitor? | back 57 b. Firewall |
front 58 2. You are troubleshooting a server and have found that that the
processor usage is frequently over 85%, even when under normal loads.
What should be done to rectify the problem? | back 58 b. The processor should be upgraded. |
front 59 3. What critical service supports shared objects, logon services,
print services, and remote procedure calls? | back 59 d. Server |
front 60 4. When creating a dump file from an application or process, where is
the dump file placed? | back 60 c. \Users\ADMINISTRATOR\AppData\Local\Temp\dumpfolder#\programprocessname.DMP |
front 61 5. What is the role of the svchost.exe process on a running
system? | back 61 b. It is a vital process for running .dll files that provide a foundation for Windows operating systems. |
front 62 6. How is the priority at which a process runs normally set? | back 62 b. The process priority is normally set in the program code of the application. If not specified, it is run at normal priority. |
front 63 7. What term is used to describe the number of bytes of memory a
process has designated for use and that are promised to a designated
portion of the page file? | back 63 a. Committed memory |
front 64 8. What does the % Privileged Time counter represent? | back 64 c. It is the amount of time spent by the CPU for system activities in privileged mode. |
front 65 9. What processor oriented counter should be used to determine the
percentage of time for threads to process? | back 65 b. % Processor Time |
front 66 10. What physical disk oriented performance counter should be used to
determine the number of requests waiting to be processed by a
disk? | back 66 d. Current Disk Queue Length |
front 67 11. What is needed for an SNMP management system to be able to poll
and receive data from an SNMP agent? | back 67 c. A community name |
front 68 12. What is NOT one of the available priorities that can be assigned
to a process? | back 68 c. Critical |
front 69 13. What does the Processor Queue Length counter measure? | back 69 b. It measures the number of execution threads waiting for access to a CPU. |
front 70 14. On Windows, what enables SNMP applications to access SNMP
data? | back 70 a. The Windows Management Instrumentation Software Development Kit |
front 71 15. What process represents the Windows kernel and system process on
a running Windows 2016 Server installation? | back 71 a. System |
front 72 16. When viewing memory information within Task Manager, what section
represents the memory that holds the operating system kernel and
device drivers that cannot be paged out? | back 72 b. Non-paged pool |
front 73 17. When does a page fault occur on a running system? | back 73 a. A page fault occurs whenever memory pages are called by a program or process from the paging file on disk. |
front 74 18. After configuring SNMP traps for a system, you discover that
traps are not being sent out. What is most likely the issue? | back 74 d. The SNMP Trap service has not been started. |
front 75 19. The templates used by the Data Collector Sets tool are stored
using what data format on the local computer? | back 75 a. XML |
front 76 20. What does a trace report in the Data Collector Sets tool
contain? | back 76 d. It contains only instances when traced events occur. |
front 77 21. What Windows Server 2016 service is used to keep information
about the networks the server connects to and communicates network
information to applications on the server? | back 77 a. Network List Service |
front 78 22. What Windows Server 2016 service is used to keep a listing of
computers and domain resources to be accessed? | back 78 c. Computer Browser |
front 79 23. The best way to get a feel for a server's performance is to
establish a baseline and then frequently monitor server performance,
comparing the data collected with that in the baseline. | back 79 a. True |
front 80 24. The Realtime priority is the standard priority assigned to a
running process. | back 80 b. False |
front 81 25. Windows Server 2016 is the first Windows server operating system
to include a full-fledged SNMP network management system
application. | back 81 b. False |
front 82 26. The WinDBG Microsoft utility can be used to process dump files
created by processes. | back 82 a. True |