Ie160 Final

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ryanbecker24
R
Ryanbecker24
Community Contributor
Quizzes Created: 6 | Total Attempts: 5,619
Questions: 50 | Attempts: 1,548

SettingsSettingsSettings
Networking Quizzes & Trivia

.


Questions and Answers
  • 1. 

    You are the network administrator for a company that has decided to sttart using Windows Containers. You want to create a new container. What command allows you to create a container?

    • A.

      Docker new

    • B.

      Docker build container

    • C.

      Docker create

    • D.

      Docker build

    Correct Answer
    C. Docker create
    Explanation
    The correct answer is "docker create". This command allows the network administrator to create a new container in Windows Containers.

    Rate this question:

  • 2. 

    If you have a running cluster and need to run the Validate a Configuration Wizard again, which of the following tests may require cluster resources to be taken offline?

    • A.

      System configuration tests

    • B.

      Storage tests

    • C.

      Inventory tests

    • D.

      Network tests

    Correct Answer
    B. Storage tests
    Explanation
    Storage tests may require cluster resources to be taken offline because these tests involve checking the health and functionality of the storage system in the cluster. To perform these tests accurately, the cluster may need to temporarily stop accessing and using the storage resources. This ensures that the tests can accurately detect any issues or potential problems with the storage configuration. Taking the cluster resources offline during storage tests helps prevent any conflicts or interference that could affect the accuracy of the test results.

    Rate this question:

  • 3. 

    You have a Windows Server 2016 Hyper-V failover cluster that contains two nodes named NodeA and NodeB. On NodeA, you create a virtual machine named VM01 by using Hyper-V Manager. You need to configure VM01 to move to NodeB automatically if NodeA becomes unavailable. What should you do?

    • A.

      In the Failover Cluster manager, configure Role actions

    • B.

      Run the PowerShell command Enable-VMReplication

    • C.

      In the Hyper-V Manager, click VM01 and click Enable Replication

    • D.

      In the Hyper-V Manager, click NodeA and modify the Hyper-V settings

    Correct Answer
    B. Run the PowerShell command Enable-VMReplication
    Explanation
    To configure VM01 to move to NodeB automatically if NodeA becomes unavailable, you should run the PowerShell command Enable-VMReplication. This command enables replication for the virtual machine, allowing it to be replicated to another node in the failover cluster. By doing so, if NodeA becomes unavailable, VM01 will automatically failover to NodeB to ensure continuous availability.

    Rate this question:

  • 4. 

    As an administrator, you need to create highly available storage spaces that connect to directly attached storage on the hosts. Which PowerShell command would you use?

    • A.

      Set-StoragePool

    • B.

      Update-ClusterVirtualMachineConfiguration

    • C.

      Enable-ClusterStorageSpacesDirect

    • D.

      Add-ClusterDisk

    Correct Answer
    C. Enable-ClusterStorageSpacesDirect
    Explanation
    Enable-ClusterStorageSpacesDirect is the correct answer because this PowerShell command is used to enable Storage Spaces Direct on a cluster. Storage Spaces Direct is a feature in Windows Server that allows administrators to create highly available and scalable software-defined storage using directly attached storage on the hosts. By enabling Cluster Storage Spaces Direct, administrators can create a storage pool that aggregates the storage capacity of multiple servers and provides fault tolerance and high availability for virtual machines and applications.

    Rate this question:

  • 5. 

    You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to execute commands within the Dockerfile. What command would you use?

    • A.

      Docker run

    • B.

      Docker build

    • C.

      Docker Compile

    • D.

      Docker rm

    Correct Answer
    B. Docker build
    Explanation
    The correct answer is "Docker build". When building a Docker image, the Docker build command is used to create a new image from a Dockerfile. The Dockerfile contains instructions on how to build the image, such as installing dependencies, copying files, and setting environment variables. The Docker build command reads these instructions and executes them, resulting in a new image that can be used to run containers.

    Rate this question:

  • 6. 

    When choosing a quorum disk witness, the disk cannot be used in a Cluster Shared Volume (CSV)?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When choosing a quorum disk witness, it cannot be used in a Cluster Shared Volume (CSV). This is because the quorum disk witness is responsible for maintaining the cluster's quorum configuration and ensuring that there is always a majority of votes available in the cluster. If the quorum disk is also used in a CSV, it can lead to conflicts and potential loss of quorum, which can result in cluster instability and failure. Therefore, it is recommended to use a separate disk for the quorum disk witness to ensure its proper functioning.

    Rate this question:

  • 7. 

    Which of the following applications would be better suited on a failover cluster instead of a network load-balanced cluster? (Check all that apply) A) SQL Server B) Website C) Exchange Mailbox Server D) VPN services

    • A.

      A, C

    • B.

      B, C

    • C.

      A, B

    • D.

      C, D

    Correct Answer
    A. A, C
    Explanation
    SQL Server and Exchange Mailbox Server would be better suited on a failover cluster instead of a network load-balanced cluster. This is because these applications require high availability and data integrity, which can be better achieved through failover clustering. A failover cluster ensures that if one node fails, another node takes over seamlessly, minimizing downtime and ensuring continuous availability of the application and its data. On the other hand, a network load-balanced cluster is more suitable for applications like websites, where the focus is on distributing incoming network traffic evenly across multiple servers to improve performance and scalability.

    Rate this question:

  • 8. 

    In a three node cluster set to a Node Majority quorum model, how many cluster nodes can be offline before the quorum is lost?

    • A.

      Zero

    • B.

      Two

    • C.

      One

    • D.

      Three

    Correct Answer
    C. One
    Explanation
    In a three node cluster set to a Node Majority quorum model, the quorum is lost when more than half of the nodes are offline. Since there are three nodes in total, the majority is two. Therefore, only one node can be offline before the quorum is lost.

    Rate this question:

  • 9. 

    You are the administrator for a mid-size company who wants to set up and test a cluster. What PowerShell command would you use to run a validation test on a cluster?

    • A.

      Test-Cluster

    • B.

      Validate-Cluster

    • C.

      Add-Cluster

    • D.

      Set-Cluster

    Correct Answer
    A. Test-Cluster
    Explanation
    The correct answer is Test-Cluster. This PowerShell command is used to run a validation test on a cluster. It allows the administrator to check the health and functionality of the cluster by performing various tests on the cluster nodes and resources. This command helps to ensure that the cluster is set up correctly and can handle the workload it is intended for.

    Rate this question:

  • 10. 

    You are the administrator for your organization, which has started using containers. You need to build a new image using Windows Server Core. What command would you use to get a Windows Server Core image?

    • A.

      Docker pull microsoft/windowsservercore

    • B.

      Docker build microsoft/windowsservercore

    • C.

      Docker get microsoft/windowsservercore

    • D.

      Docker run microsoft/windowsservercore

    Correct Answer
    A. Docker pull microsoft/windowsservercore
    Explanation
    The correct answer is "docker pull microsoft/windowsservercore". This command is used to pull an image from the Docker registry. In this case, it will pull the Windows Server Core image from the Microsoft repository, which can then be used to build containers based on Windows Server Core.

    Rate this question:

  • 11. 

    Windows Server 2016 does not allow you to set up a cluster without using Active Directory dependencies?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Windows Server 2016 does allow you to set up a cluster without using Active Directory dependencies. Active Directory is not a mandatory requirement for creating a cluster in Windows Server 2016. You can choose to set up a cluster using other authentication methods such as certificate-based authentication or local accounts. Therefore, the statement that Windows Server 2016 does not allow setting up a cluster without Active Directory dependencies is false.

    Rate this question:

  • 12. 

    You are the network administrator for a company that has decided to start using Windows Containers. You have build a bunch of containers. What PowerShell command allows you to view the containers?

    • A.

      Docker view

    • B.

      Docker see

    • C.

      View-Container

    • D.

      Get-Container

    Correct Answer
    D. Get-Container
    Explanation
    The correct answer is Get-Container. This PowerShell command is used to view the containers in Windows Containers. By running this command, the network administrator can retrieve information about the containers that have been built and are currently running on the system.

    Rate this question:

  • 13. 

    You have been asked to start using Windows containers in your organization. Your manager wants to know what client operating systems will allow for containers?

    • A.

      Windows 7 Professional

    • B.

      Windows 10 Enterprise (Anniversary Edition)

    • C.

      Windows 8.1 Enterprise

    • D.

      Windows 10 Home

    Correct Answer
    B. Windows 10 Enterprise (Anniversary Edition)
    Explanation
    Windows containers can only be used on Windows 10 Enterprise (Anniversary Edition) client operating system. Windows 7 Professional, Windows 8.1 Enterprise, and Windows 10 Home do not support containers.

    Rate this question:

  • 14. 

    What is the maximum number of nodes that can participate in a Windows Server 2016 failover cluster?

    • A.

      16

    • B.

      4

    • C.

      64

    • D.

      2

    Correct Answer
    C. 64
    Explanation
    The maximum number of nodes that can participate in a Windows Server 2016 failover cluster is 64. This means that up to 64 servers can be part of the cluster, allowing for high availability and failover capability in case of a server failure. Having a larger number of nodes in the cluster increases the resilience and capacity of the cluster, ensuring that there are enough resources available to handle the workload and provide uninterrupted service.

    Rate this question:

  • 15. 

    You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to compile and create an image using the Dockerfile. What command would you use?

    • A.

      Docker run

    • B.

      Docker build

    • C.

      Docker rm

    • D.

      Docker Compile

    Correct Answer
    A. Docker run
    Explanation
    The correct answer is "Docker build". To compile and create an image using a Dockerfile, the "Docker build" command is used. The "Docker run" command is used to run a container from an image, "Docker rm" is used to remove a container, and "Docker Compile" is not a valid Docker command.

    Rate this question:

  • 16. 

    What is the mechanism that is used in clustering to see if a node is online or if the node is not responding?

    • A.

      Heartbeat

    • B.

      Testbeat

    • C.

      Testnode

    • D.

      Pulse

    Correct Answer
    A. Heartbeat
    Explanation
    In clustering, the mechanism used to determine if a node is online or not responding is called a heartbeat. A heartbeat is a signal or message sent from one node to another to indicate that it is still functioning properly. If a node does not receive a heartbeat from another node within a certain time frame, it can conclude that the node is not responding or offline. This allows the clustering system to detect and handle failures or unresponsive nodes effectively.

    Rate this question:

  • 17. 

    The Docker application must be installed in order to work with Windows Containers?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The Docker application must be installed in order to work with Windows Containers because Docker provides a platform that allows for the creation, deployment, and management of containers. Windows Containers are a type of containerization technology that enables the running of applications in isolated environments. Docker provides the necessary tools and infrastructure to build, package, and run containers, including Windows Containers. Without Docker, it would not be possible to effectively utilize Windows Containers.

    Rate this question:

  • 18. 

    You are the network administrator for a company that has decided to start using Windows Containers. You want to delete a container. What PowerShell command allows you to delete a container?

    • A.

      Docker delete

    • B.

      Delete-docker-Container

    • C.

      Docker kill container

    • D.

      Remove-Container

    Correct Answer
    D. Remove-Container
    Explanation
    The correct answer is "Remove-Container". This PowerShell command allows the network administrator to delete a container in Windows Containers. The other options ("docker delete", "Delete-docker-Container", and "docker kill container") are not valid PowerShell commands for deleting a container.

    Rate this question:

  • 19. 

    You are the administrator for a large organization that wants to implement site-aware clustering. What two PowerShell commands would you use to help you set up site-aware clustering? A) (Get-Cluster). CrossSiteDelay = <value> B) (Get-Cluster). CrossSiteThreshold = <value> ​​​​​​​C) (Add-Cluster). CrossSiteDelay = <value> ​​​​​​​D) (Add-Cluster). CrossSiteThreshold = <value>

    • A.

      C, D

    • B.

      A, B

    • C.

      B, D

    • D.

      B, C

    Correct Answer
    B. A, B
    Explanation
    The correct answer is A, B. The administrator can use the PowerShell commands (Get-Cluster).CrossSiteDelay = and (Get-Cluster).CrossSiteThreshold = to set up site-aware clustering. These commands allow the administrator to configure the delay and threshold values for cross-site communication in the clustering setup. By setting appropriate values for these parameters, the administrator can ensure that the clustering system functions effectively across multiple sites.

    Rate this question:

  • 20. 

    You have a Windows Server 2016 server named Server. You install the Docker daemon on Server1. You need to configure the Docker daemon to accept connections only on TCP port 64500. What should you do?  

    • A.

      Edit the daemon.json file

    • B.

      Use the New-NetFirewallRulecmdlet

    • C.

      Create a new configuration file

    • D.

      Use the View-ServiceWindows PowerShell cmdlet

    Correct Answer
    A. Edit the daemon.json file
    Explanation
    To configure the Docker daemon to accept connections only on TCP port 64500, you need to edit the daemon.json file. This file contains the configuration settings for the Docker daemon, and by editing it, you can specify the port on which the daemon should listen for incoming connections. By making the necessary changes to the daemon.json file, you can ensure that the Docker daemon only accepts connections on TCP port 64500.

    Rate this question:

  • 21. 

    In a four-node cluster set to a Node And File Share Majority quorum model, how many votes can be lost before a quorum is lost?

    • A.

      One

    • B.

      Two

    • C.

      Four

    • D.

      Three

    Correct Answer
    B. Two
    Explanation
    In a four-node cluster set to a Node And File Share Majority quorum model, a quorum is lost when more than half of the votes are lost. Since there are four nodes in the cluster, the total number of votes is four. Therefore, if two votes are lost, which is more than half of the total votes, a quorum is lost.

    Rate this question:

  • 22. 

    The Azure Container Service uses open-source scheduling and management tools?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The Azure Container Service does indeed use open-source scheduling and management tools. It supports popular open-source container orchestration systems such as Kubernetes, DC/OS, and Docker Swarm. These tools provide flexible and scalable options for deploying and managing containers in Azure. Therefore, the correct answer is true.

    Rate this question:

  • 23. 

    You are the network administrator for a company that has decided to start using Windows Containers. You have created some images. What command allows you to see your images?

    • A.

      Docker view

    • B.

      Docker info

    • C.

      Docker images

    • D.

      Docker see

    Correct Answer
    C. Docker images
    Explanation
    The correct answer is "docker images". This command allows the network administrator to view the images that have been created for the Windows Containers. By running this command, the administrator can see a list of all the available images and their details, such as the image ID, repository, tag, and size. It is an essential command for managing and organizing the images in the Docker environment.

    Rate this question:

  • 24. 

    In Windows Server 2016, dynamic quorum management is enabled by default.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In Windows Server 2016, dynamic quorum management is enabled by default. This means that the cluster automatically adjusts the quorum based on the number of nodes that are currently active in the cluster. It helps in maintaining the availability and stability of the cluster by dynamically adjusting the quorum configuration as the cluster membership changes. This feature eliminates the need for manual intervention to adjust the quorum configuration and ensures that the cluster remains operational even in case of node failures or network outages.

    Rate this question:

  • 25. 

    You have a Nano Server named Nano1. You deploy several containers to Nano1 that use an image named Image1. You need to deploy a new container to Nano1 that uses Image1. What should you run?

    • A.

      Docker load

    • B.

      Install-WindowsFeaturecmdlet cmdlet

    • C.

      Install-NanoServerPackage cmdlet

    • D.

      Docker run

    Correct Answer
    D. Docker run
    Explanation
    To deploy a new container to Nano1 using Image1, you should run the "docker run" command. This command is used to create and start a new container based on a specified image. By running "docker run", you can deploy a container that uses the Image1 on Nano1.

    Rate this question:

  • 26. 

    You have a server named Server1 that runs Windows Server 2016. Server1 hosts an application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. You need to log an event in the Application event log whenever App1 consume more than 4 GB of memory. If you create a performance counter data collector, it will show you the information you are looking for?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Creating a performance counter data collector will not provide the information needed in this scenario. Performance counters are used to monitor system performance and collect data such as CPU usage, disk activity, and network traffic. They are not designed to specifically monitor memory usage by a specific application like App1. To log an event in the Application event log when App1 consumes more than 4 GB of memory, a different approach such as using a custom script or monitoring tool would be required.

    Rate this question:

  • 27. 

    Microsoft Baseline Security Analyzer (MBSA) is a utility you can download from the Microsoft website to ensure that you have the most current security updates

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. Microsoft Baseline Security Analyzer (MBSA) is indeed a utility that can be downloaded from the Microsoft website. Its purpose is to help users ensure that their systems have the latest security updates. By scanning the system and comparing it against a database of known security issues, MBSA can identify missing security updates and provide recommendations for remediation. Therefore, the statement is correct.

    Rate this question:

  • 28. 

    You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you want to watch the CPU and Memory. Which tool can you use to get the most detained information about the resources?

    • A.

      Server Manager

    • B.

      Event Viewer

    • C.

      Performance Monitor

    • D.

      System Hardware Monitor

    Correct Answer
    C. Performance Monitor
    Explanation
    Performance Monitor is the tool that can provide the most detailed information about the CPU and Memory resources on the network. It allows the network administrator to monitor and analyze various performance counters such as CPU usage, memory usage, disk activity, network activity, and more. This tool provides real-time monitoring and also allows for data logging and analysis over time, helping the administrator identify performance bottlenecks, troubleshoot issues, and optimize resource utilization.

    Rate this question:

  • 29. 

    You are the administrator of a large organization. While setting up your Windows Server 2016 domain controller, you are creating a data recovery strategy that must meet the following requirements:
    • Back up all data files and folders in C:\Data
    • Restore individual files and folders in C:\Data
    • Ensure that data is backed up to and restored from external media
    What should you do?

    • A.

      Use the Windows Server Backup to back up and restore files

    • B.

      Use the System Restore feature to perform backup and restore operations

    • C.

      Use the NTBackup utility to back up and restore individual files and folders

    • D.

      Use the Previous Versions feature to restore the files and folders

    Correct Answer
    A. Use the Windows Server Backup to back up and restore files
    Explanation
    The Windows Server Backup tool is specifically designed for backing up and restoring files and folders in Windows Server 2016. It allows you to create a backup of the C:\Data directory, which meets the requirement of backing up all data files and folders. Additionally, it also provides the capability to restore individual files and folders, fulfilling the second requirement. Finally, the Windows Server Backup tool supports backing up and restoring data to and from external media, which satisfies the third requirement. Therefore, using the Windows Server Backup tool is the most appropriate choice in this scenario.

    Rate this question:

  • 30. 

    You are the administrator of a new Windows Server 2016 machine. You need to install WSUS. From where do you install WSUS?

    • A.

      Administrative Tools

    • B.

      Programs

    • C.

      Add/Remove Programs

    • D.

      Server Manager

    Correct Answer
    D. Server Manager
    Explanation
    To install WSUS on a new Windows Server 2016 machine, you would use the Server Manager. The Server Manager is a management console that allows administrators to install, configure, and manage server roles and features. It provides a centralized location for managing multiple servers and their associated roles and features. Therefore, the correct answer is Server Manager.

    Rate this question:

  • 31. 

    You need to disconnect a user running applications on a server. Which application can you use to disconnect a user currently connected to the server?

    • A.

      System Information

    • B.

      System Information

    • C.

      Task Manager

    • D.

      Performance Monitor

    Correct Answer
    C. Task Manager
    Explanation
    The Task Manager application can be used to disconnect a user currently connected to the server. Task Manager provides information about the processes and applications running on the server, and allows the user to end or disconnect these processes. Therefore, it is the appropriate application to use in order to disconnect a user from the server.

    Rate this question:

  • 32. 

    You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers have the most current software installed for their operating systems, including software in the categories Critical Updates and Service Packs, Windows Server 2016 Family, and Driver Updates. You want to automate the process as much as possible, and you want the client computers to download the updates from a central server that you are managing. You decide to use Windows Server Update Services. The WSUS server software has been installed on a server called WSUSServer. You want to test the client should use WSUSServer for Windows Update? (Choose all that apply.)
    • A) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 0 data
    • B) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 1 for data
    • C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify WSUSServer
    • C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer, and specify http://WSUSServer

    • A.

      B, D

    • B.

      A, B

    • C.

      B, C

    • D.

      C, D

    Correct Answer
    A. B, D
    Explanation
    The correct answer is B, D. In order to configure the client computers to use the WSUS server for Windows Update, you need to modify the registry settings. Option B suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer and setting the value to 1, which enables the use of the WSUS server. Option D suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer and setting the value to the URL of the WSUS server, which specifies the server to be used for Windows Update.

    Rate this question:

  • 33. 

    You have been hired as a consultant to research a network related problem at a small organization. The environment supports many custom-developed applications that are not well documented. A manager suspects that some computers on the network are generating excessive traffic and bogging down the network. You want to do the following:
    • Determine which computers are causing the problems
    • Record and examin network packets that are coming to/from specific machines
    • View data related only to specific types of network packets.
    What tool should you use to accomplish all the requirements?

    • A.

      Microsoft Message Analyzer

    • B.

      Performance Monitor

    • C.

      Event Viewer

    • D.

      Task Manager

    Correct Answer
    A. Microsoft Message Analyzer
    Explanation
    Microsoft Message Analyzer is the correct tool to use in this scenario because it allows you to determine which computers are causing the network problems by capturing and analyzing network packets. It also provides the ability to record and examine network packets that are coming to/from specific machines, as well as filter and view data related only to specific types of network packets. Performance Monitor, Event Viewer, and Task Manager do not provide the same level of functionality and flexibility for network packet analysis.

    Rate this question:

  • 34. 

    What command line command would you type to start Resource Monitor?

    • A.

      Resmon.exe

    • B.

      Performon.exe

    • C.

      Netmon.exe

    • D.

      Perfmon.exe

    Correct Answer
    A. Resmon.exe
    Explanation
    To start Resource Monitor, the correct command line command would be "Resmon.exe". Resource Monitor is a system utility in Windows that provides detailed information about the usage of hardware resources such as CPU, memory, disk, and network. By typing "Resmon.exe" in the command line, the Resource Monitor application will be launched, allowing the user to monitor and analyze resource usage on their system.

    Rate this question:

  • 35. 

    Your manager has decided that your organization needs to use an Active Directory application data partition. Which command can you use to create and manage application data partitions?

    • A.

      ADUtil.exe

    • B.

      DCPromo.exe

    • C.

      NTDSUtil.exe

    • D.

      ADSI.exe

    Correct Answer
    C. NTDSUtil.exe
    Explanation
    NTDSUtil.exe is the correct command to create and manage application data partitions in Active Directory. NTDSUtil.exe is a command-line tool that is used to perform various maintenance and management tasks in Active Directory, including creating and managing application data partitions. It allows administrators to manage the Active Directory database, perform offline defragmentation, and manage metadata. Therefore, NTDSUtil.exe is the appropriate command for creating and managing application data partitions in Active Directory.

    Rate this question:

  • 36. 

    What command line command would you type to start Performance Monitor?

    • A.

      Netmon.exe

    • B.

      Resmon.exe

    • C.

      Performon.exe

    • D.

      Perfmon.exe

    Correct Answer
    D. Perfmon.exe
    Explanation
    To start Performance Monitor, the correct command line command to type is "Perfmon.exe".

    Rate this question:

  • 37. 

    While setting up WSUS, you need to configure the server from which you will be getting your Microsoft updates. Under which option would you set this up?

    • A.

      Syncronization Schedule

    • B.

       Productions And Classifications

    • C.

      Update Source And Proxy Servver

    • D.

      Update Files And Languages

    Correct Answer
    C. Update Source And Proxy Servver
    Explanation
    In order to configure the server from which you will be getting your Microsoft updates while setting up WSUS, you would need to choose the option "Update Source And Proxy Server". This option allows you to specify the location or server from where the updates will be downloaded and also configure any proxy server settings if required.

    Rate this question:

  • 38. 

    You need to view which users are running applications on a server. Which application can you use to see what users are currently connected to the server?

    • A.

      Task Manager

    • B.

      Resource Monitor

    • C.

      System Information

    • D.

      Performance Monitor

    Correct Answer
    A. Task Manager
    Explanation
    Task Manager is the correct answer because it provides real-time information about the processes and applications running on a server. It allows users to view the currently connected users and the resources they are consuming. Task Manager also provides details about CPU, memory, disk, and network usage, making it a useful tool for monitoring and managing server performance.

    Rate this question:

  • 39. 

    You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation. What should you do?

    • A.

      In the Windows Server Backup utility, click the Backup Once link

    • B.

      Create a System Restore point

    • C.

      In the Backup And Restore Center window, click the Back Up Computer button.

    • D.

      Perform an Automated System Recovery (ASR) backup and restore

    Correct Answer
    A. In the Windows Server Backup utility, click the Backup Once link
    Explanation
    To back up the existing data on a computer before installing a new application and ensure the ability to recover individual user files, the recommended action is to use the Windows Server Backup utility and click the "Backup Once" link. This will initiate a backup process that will create a copy of the data, allowing for easy restoration if any files are replaced or deleted during the installation of the new application.

    Rate this question:

  • 40. 

    You are the network administrator for a large organization. You need to watch some of the main components on a server. These include the Memory, CPU, Network, and Disk. What utility can you use to get a quick overview of these four components?

    • A.

      Event Viewer

    • B.

      System Configuration

    • C.

      Resource Monitor

    • D.

      System Monitor

    Correct Answer
    C. Resource Monitor
    Explanation
    Resource Monitor is the utility that can provide a quick overview of the Memory, CPU, Network, and Disk components on a server. It allows the network administrator to monitor and analyze the performance of these components in real-time. Resource Monitor provides detailed information about the resource usage, processes, and services running on the server, helping the administrator to identify any performance issues or bottlenecks.

    Rate this question:

  • 41. 

    You are the administrator of a large company, and you need to ensure that you can recover your Windows Server 2016 Active Directory configuration and data if the computer's hard disk fails. What should you do?

    • A.

      Perform an Automated System Recovery (ASR) backup

    • B.

      Create a backup of all file categories

    • C.

      Create a system restore point

    • D.

      Create a complete PC Backup and Restore image

    Correct Answer
    D. Create a complete PC Backup and Restore image
    Explanation
    Creating a complete PC Backup and Restore image is the best option in this scenario because it allows for the recovery of the entire Windows Server 2016 Active Directory configuration and data in case of a hard disk failure. This image includes the operating system, system settings, applications, and data, providing a comprehensive backup solution. Automated System Recovery (ASR) backup is not available in Windows Server 2016, and creating a backup of all file categories or creating a system restore point may not capture all the necessary components for a full recovery.

    Rate this question:

  • 42. 

    The WSUS server must have _________ of space for the installation and __________ of space to hold the updates

    • A.

      400 MB, 10 GB

    • B.

      200 MB, 7 GB

    • C.

      100 MB, 6 GB

    • D.

      100 MB, 1 GB

    Correct Answer
    C. 100 MB, 6 GB
    Explanation
    The WSUS server must have at least 100 MB of space for the installation process. Additionally, it needs a minimum of 6 GB of space to hold the updates that will be downloaded and stored on the server. This ensures that the server has enough storage capacity to accommodate the installation and the updates that will be applied to the client devices.

    Rate this question:

  • 43. 

    You need to stop an application from running in Task Manager. Which tab would you use to stop an application from running?

    • A.

      Performance

    • B.

      Details

    • C.

      Users

    • D.

      Options

    Correct Answer
    B. Details
    Explanation
    To stop an application from running in Task Manager, you would use the "Details" tab. This tab provides a list of all the running processes and applications on the system. From here, you can locate the specific application you want to stop and right-click on it to select the "End Task" option. This will terminate the application and stop it from running. The other tabs mentioned, such as Performance, Users, and Options, do not have the functionality to stop applications directly.

    Rate this question:

  • 44. 

    You open Event Viewer and see a blue icon next to the event. What does the blue icon mean?

    • A.

      Informational

    • B.

      Error

    • C.

      Warning

    • D.

      No issues

    Correct Answer
    A. Informational
    Explanation
    The blue icon next to the event in Event Viewer indicates that it is an informational event. Informational events provide useful and non-critical information about the system or an application. These events are typically used for diagnostic purposes and do not indicate any errors or warnings.

    Rate this question:

  • 45. 

    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. All client computers run Windows 10. The company has 16 mobile sales representatives who are all members of the Power Users local group on their computers. From 6 pm until 7 am, the sales representatives' laptops are usually turned off and disconnected from the corporate network. The mobile sales representatives' computers must receive software updates every day with minimal user interaction. While verifying the recent updates on one of the laptops, you notice that the updates from the Windows Update servers were not applied. On the Automatic Updates tab of the System Properties dialog box of the mobile computer, what should you do to make sure that software updates are applied to the computer?
    • A) Select the option Automatically Download The Updates, And Install Them On The Schedule That I Specify
    • B) Select the option Notify Me Before Downloading Any Updates And Notify Me Again Before Installing Them On My Computer
    • C) Select the Keep My Computer Up To Date check box
    • D) Set the scheduled time to every day at 12 pm

    • A.

      AB

    • B.

      ABD

    • C.

      ACD

    • D.

      ABC

    Correct Answer
    C. ACD
    Explanation
    To ensure that software updates are applied to the computer, the network administrator should select the option "Automatically Download The Updates, And Install Them On The Schedule That I Specify" on the Automatic Updates tab of the System Properties dialog box. This will allow the updates to be downloaded and installed automatically without requiring any user interaction. Additionally, the administrator should also select the option "Keep My Computer Up To Date" to ensure that the computer stays updated with the latest software updates. Setting the scheduled time to every day at 12 pm is not necessary as the laptops are usually turned off and disconnected from the network during that time.

    Rate this question:

  • 46. 

    WSUS allows for automatic approvals which could potentially cause problems in the network in the event that an update patch breaks one of the business applications.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    WSUS (Windows Server Update Services) is a Microsoft tool that allows administrators to manage the distribution of updates released through Microsoft Update to computers in a corporate environment. It can automatically approve updates for installation on client machines. However, this automation can lead to problems if an update patch breaks one of the business applications running on those machines. Therefore, the statement is true as automatic approvals in WSUS can potentially cause network problems if an update patch disrupts the functionality of a business application.

    Rate this question:

  • 47. 

    You are responsible for managing several Windows Server 2016 domain controller computers in your environment. Recently, a single hard disk on one of these machines failed, and the Active Directory database was lost. You want to perform the following tasks:
    • Determine which partitions on the server are still accessible
    • Restore as much of the system configuration (including the Active Directory database) as possible
    Which of the following could be used to help meet these requirements?

    • A.

      Performance Monitor

    • B.

      A valid system state backup from the server

    • C.

      Event Viewer

    • D.

      A hard disk from another server that is not configured as a domain controller

    Correct Answer
    B. A valid system state backup from the server
    Explanation
    A valid system state backup from the server could be used to meet the requirements mentioned. A system state backup includes critical system files, including the Active Directory database. By restoring the system state backup, the lost Active Directory database can be recovered. Additionally, the system state backup can also help in determining which partitions on the server are still accessible as it includes information about the system's configuration.

    Rate this question:

  • 48. 

    You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. Windows Server Update Services (WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software updates from Microsoft Windows Update servers. You manually synchronized SERVERB with the Windows Update servers, and now you need to complete the WSUS configuration on SERVERB. Which of the following is not a step you might take to complete the configuration of WSUS on SERVERB?

    • A.

      Set SERVERB to receive updates from SERVERA and automatically synchronize with approved updates on SERVERA

    • B.

      Set SERVERB to receive daily updates automatically at a given time

    • C.

      Approve the current updates

    • D.

      Set SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from

    Correct Answer
    D. Set SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from
    Explanation
    Setting SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from is not a step you might take to complete the configuration of WSUS on SERVERB. This is because the question states that SERVERA receives software updates from Microsoft Windows Update servers, which means it is not configured to draw updates from any other source. Therefore, setting SERVERB to draw updates automatically from SERVERA would not be a valid configuration step.

    Rate this question:

  • 49. 

    You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers are secure. You decide to use MBSA to scan your client computers for possible security violations. You want to use the command line version of MBSA to scan your computers based on IP address. Which of the following commands should you use? 

    • A.

      Mbsa.exe /hf -ip xxxx.xxxx.xxxx.xxxx

    • B.

      Mdsacli.exe /ip xxxx.xxxx.xxxx.xxxx

    • C.

      Mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx

    • D.

      Mbsa.exe /ip xxxx.xxxx.xxxx.xxxx

    Correct Answer
    C. Mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx
    Explanation
    The correct answer is "mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx". This command is the correct syntax for using the command line version of MBSA to scan client computers based on IP address. The "/hf" flag specifies a high-level scan, and the "-i" flag is used to specify the IP address of the target computer.

    Rate this question:

  • 50. 

    You need to install Microsoft Baseline Security Analyzer. How do you need to do the install?

    • A.

      Use Add/Remove Programs

    • B.

      Install from Server Manager

    • C.

      Programs

    • D.

      Download MBSA from Microsoft's website

    Correct Answer
    D. Download MBSA from Microsoft's website
    Explanation
    To install Microsoft Baseline Security Analyzer (MBSA), you need to download it from Microsoft's website. This implies that the software is not available through the Add/Remove Programs or Server Manager. Therefore, the correct method to install MBSA is by downloading it directly from Microsoft's website.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 23, 2018
    Quiz Created by
    Ryanbecker24
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.