1.
You are the network administrator for a company that has decided to sttart using Windows Containers. You want to create a new container. What command allows you to create a container?
Correct Answer
C. Docker create
Explanation
The correct answer is "docker create". This command allows the network administrator to create a new container in Windows Containers.
2.
If you have a running cluster and need to run the Validate a Configuration Wizard again, which of the following tests may require cluster resources to be taken offline?
Correct Answer
B. Storage tests
Explanation
Storage tests may require cluster resources to be taken offline because these tests involve checking the health and functionality of the storage system in the cluster. To perform these tests accurately, the cluster may need to temporarily stop accessing and using the storage resources. This ensures that the tests can accurately detect any issues or potential problems with the storage configuration. Taking the cluster resources offline during storage tests helps prevent any conflicts or interference that could affect the accuracy of the test results.
3.
You have a Windows Server 2016 Hyper-V failover cluster that contains two nodes named NodeA and NodeB. On NodeA, you create a virtual machine named VM01 by using Hyper-V Manager. You need to configure VM01 to move to NodeB automatically if NodeA becomes unavailable. What should you do?
Correct Answer
B. Run the PowerShell command Enable-VMReplication
Explanation
To configure VM01 to move to NodeB automatically if NodeA becomes unavailable, you should run the PowerShell command Enable-VMReplication. This command enables replication for the virtual machine, allowing it to be replicated to another node in the failover cluster. By doing so, if NodeA becomes unavailable, VM01 will automatically failover to NodeB to ensure continuous availability.
4.
As an administrator, you need to create highly available storage spaces that connect to directly attached storage on the hosts. Which PowerShell command would you use?
Correct Answer
C. Enable-ClusterStorageSpacesDirect
Explanation
Enable-ClusterStorageSpacesDirect is the correct answer because this PowerShell command is used to enable Storage Spaces Direct on a cluster. Storage Spaces Direct is a feature in Windows Server that allows administrators to create highly available and scalable software-defined storage using directly attached storage on the hosts. By enabling Cluster Storage Spaces Direct, administrators can create a storage pool that aggregates the storage capacity of multiple servers and provides fault tolerance and high availability for virtual machines and applications.
5.
You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to execute commands within the Dockerfile. What command would you use?
Correct Answer
B. Docker build
Explanation
The correct answer is "Docker build". When building a Docker image, the Docker build command is used to create a new image from a Dockerfile. The Dockerfile contains instructions on how to build the image, such as installing dependencies, copying files, and setting environment variables. The Docker build command reads these instructions and executes them, resulting in a new image that can be used to run containers.
6.
When choosing a quorum disk witness, the disk cannot be used in a Cluster Shared Volume (CSV)?
Correct Answer
A. True
Explanation
When choosing a quorum disk witness, it cannot be used in a Cluster Shared Volume (CSV). This is because the quorum disk witness is responsible for maintaining the cluster's quorum configuration and ensuring that there is always a majority of votes available in the cluster. If the quorum disk is also used in a CSV, it can lead to conflicts and potential loss of quorum, which can result in cluster instability and failure. Therefore, it is recommended to use a separate disk for the quorum disk witness to ensure its proper functioning.
7.
Which of the following applications would be better suited on a failover cluster instead of a network load-balanced cluster? (Check all that apply)
A) SQL Server
B) Website
C) Exchange Mailbox Server
D) VPN services
Correct Answer
A. A, C
Explanation
SQL Server and Exchange Mailbox Server would be better suited on a failover cluster instead of a network load-balanced cluster. This is because these applications require high availability and data integrity, which can be better achieved through failover clustering. A failover cluster ensures that if one node fails, another node takes over seamlessly, minimizing downtime and ensuring continuous availability of the application and its data. On the other hand, a network load-balanced cluster is more suitable for applications like websites, where the focus is on distributing incoming network traffic evenly across multiple servers to improve performance and scalability.
8.
In a three node cluster set to a Node Majority quorum model, how many cluster nodes can be offline before the quorum is lost?
Correct Answer
C. One
Explanation
In a three node cluster set to a Node Majority quorum model, the quorum is lost when more than half of the nodes are offline. Since there are three nodes in total, the majority is two. Therefore, only one node can be offline before the quorum is lost.
9.
You are the administrator for a mid-size company who wants to set up and test a cluster. What PowerShell command would you use to run a validation test on a cluster?
Correct Answer
A. Test-Cluster
Explanation
The correct answer is Test-Cluster. This PowerShell command is used to run a validation test on a cluster. It allows the administrator to check the health and functionality of the cluster by performing various tests on the cluster nodes and resources. This command helps to ensure that the cluster is set up correctly and can handle the workload it is intended for.
10.
You are the administrator for your organization, which has started using containers. You need to build a new image using Windows Server Core. What command would you use to get a Windows Server Core image?
Correct Answer
A. Docker pull microsoft/windowsservercore
Explanation
The correct answer is "docker pull microsoft/windowsservercore". This command is used to pull an image from the Docker registry. In this case, it will pull the Windows Server Core image from the Microsoft repository, which can then be used to build containers based on Windows Server Core.
11.
Windows Server 2016 does not allow you to set up a cluster without using Active Directory dependencies?
Correct Answer
B. False
Explanation
Windows Server 2016 does allow you to set up a cluster without using Active Directory dependencies. Active Directory is not a mandatory requirement for creating a cluster in Windows Server 2016. You can choose to set up a cluster using other authentication methods such as certificate-based authentication or local accounts. Therefore, the statement that Windows Server 2016 does not allow setting up a cluster without Active Directory dependencies is false.
12.
You are the network administrator for a company that has decided to start using Windows Containers. You have build a bunch of containers. What PowerShell command allows you to view the containers?
Correct Answer
D. Get-Container
Explanation
The correct answer is Get-Container. This PowerShell command is used to view the containers in Windows Containers. By running this command, the network administrator can retrieve information about the containers that have been built and are currently running on the system.
13.
You have been asked to start using Windows containers in your organization. Your manager wants to know what client operating systems will allow for containers?
Correct Answer
B. Windows 10 Enterprise (Anniversary Edition)
Explanation
Windows containers can only be used on Windows 10 Enterprise (Anniversary Edition) client operating system. Windows 7 Professional, Windows 8.1 Enterprise, and Windows 10 Home do not support containers.
14.
What is the maximum number of nodes that can participate in a Windows Server 2016 failover cluster?
Correct Answer
C. 64
Explanation
The maximum number of nodes that can participate in a Windows Server 2016 failover cluster is 64. This means that up to 64 servers can be part of the cluster, allowing for high availability and failover capability in case of a server failure. Having a larger number of nodes in the cluster increases the resilience and capacity of the cluster, ensuring that there are enough resources available to handle the workload and provide uninterrupted service.
15.
You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to compile and create an image using the Dockerfile. What command would you use?
Correct Answer
A. Docker run
Explanation
The correct answer is "Docker build". To compile and create an image using a Dockerfile, the "Docker build" command is used. The "Docker run" command is used to run a container from an image, "Docker rm" is used to remove a container, and "Docker Compile" is not a valid Docker command.
16.
What is the mechanism that is used in clustering to see if a node is online or if the node is not responding?
Correct Answer
A. Heartbeat
Explanation
In clustering, the mechanism used to determine if a node is online or not responding is called a heartbeat. A heartbeat is a signal or message sent from one node to another to indicate that it is still functioning properly. If a node does not receive a heartbeat from another node within a certain time frame, it can conclude that the node is not responding or offline. This allows the clustering system to detect and handle failures or unresponsive nodes effectively.
17.
The Docker application must be installed in order to work with Windows Containers?
Correct Answer
A. True
Explanation
The Docker application must be installed in order to work with Windows Containers because Docker provides a platform that allows for the creation, deployment, and management of containers. Windows Containers are a type of containerization technology that enables the running of applications in isolated environments. Docker provides the necessary tools and infrastructure to build, package, and run containers, including Windows Containers. Without Docker, it would not be possible to effectively utilize Windows Containers.
18.
You are the network administrator for a company that has decided to start using Windows Containers. You want to delete a container. What PowerShell command allows you to delete a container?
Correct Answer
D. Remove-Container
Explanation
The correct answer is "Remove-Container". This PowerShell command allows the network administrator to delete a container in Windows Containers. The other options ("docker delete", "Delete-docker-Container", and "docker kill container") are not valid PowerShell commands for deleting a container.
19.
You are the administrator for a large organization that wants to implement site-aware clustering. What two PowerShell commands would you use to help you set up site-aware clustering?
A) (Get-Cluster). CrossSiteDelay = <value>
B) (Get-Cluster). CrossSiteThreshold = <value>
​​​​​​​C) (Add-Cluster). CrossSiteDelay = <value>
​​​​​​​D) (Add-Cluster). CrossSiteThreshold = <value>
Correct Answer
B. A, B
Explanation
The correct answer is A, B. The administrator can use the PowerShell commands (Get-Cluster).CrossSiteDelay = and (Get-Cluster).CrossSiteThreshold = to set up site-aware clustering. These commands allow the administrator to configure the delay and threshold values for cross-site communication in the clustering setup. By setting appropriate values for these parameters, the administrator can ensure that the clustering system functions effectively across multiple sites.
20.
You have a Windows Server 2016 server named Server. You install the Docker daemon on Server1. You need to configure the Docker daemon to accept connections only on TCP port 64500. What should you do?
Correct Answer
A. Edit the daemon.json file
Explanation
To configure the Docker daemon to accept connections only on TCP port 64500, you need to edit the daemon.json file. This file contains the configuration settings for the Docker daemon, and by editing it, you can specify the port on which the daemon should listen for incoming connections. By making the necessary changes to the daemon.json file, you can ensure that the Docker daemon only accepts connections on TCP port 64500.
21.
In a four-node cluster set to a Node And File Share Majority quorum model, how many votes can be lost before a quorum is lost?
Correct Answer
B. Two
Explanation
In a four-node cluster set to a Node And File Share Majority quorum model, a quorum is lost when more than half of the votes are lost. Since there are four nodes in the cluster, the total number of votes is four. Therefore, if two votes are lost, which is more than half of the total votes, a quorum is lost.
22.
The Azure Container Service uses open-source scheduling and management tools?
Correct Answer
A. True
Explanation
The Azure Container Service does indeed use open-source scheduling and management tools. It supports popular open-source container orchestration systems such as Kubernetes, DC/OS, and Docker Swarm. These tools provide flexible and scalable options for deploying and managing containers in Azure. Therefore, the correct answer is true.
23.
You are the network administrator for a company that has decided to start using Windows Containers. You have created some images. What command allows you to see your images?
Correct Answer
C. Docker images
Explanation
The correct answer is "docker images". This command allows the network administrator to view the images that have been created for the Windows Containers. By running this command, the administrator can see a list of all the available images and their details, such as the image ID, repository, tag, and size. It is an essential command for managing and organizing the images in the Docker environment.
24.
In Windows Server 2016, dynamic quorum management is enabled by default.
Correct Answer
A. True
Explanation
In Windows Server 2016, dynamic quorum management is enabled by default. This means that the cluster automatically adjusts the quorum based on the number of nodes that are currently active in the cluster. It helps in maintaining the availability and stability of the cluster by dynamically adjusting the quorum configuration as the cluster membership changes. This feature eliminates the need for manual intervention to adjust the quorum configuration and ensures that the cluster remains operational even in case of node failures or network outages.
25.
You have a Nano Server named Nano1. You deploy several containers to Nano1 that use an image named Image1. You need to deploy a new container to Nano1 that uses Image1. What should you run?
Correct Answer
D. Docker run
Explanation
To deploy a new container to Nano1 using Image1, you should run the "docker run" command. This command is used to create and start a new container based on a specified image. By running "docker run", you can deploy a container that uses the Image1 on Nano1.
26.
You have a server named Server1 that runs Windows Server 2016. Server1 hosts an application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. You need to log an event in the Application event log whenever App1 consume more than 4 GB of memory. If you create a performance counter data collector, it will show you the information you are looking for?
Correct Answer
B. False
Explanation
Creating a performance counter data collector will not provide the information needed in this scenario. Performance counters are used to monitor system performance and collect data such as CPU usage, disk activity, and network traffic. They are not designed to specifically monitor memory usage by a specific application like App1. To log an event in the Application event log when App1 consumes more than 4 GB of memory, a different approach such as using a custom script or monitoring tool would be required.
27.
Microsoft Baseline Security Analyzer (MBSA) is a utility you can download from the Microsoft website to ensure that you have the most current security updates
Correct Answer
A. True
Explanation
The given statement is true. Microsoft Baseline Security Analyzer (MBSA) is indeed a utility that can be downloaded from the Microsoft website. Its purpose is to help users ensure that their systems have the latest security updates. By scanning the system and comparing it against a database of known security issues, MBSA can identify missing security updates and provide recommendations for remediation. Therefore, the statement is correct.
28.
You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you want to watch the CPU and Memory. Which tool can you use to get the most detained information about the resources?
Correct Answer
C. Performance Monitor
Explanation
Performance Monitor is the tool that can provide the most detailed information about the CPU and Memory resources on the network. It allows the network administrator to monitor and analyze various performance counters such as CPU usage, memory usage, disk activity, network activity, and more. This tool provides real-time monitoring and also allows for data logging and analysis over time, helping the administrator identify performance bottlenecks, troubleshoot issues, and optimize resource utilization.
29.
You are the administrator of a large organization. While setting up your Windows Server 2016 domain controller, you are creating a data recovery strategy that must meet the following requirements:
- Back up all data files and folders in C:\Data
- Restore individual files and folders in C:\Data
- Ensure that data is backed up to and restored from external media
What should you do?
Correct Answer
A. Use the Windows Server Backup to back up and restore files
Explanation
The Windows Server Backup tool is specifically designed for backing up and restoring files and folders in Windows Server 2016. It allows you to create a backup of the C:\Data directory, which meets the requirement of backing up all data files and folders. Additionally, it also provides the capability to restore individual files and folders, fulfilling the second requirement. Finally, the Windows Server Backup tool supports backing up and restoring data to and from external media, which satisfies the third requirement. Therefore, using the Windows Server Backup tool is the most appropriate choice in this scenario.
30.
You are the administrator of a new Windows Server 2016 machine. You need to install WSUS. From where do you install WSUS?
Correct Answer
D. Server Manager
Explanation
To install WSUS on a new Windows Server 2016 machine, you would use the Server Manager. The Server Manager is a management console that allows administrators to install, configure, and manage server roles and features. It provides a centralized location for managing multiple servers and their associated roles and features. Therefore, the correct answer is Server Manager.
31.
You need to disconnect a user running applications on a server. Which application can you use to disconnect a user currently connected to the server?
Correct Answer
C. Task Manager
Explanation
The Task Manager application can be used to disconnect a user currently connected to the server. Task Manager provides information about the processes and applications running on the server, and allows the user to end or disconnect these processes. Therefore, it is the appropriate application to use in order to disconnect a user from the server.
32.
You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers have the most current software installed for their operating systems, including software in the categories Critical Updates and Service Packs, Windows Server 2016 Family, and Driver Updates. You want to automate the process as much as possible, and you want the client computers to download the updates from a central server that you are managing. You decide to use Windows Server Update Services. The WSUS server software has been installed on a server called WSUSServer. You want to test the client should use WSUSServer for Windows Update? (Choose all that apply.)
- A) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 0 data
- B) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 1 for data
- C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify WSUSServer
- C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer, and specify http://WSUSServer
Correct Answer
A. B, D
Explanation
The correct answer is B, D. In order to configure the client computers to use the WSUS server for Windows Update, you need to modify the registry settings. Option B suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer and setting the value to 1, which enables the use of the WSUS server. Option D suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer and setting the value to the URL of the WSUS server, which specifies the server to be used for Windows Update.
33.
You have been hired as a consultant to research a network related problem at a small organization. The environment supports many custom-developed applications that are not well documented. A manager suspects that some computers on the network are generating excessive traffic and bogging down the network. You want to do the following:
- Determine which computers are causing the problems
- Record and examin network packets that are coming to/from specific machines
- View data related only to specific types of network packets.
What tool should you use to accomplish all the requirements?
Correct Answer
A. Microsoft Message Analyzer
Explanation
Microsoft Message Analyzer is the correct tool to use in this scenario because it allows you to determine which computers are causing the network problems by capturing and analyzing network packets. It also provides the ability to record and examine network packets that are coming to/from specific machines, as well as filter and view data related only to specific types of network packets. Performance Monitor, Event Viewer, and Task Manager do not provide the same level of functionality and flexibility for network packet analysis.
34.
What command line command would you type to start Resource Monitor?
Correct Answer
A. Resmon.exe
Explanation
To start Resource Monitor, the correct command line command would be "Resmon.exe". Resource Monitor is a system utility in Windows that provides detailed information about the usage of hardware resources such as CPU, memory, disk, and network. By typing "Resmon.exe" in the command line, the Resource Monitor application will be launched, allowing the user to monitor and analyze resource usage on their system.
35.
Your manager has decided that your organization needs to use an Active Directory application data partition. Which command can you use to create and manage application data partitions?
Correct Answer
C. NTDSUtil.exe
Explanation
NTDSUtil.exe is the correct command to create and manage application data partitions in Active Directory. NTDSUtil.exe is a command-line tool that is used to perform various maintenance and management tasks in Active Directory, including creating and managing application data partitions. It allows administrators to manage the Active Directory database, perform offline defragmentation, and manage metadata. Therefore, NTDSUtil.exe is the appropriate command for creating and managing application data partitions in Active Directory.
36.
What command line command would you type to start Performance Monitor?
Correct Answer
D. Perfmon.exe
Explanation
To start Performance Monitor, the correct command line command to type is "Perfmon.exe".
37.
While setting up WSUS, you need to configure the server from which you will be getting your Microsoft updates. Under which option would you set this up?
Correct Answer
C. Update Source And Proxy Servver
Explanation
In order to configure the server from which you will be getting your Microsoft updates while setting up WSUS, you would need to choose the option "Update Source And Proxy Server". This option allows you to specify the location or server from where the updates will be downloaded and also configure any proxy server settings if required.
38.
You need to view which users are running applications on a server. Which application can you use to see what users are currently connected to the server?
Correct Answer
A. Task Manager
Explanation
Task Manager is the correct answer because it provides real-time information about the processes and applications running on a server. It allows users to view the currently connected users and the resources they are consuming. Task Manager also provides details about CPU, memory, disk, and network usage, making it a useful tool for monitoring and managing server performance.
39.
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation. What should you do?
Correct Answer
A. In the Windows Server Backup utility, click the Backup Once link
Explanation
To back up the existing data on a computer before installing a new application and ensure the ability to recover individual user files, the recommended action is to use the Windows Server Backup utility and click the "Backup Once" link. This will initiate a backup process that will create a copy of the data, allowing for easy restoration if any files are replaced or deleted during the installation of the new application.
40.
You are the network administrator for a large organization. You need to watch some of the main components on a server. These include the Memory, CPU, Network, and Disk. What utility can you use to get a quick overview of these four components?
Correct Answer
C. Resource Monitor
Explanation
Resource Monitor is the utility that can provide a quick overview of the Memory, CPU, Network, and Disk components on a server. It allows the network administrator to monitor and analyze the performance of these components in real-time. Resource Monitor provides detailed information about the resource usage, processes, and services running on the server, helping the administrator to identify any performance issues or bottlenecks.
41.
You are the administrator of a large company, and you need to ensure that you can recover your Windows Server 2016 Active Directory configuration and data if the computer's hard disk fails. What should you do?
Correct Answer
D. Create a complete PC Backup and Restore image
Explanation
Creating a complete PC Backup and Restore image is the best option in this scenario because it allows for the recovery of the entire Windows Server 2016 Active Directory configuration and data in case of a hard disk failure. This image includes the operating system, system settings, applications, and data, providing a comprehensive backup solution. Automated System Recovery (ASR) backup is not available in Windows Server 2016, and creating a backup of all file categories or creating a system restore point may not capture all the necessary components for a full recovery.
42.
The WSUS server must have _________ of space for the installation and __________ of space to hold the updates
Correct Answer
C. 100 MB, 6 GB
Explanation
The WSUS server must have at least 100 MB of space for the installation process. Additionally, it needs a minimum of 6 GB of space to hold the updates that will be downloaded and stored on the server. This ensures that the server has enough storage capacity to accommodate the installation and the updates that will be applied to the client devices.
43.
You need to stop an application from running in Task Manager. Which tab would you use to stop an application from running?
Correct Answer
B. Details
Explanation
To stop an application from running in Task Manager, you would use the "Details" tab. This tab provides a list of all the running processes and applications on the system. From here, you can locate the specific application you want to stop and right-click on it to select the "End Task" option. This will terminate the application and stop it from running. The other tabs mentioned, such as Performance, Users, and Options, do not have the functionality to stop applications directly.
44.
You open Event Viewer and see a blue icon next to the event. What does the blue icon mean?
Correct Answer
A. Informational
Explanation
The blue icon next to the event in Event Viewer indicates that it is an informational event. Informational events provide useful and non-critical information about the system or an application. These events are typically used for diagnostic purposes and do not indicate any errors or warnings.
45.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. All client computers run Windows 10. The company has 16 mobile sales representatives who are all members of the Power Users local group on their computers. From 6 pm until 7 am, the sales representatives' laptops are usually turned off and disconnected from the corporate network. The mobile sales representatives' computers must receive software updates every day with minimal user interaction. While verifying the recent updates on one of the laptops, you notice that the updates from the Windows Update servers were not applied. On the Automatic Updates tab of the System Properties dialog box of the mobile computer, what should you do to make sure that software updates are applied to the computer?
- A) Select the option Automatically Download The Updates, And Install Them On The Schedule That I Specify
- B) Select the option Notify Me Before Downloading Any Updates And Notify Me Again Before Installing Them On My Computer
- C) Select the Keep My Computer Up To Date check box
- D) Set the scheduled time to every day at 12 pm
Correct Answer
C. ACD
Explanation
To ensure that software updates are applied to the computer, the network administrator should select the option "Automatically Download The Updates, And Install Them On The Schedule That I Specify" on the Automatic Updates tab of the System Properties dialog box. This will allow the updates to be downloaded and installed automatically without requiring any user interaction. Additionally, the administrator should also select the option "Keep My Computer Up To Date" to ensure that the computer stays updated with the latest software updates. Setting the scheduled time to every day at 12 pm is not necessary as the laptops are usually turned off and disconnected from the network during that time.
46.
WSUS allows for automatic approvals which could potentially cause problems in the network in the event that an update patch breaks one of the business applications.
Correct Answer
A. True
Explanation
WSUS (Windows Server Update Services) is a Microsoft tool that allows administrators to manage the distribution of updates released through Microsoft Update to computers in a corporate environment. It can automatically approve updates for installation on client machines. However, this automation can lead to problems if an update patch breaks one of the business applications running on those machines. Therefore, the statement is true as automatic approvals in WSUS can potentially cause network problems if an update patch disrupts the functionality of a business application.
47.
You are responsible for managing several Windows Server 2016 domain controller computers in your environment. Recently, a single hard disk on one of these machines failed, and the Active Directory database was lost. You want to perform the following tasks:
- Determine which partitions on the server are still accessible
- Restore as much of the system configuration (including the Active Directory database) as possible
Which of the following could be used to help meet these requirements?
Correct Answer
B. A valid system state backup from the server
Explanation
A valid system state backup from the server could be used to meet the requirements mentioned. A system state backup includes critical system files, including the Active Directory database. By restoring the system state backup, the lost Active Directory database can be recovered. Additionally, the system state backup can also help in determining which partitions on the server are still accessible as it includes information about the system's configuration.
48.
You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. Windows Server Update Services (WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software updates from Microsoft Windows Update servers. You manually synchronized SERVERB with the Windows Update servers, and now you need to complete the WSUS configuration on SERVERB. Which of the following is not a step you might take to complete the configuration of WSUS on SERVERB?
Correct Answer
D. Set SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from
Explanation
Setting SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from is not a step you might take to complete the configuration of WSUS on SERVERB. This is because the question states that SERVERA receives software updates from Microsoft Windows Update servers, which means it is not configured to draw updates from any other source. Therefore, setting SERVERB to draw updates automatically from SERVERA would not be a valid configuration step.
49.
You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers are secure. You decide to use MBSA to scan your client computers for possible security violations. You want to use the command line version of MBSA to scan your computers based on IP address. Which of the following commands should you use?
Correct Answer
C. Mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx
Explanation
The correct answer is "mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx". This command is the correct syntax for using the command line version of MBSA to scan client computers based on IP address. The "/hf" flag specifies a high-level scan, and the "-i" flag is used to specify the IP address of the target computer.
50.
You need to install Microsoft Baseline Security Analyzer. How do you need to do the install?
Correct Answer
D. Download MBSA from Microsoft's website
Explanation
To install Microsoft Baseline Security Analyzer (MBSA), you need to download it from Microsoft's website. This implies that the software is not available through the Add/Remove Programs or Server Manager. Therefore, the correct method to install MBSA is by downloading it directly from Microsoft's website.