hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Final Review Part 3
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (25)
To enable mobile devices running Windows Mobile 6 and above operating systems to obtain certificates and licenses for their users, you will need to edit the NTFS permissions of a file. What file must you edit the permissions for?
A) MobileDeviceConfiguration.asmx
B) WindowsMobileADRMSConfiguration.asmx
C) MobileDeviceParticipate.asmx
D) MobileDeviceCertification.asmx
D) MobileDeviceCertification.asmx
Regarding Dynamic Access Control, which term describes the process of using a trusted identity provider to provide authentication?
A) Claims-based access control
B) Trusted identity provider
C) Security Token Service
D) Claim
A) Claims-based access control
Which of the following Hyper-V disk types is characterized as only allocating the amount of physical disk space that is required at that point in time, while still being able to grow to a fixed limit?
A) Differencing disk
B) Thin provisioned disk
C) Dynamically expanding disk
D) Trimming disk
C) Dynamically expanding disk
What should you configure if you want to limit access to files with certain classifications within a folder to a specific security group's members?
A) A Central Access Policy
B) A Discretionary Access Control List
C) Role-Based Access Control
D) Access-Based Enumeration
A) A Central Access Policy
Which AD RMS group members have access to only policy template administration in the AD RMS console?
A) AD RMS Policy Administrators
B) AD RMS Policy Template Administrators
C) AD RMS Template Managers
D) AD RMS Template Administrators
D) AD RMS Template Administrators
Which of the following accurately represents a User Principal Name?
A) MYCO\jdoe
B) jdoe@myco
C) jdoe.myco.corp
D) jdoe@myco.corp
D) jdoe@myco.corp
Which of the following components of Active Directory Federation Services is responsible for forwarding packets from external hosts to internal federation servers?
A) Federation server proxy
B) Claims provider
C) Relying party
D) Claim
A) Federation server proxy
What Active Directory component dynamically creates connection objects between domain controllers that are used for replication?
A) Bridgehead servers
B) Knowledge Consistency Checker
C) Site links
D) Intersite Topology Generator
B) Knowledge Consistency Checker
Select the proper PowerShell cmdlet from this list that is used to increase the BranchCache in storage space.
A) Set-BCCache
B) Enable-BCDistributed
C) Add-BCDataCacheExtension
D) Enable-BCLocal
C) Add-BCDataCacheExtension
What database engine is used for the DHCP database in Windows Server 2012?
A) SQLite
B) Jet
C) ESE
D) SQL Express
B) Jet
Which NLB control command would be the correct one to use to gracefully prepare a node for a planned maintenance activity?
A) Stop
B) Suspend
C) Resume
D) Drainstop
D) Drainstop
On what port does DHCP failover listen for failover traffic?
A) UDP port 67
B) UDP port 68
C) TCP port 647
D) TCP port 648
C) TCP port 647
By default, if you install a CA server on January 1, 2014, when will the CA certificate expire?
A) January 1, 2019
B) January 1, 2024
C) January 1, 2029
D) January 1, 2034
A) January 1, 2019
Which of the following is a distributed file system protocol used to access files over the network that is used with UNIX and Linux file server clients?
A) DFS
B) NFS
C) SMB
D) DNS
B) NFS
Which component of the Hyper-V replica feature provides a secure and efficient way to transfer VM replicas between hosts?
A) Replication engine
B) Change tracking
C) Network module
D) Broker server
C) Network module
Which of the following is the most likely problem if your server can boot and log in to Safe Mode successfully, but cannot boot and log in normally?
A) Low disk space
B) Network congestion
C) Operator error
D) Malware infection
D) Malware infection
What is the limitation of backing up system state using Windows Server Backup?
A) It cannot be backed up to a remote disk
B) It cannot be backed up to a disk
C) It can only be backed up using Data Protection Manager
D) It cannot be backed up to a DVD drive
D) It cannot be backed up to a DVD drive
When examining the netlogon.log file, what will be your indicator that you have a problem with your Active Directory sites or subnets configuration?
A) A NO_CLIENT_SUBNET entry
B) A NO_CLIENT_DC entry
C) A NO_CLIENT_LINK entry
D) A NO_CLIENT_SITE entry
D) A NO_CLIENT_SITE entry
What advantage is offered by using block-level backup in Windows Server Backup?
A) The blocks are read in the order they appear in files
B) The blocks are read in the order they appear on the disk
C) The blocks are read in the order they were allocated
D) The blocks are read in the order they were released to slack space
B) The blocks are read in the order they appear on the disk
To recover a key from the CA database using the certutil utility, what information will you need to know about the certificate?
A) The password for the private keys
B) The certificate serial number
C) The certificate subject name
D) The certificate key length
B) The certificate serial number
In which scenario would you want to disable SID filtering?
A) There is no trust between all Domain Admins and Enterprise Admins within both trusts
B) Forests have been renamed
C) Domains have been authoritatively restored
D) User accounts have been involved in a domain migration
D) User accounts have been involved in a domain migration
Which of the following protocols is not supported by BranchCache?
A) HTTP/HTTPS
B) SMB
C) BITS
D) NFS
D) NFS
When configuring the BranchCache hash publication options in Group Policy, you have three options available. Which of the options listed here is not available to configure?
A) Disallow hash publication on shared folders on which BranchCache is not enabled
B) Allow hash publication only for shared folders on which BranchCache is enabled
C) Allow hash publication for all shared folders
D) Disallow hash publication on all shared folders
A) Disallow hash publication on shared folders on which BranchCache is not enabled
Which of these IPv6 address types is best used for hosts that are reachable from the Internet?
A) Global unicast addresses
B) Link-local addresses
C) Unique local addresses
D) Protected global addresses
A) Global unicast addresses
Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects zone status events from DNS servers?
A) Every 5 minutes
B) Every 15 minutes
C) Every 30 minutes
D) Every 60 minutes
C) Every 30 minutes
Students also viewed
Configuring Windows Devices Chapter 17
23 terms
ist 203
342 terms
Configuring Windows Devices Chapter 16
17 terms
IST203
15 terms
Other sets by this creator
Simulation examples
10 terms
Subnets
14 terms
Sixty One
20 terms
Sixty
20 terms