Servers - Quiz 8
What is Resource Metering?
Resource metering documents virtual machine usage regarding a variety of criteria
Resource metering documents resource usage of host systems that run virtual machines
Resource metering documents user traffic on virtual machines
Resource metering enables you to redistribute virtual machine resources
What is the primary graphical tool for creating and managing virtual machines?
Server Manager
Hyper-V Manager
Add Roles and Features wizard
PowerShell
Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?
Using the Enforce, Block Policy Inheritance, or Loopback settings
Using Active Directory Administrative Center (ADAC) to block inheritance
Inheritance can be altered by making the applicable registry settings
Using the Enforce or Block Policy Inheritance settings
What kind of GPO serves as a template for the creation of domain GPOs based on a standard collection of settings?
Multiple local GPOs
Local GPO
Starter GPO
Domain GPO
Can an administrator launch the Group Policy Management console from a workstation?
No, the Group Policy Management console cannot be launched from a workstation
Yes, if the administrator previously installed the Group Policy Management feature
Yes, if the workstation is running the Remote Server Administration Tools package
Yes, with no
What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?
Grouping Members policy
Restricted Groups policy
Special Identities policy
Members Only policy
What are the two interfaces available for creating and managing user accounts in Windows Server 2012 R2?
Control Panel and the MMC snap-in
Server Manager and Control Panel
Control Panel and Active Directory Users and Computers
User Accounts control panel and the Local Users and Groups snap-in for MMC
What are the two categories of security settings within Group Policy? Select two answers.
User
Workstation
Administrator
Computer
If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond?
The firewall permits the user to visit a non-corporate website.
The firewall does not block client-initiated network traffic by default.
The firewall blocks the webmail account unless the user is already authenticated.
The firewall blocks all outbound traffic.
Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?
Private, temporary, and authenticated
Public, DMZ, and private
Internet, secure, and private
Domain, private, and public
After installing the Hyper-V role, what is the startup procedure for Windows Server 2012 R2?
The newly installed hypervisor starts first, then loads the operating system as the primary or parent partition
The actual startup procedure is not altered
The newly installed hypervisor starts alongside of the operating system simultaneously
The newly installed hypervisor starts second, after the operating system loads as a partition
What roles does Microsoft recommend can share the same server as the Hyper-V role?
Any other role
No other role
File and print roles
Web server
Installing Windows Server 2012 R2 Active Directory Domain Services installs two default policies: Default Domain Policy and Default Domain Controller Policy. The administrator needs different policy settings. How best to proceed?
Add new settings in the default policies as needed.
Create new Group Policy Objects to augment or override the existing default settings.
Change existing ones in the default policies as needed.
Link a new GPO using the Active Directory Domain Services role.
Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?
Software settings, Windows settings, and Delegation Templates
Software settings, Windows settings, and Administrative Templates
Security settings, Windows settings, and Delegation Templates
Security settings, Windows settings, and Administrative Templates
What application or interface allows you to configure security filtering?
Active Directory Administrative Center
Server Manager
Group Policy Management console
Active Directory Users and Computers
What are the key benefits of security templates?
Apply consistent, scalable, and reproducible security settings throughout an enterprise.
Deploy alongside group policies.
Although a text editor is possible, Windows Server 2012 R2 enables the use of a graphical interface.
Simple deployment because configuration files are text (.inf extension) and use a graphical and unified interface.
What account is created during Windows Server 2012 R2 installation with the account disabled by default?
User Accounts Control Panel
Local Users and Groups snap-in
Administrator
Guest
What did Microsoft introduce in Windows Server 2008, which is used to ensure users with administrative privileges still operate routine tasks as standard users?
New Group Policy and Local Security Policy
Secure desktop
User Account Control (UAC)
Built-in administrator account
For the Windows Firewall private profile, what type of network is expected?
An unsecure network where unauthenticated users are probable
An unsecure network where users must authenticate to the server
An internal network that is not accessible by unauthorized users
No network—private means no network connection allowed
What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule?
Program
Action
Scope
Protocol and Ports
Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________.
Guest integration services
Smart paging
Resource metering
Hyper-V Server
Windows Server 2012 R2 includes Hyper-V in which edition(s)?
All editions
The Datacenter edition
In the Standard and Datacenter editions
In Essentials, Standard and Datacenter editions
What is the proper term for associating a Group Policy to a set of AD DS objects?
Linking
Connecting
Implementing
Granting
What are the three primary event logs?
Application, Forwarded, and System
Application, Security, and Setup
Application, Security, and System
Application, System, and Setup
You can configure the Windows Firewall to allow or block specific _________.
Ports and protocols
Applications and users
Ports, protocols, and applications, but not users
Ports, protocols, applications, users, and IP address ranges
Which of the following is the correct scalability limit of Hyper-V in Window Server 2012?
Hyper-V can support clusters up to 6 nodes and 8,000,000 virtual machines
Hyper-V host system can support up to 128 terabytes (TB) of physical memory
One server can host as many as 1,024 active virtual machines, with each virtual machine up to 64 virtual CPUs and 1 TB of memory
Hyper-V host system can have up to 120 logical processors
When multiple GPOs are linked to a container, which GPO in the list has the highest priority?
The first
The last
The most permissive
The most restrictive
What impacts the types of logs and events logged on a server?
Hardware installed
Roles installed
Users logged in
Physical orientation
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the exact type of traffic at the network or transport layer, which the firewall can block or allow?
Program
Action
Scope
Protocol and Ports
What does a firewall protect your company against?
Network intrusion attempts, such as a denial of service attack
Physical intrusion attempts, such as a broken front door
Personnel intrusion attempts, such as social engineering
Natural acts, such as an electrical surge caused by a lightning strike
Server virtualization in Windows Server 2012 R2 is based on a module called the _________.
Virtual architecture
Hyper-v
Hypervisor
Virtual machine
How many virtual machines can you install with a single Windows Server 2012 R2 Standard license?
2
3
4
5
What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?
Inheritance
Special identity linking
Permission granting
Security filtering
During the Windows Server 2012 R2 installation, what account creation prompts you for the password?
User Accounts Control Panel
Local Users and Groups snap-in
Administrator
Guest
When the Hyper-V role is added to a Windows Server 2012 R2 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer’s hardware via the hypervisor. What are those individual environments called?
Servers
Partitions
Processors
Machines
What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?
Active Directory Users and Computers
Windows Firewall With Advanced Security snap-in for the Microsoft Management console
Windows Firewall with Advanced Settings in the Server Manager Tools menu
Run > Windows Firewall
What is the least expensive way an administrator can experiment with Hyper-V and virtualization?
Purchase the Standard edition of Windows Server 2012 R2, which includes the Hyper-V role.
Purchase the Essentials edition of Windows Server 2012 R2, which includes the Hyper-V role.
Purchase the Datacenter edition of Windows Server 2012 R2, which includes the Hyper-V role
Download Hyper-V Server for free from the Microsoft website
The amount of memory that you want to allocate to the VM when it starts is called ______.
Startup RAM
Minimum RAM
Memory weight
Memory buffer
Hyper-V in Windows Server 2012 R2 is a Type I virtualization architecture. What is the fundamental difference between Hyper-V and older, Type II virtualization architectures?
Hyper-V creates environments called partitions, each with its own operating system installed.
Its hypervisor designates the first partition as the parent partition and all subsequent partitions as child partitions.
Its hypervisor is an abstraction layer and interacts directly with computer hardware, rather than as a host OS application.
Computer subsystems such as Plug and Play and power management are managed by Hyper-V’s parent partition.
Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?
You can delegate to administrators the task of performing the same configuration to their local servers.
You can create a new Group Policy Object and create matching rules to match the desired configuration. Then deploy the GPO to other systems on the network.
You can visit individual systems and configure them as you have the initial system.
You can create a new Group Policy Object and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.
What types of operating systems are allowable as virtual machine?
Windows Server 2012 R2, for as many instances allowed by licensing
Windows Server 2012 R2 and recent down-level servers such as Windows Server 2008 and Windows Server 2008 R2
Windows operating systems in general
Several Microsoft and non-Microsoft OSs such as CentOS 6.0-6.2, Red Hat Enterprise Linux 6.0-6.2, SuSE Linux Enterprise Server 11 SP2
When does Windows apply Computer Configuration policies by default?
As the user logs in
When the computer shuts down
As the user logs out
When the computer starts up
Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?
Inbound—permit all. Outbound—block all
Inbound—block all. Outbound—block all
Inbound—block all. Outbound—permit all
Inbound—permit all. Outbound—permit all
What do you call the process that after you link a GPO to a site with multiple domains, the Group Policy settings are applied to all the domains and the child objects beneath them?
Inheritance
Linking
Downward application
Relevance
When does Windows apply User Configuration policies by default?
As the user logs in
When the computer shuts down
As the user logs out
When the computer starts up
What is the typical incoming port number for a web server?
53
25
118
80
What parameter in the Windows Firewall New Inbound Rule Wizard specifies whether the rule applies to all programs, to one specific program, or to a specific service?
Program
Action
Scope
Protocol and Ports
{"name":"Servers - Quiz 8", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is Resource Metering?, What is the primary graphical tool for creating and managing virtual machines?, Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Math Challenge Quiz
12630
Do you have any recommendations in new papers today?
100
FORMATTING PART 2
1165
2020 ISO Quiz
14713
Healthy food habbits
1050
Sacred Money Archetypes
840
Sociálně-právní problematika
840
Which 1D Member Are You?
10517
ELA Notebook Quiz
5234
The Yard Training Refresher
6323
¿Cuanto me conoces?
1050
EAG 2018/2019 PRACTICE QUIZ 2
158127