Server Management Part 8

Is this your test? Login to manage it. If not, you can build a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which one of the following roles enables the creation and management of an Active Directory database?
2.
1 point
Which one of the following terms describes the virtualization software component that creates and monitors the virtual hardware environment?
3.
1 point
Under what circumstances would the use of a read only domain controller (RODC) be ideal?
4.
1 point
When you copy a folder from an NTFS volume to a different NTFS volume, the resultant folder _______________.
5.
1 point
RAID-5 volumes can only be created with minimum ______ disk(s).
6.
1 point
You are a consultant given the responsibility to deploy a cloud infrastructure for a hosting company. The CIO would like you to install several Windows Server 2012 R2 Hyper-V hosts. The server will host services for 100 companies. Which edition of Windows Server 2012 R2 would you recommend?
7.
1 point
Which one of the following user account is NOT valid?
8.
1 point
Which one of the following settings has the highest precedence when assigning share permissions to a Windows folder?
9.
1 point
Which of the following local storage has no moving parts, requires less power, is faster and more resistant to shock?
10.
1 point
The DirectAccess service is installed when the __________ server role is added to a Windows Server 2012 R2 installation.
11.
1 point
A(n) ____ backup only backs up files that are new or that have been updated.
12.
1 point
The Computer Advisory Committee in your company has been concerned that users store many files on the servers, but are not good about deleting old files. This has resulted in less free space on the servers' disks. What solution do you propose?
13.
1 point
The IT Manager is trying to create a universal security group for the three administrators of the single standalone server in his company. The problem is that he cannot find the option to create a universal security group. What is the problem?
14.
1 point
Which of the following permissions is used to control the specific level of access that users will have to the files and folders across the network?
15.
1 point
Which one of the following options displays the part of the IP address that identifies the network if the IP address 172.16.20.172 has the subnet mask 255.255.0.0?