What is the advantage of using production checkpoints over standard checkpoints quizlet?

Recommended textbook solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (77)

Malaika uses the Edge browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entities is the server?

The responding computer

Candace works as a system administrator at Capnia Systems, a product company with over 250 employees. She receives an email from her boss that says that one of the servers is running slow. The server is running the Standard Edition of Windows Server 2019, and the hardware includes HDDs and SSDs. Upon investigation, she finds that some frequently accessed files are being stored on HDDs, while other smaller and infrequently used files are stored on SSDs. Which feature should Candace enable to improve the efficiency of the server?

Storage tiering

Chen is a freelance web developer who uses a Windows 10 computer. When she needs to test her web application on a different operating system, she sends it to her friend who has other operating systems installed on multiple devices. This is a time-consuming process. She's looking for a way to test the web application across different operating systems on her own computer. Which of the following features should she use?

Virtualization

Eileen is a Web app developer. All the apps that Eileen builds run in Linux containers on the cloud. She currently uses a Windows 7 operating system. She would like to test Linux applications on her workstation. Why should Eileen consider upgrading to Windows 10?

Windows 10 has Windows Subsystem for Linux

Identify the true statement about Type 2 hypervisors.

They can run multiple operating systems on a single host.

Linwood is the IT manager of a small organization, Turtle Designs, with less than 50 employees. Caroline, his boss, asks him to set up a computer that will act as the central repository for the company's data. Linwood estimates the costs and suggests using an Internet-based service instead. What is Linwood recommending in this scenario?

A cloud-based server

Mahmood works as a full stack web developer at Insignia Informatics. As one of the senior developers, Mahmood is often tasked with testing web applications built by his team. Often, he finds himself testing multiple web applications simultaneously over a short period. Mahmood uses a separate virtual machine to run each application in isolation. This often causes a resource crunch because each virtual machine uses large amounts of system resources, and Mahmood cannot be as productive as he wants to be. What would you advise Mahmood?

Run these web applications in containers

Raymond is a system administrator at Kelly Consulting. He's trying to automate some security features using Windows Server. One of the tasks he's trying to accomplish is automatically blocking any Outlook rules that are set to forward emails. Particularly, he's attempting to write a script that blocks any rules that automatically forward emails to external parties. Which of the following tools would be most effective in completing this task?

Windows PowerShell

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server?

The server will be dedicated to web services and accessed via the Internet.

T/F. Storage pinning is the process of planning hardware for a specific server within an organization.

TRUE

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found?

Windows Server Catalog

You are in the process of installing Windows Server 2019 Standard Edition on your computer. You have downloaded the corresponding ISO file and burned it to a DVD. Which of the following steps should you take next?

Change the boot order in the BIOS.

You are experiencing problems during the installation of Windows Server 2019. More specifically, critical file extensions have lost their associated program data. You need torestore the settings from a Registry backup. Where will the settings be found?

HKEY_CLASSES_ROOT

Ivan is the IT administrator at Alphina Systems. He wants to be able to plug and unplug external disk drives without using the Safely Remove Hardware option.

What should Ivan do?

Disable file caching and flushing

What is the use of adding tags to servers in the Windows Admin Center?

Tags help identify servers and can be searched using the Search dialog box.

What is the term for programs and system software that can query WMI?

WMI consumers

Haruko is a system administrator. He is configuring Windows Server 2019 on SERVERX and adding multiple servers to Server Manager so that he can manage all the servers from the same console. He is trying to add SERVERY, a file server. Despite his efforts, he is unable to add this server to Server Manager. Which of the following is a likely reason that he is unable to add SERVERY to the console?

SERVERY is part of a workgroup, but the workgroup server is not on the trusted hosts list.

Hiroshi is the system administrator at an organization that has offices spread across three locations, Boston, London, and Paris. The organization has an Active Directory domain, domainA.com, with two domain controllers in each location for the marketing business unit. The company expanded recently and added over 3000 new users across these locations. Hiroshi notices that this surge in users is causing Internet congestion because of the Active Directory replication.

What is a cost-efective method of dealing with this issue?

Hiroshi should create site objects and specify timed intervals for replicationusing site link objects.

A user, Petra.T, is trying to access their system while the global catalog server for the domain is offline. What is the most likely outcome?

Petra.T will be allowed to log in to the system with cached credentials.

Censu Technologies wants to enforce a strict timings policy such that users are able to log into their systems only during specific time slots on weekdays. The company also wants to restrict access on weekends. Glenna, a system administrator at Censu, is tasked with enforcing this change. What tab under a user object's properties will allow Glenna to make this change?

Account

Which of the following statements regarding a domain functional level is accurate?

It represents the oldest Windows Server version that can be used as a domain controller.

Which of the following statements about directory partitions is true?

Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.

T/F. The System File Checker is useful in recovering system files that have been corrupted.

True

Felipe requests the system administrator, Lucida, to change the font settings on a shared desktop system. Felipe wants a larger font size when he logs onto this computer but doesn't want it to affect other users.

Which Registry root key should Lucida access to change the font size?

HKEY_CURRENT_USER

Shae is using a Windows Server 2019 operating system. She recently spilled hot chocolate on her keyboard, which damaged the keyboard. She purchased a new keyboard and connected it to her computer. She assumed that she would have to download a driver to use the keyboard. To her surprise, she was able to use the keyboard without any further action from her side.

Which of the following features allowed Shae to start using the keyboard straightaway?

Plug and Play (PnP)

Ahmad, a system administrator in an organization, is setting up new Active Directory domains for the Marketing and Sales teams in the organization. He is setting up Active Directory domains on Windows 2019 Server to reflect the organizational structure.What is the minimum number of domain controllers that Ahmad should add to the Marketing domain?

Two

What is the term for domain and forest functions that must be coordinated from a single domain controller?

Flexible Single Master Operations (FSMO)

Kettle Inc. from Florida merges with Blue Clu Networks from Minneapolis. Minisha, a system administrator, is granted the responsibility of configuring Active Directory across both locations to enable users from both locations to access common resources. If Minisha is able to accomplish this task successfully, which of the following must be true?

Minisha is a member of the Enterprise Admins group in both organizations.

T/F. Azure Active Directory can be configured to trust an organization's Active Directory forest, or mirror it using a synchronization service.

True

T/F. By default, the only site created within a new forest does not contain any domain controller.

False

Emmitt, an IT administrator, is on a holiday when he receives a message from his boss about an issue with one of the servers running Windows Server 2019. Fortunately, Emmitt is carrying his laptop that is running a Windows 7 operating system. Remote control of the server (RDP) is blocked. Emmitt accesses the server remotely and resolves the issue. Which of the following tools did Emmitt most likely use natively to access the server?

Windows Admin Center

Which feature of Windows Server 2019 is designed to foil malware by preventing programs from using system memory space?

Data Execution Prevention

What are the three main container objects within an Active Directory database.

OUs, Sites, and domains

When using the Best Practices Analyzer (BPA) to verify server roles, what severity level indicates the role does not meet best practices and problems can be expected?

Error

Which of the following organizations should consider using Azure Active Directory?

An organization that subscribes to Office 365 services

Alfons recently received a promotion to lead a team of 35 software engineers, testers, and business analysts. When he needs to send an email or meeting invite to his team, he realizes that he must type out the email IDs for all his team members. He approaches Priyanka from the IT team to help him make this process easier and more efficient. Which of the following features of Active Directory can Priyanka use to provide asolution?

Distribution groups

Asmara, a system administrator, is performing routine maintenance checks on the Windows servers in her organization. As part of these checks, she is required to verify that drivers and system files on each server are not corrupted. Which of the following commands should Asmara run?

sfc/scannow

What happens if an encrypted file in an NTFS partition on a Windows 10 system is moved to a FAT32 partition on a Windows 7 system?

The file is decrypted and placed onto the FAT32 volume.

T/F. Access to shared folder on the network will use the most restrictive permissions, regardless of whether they are NTFS or share permissions

TRU (Calling!)

Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder?

Edit the Default Domain Policy object to enable auditing functionality

Which service is a faster replacement for the Windows Indexing Service that is available on Windows Server 2019?

The Windows Search Service

Which of the following statements is true of the ownership of a file or folder?

An administrator can take ownership of a file or folder without being granted the permission to do so.

T/F. The subnet masket connot be modified once a scope is created.

True

Danielle creates a new scope, Sales LAN, for a DHCP server in her organization. She wants to assign the same IP address to a printer in the sales department every time. Which of the following folders should Danielle use to configure this option?

Reservations

What resource record type defines an IPv6 host address in DNS?

AAAA Record

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue?

The DNS server and DHCP server are in different domains.

What is the first step in troubleshooting an issue where a single computer is unable to lease an address?

Confirming that the computer has physical connection to the network.

Which of the following options provided by Windows Server 2019 helps configure folders that are on different servers to synchronize contents?

Distributed File System (DFS) replication

Pavel is an IT project lead at Krystal Engineering. Because of his role, he is part of multiple groups, including the Developer group as well as the Project Manager group. One of the files that he is trying to access, PLStatus.xsl, is not opening. Upon investigation, you find that Pavel's user account has Full control permission over the file. The Project Manager group has Modify access but not Full control. The Developer group has Write access but no Read access. What is the most likely reason that Pavel is not able to open the file?

Another group has the Deny box checked for Read access.

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume?

The folder inherits the share permissions but loses the NTFS permissions

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. Identify the most likely cause for this issue.

Natalie did not enable the archive attribute on the folder.

Raymond and Lin are facing network issues on their computers. Rayna, the administrator, is troubleshooting the issue. She notices that Raymond and Lin's computers are using the same IP address, 192.167.1.85. If the organization's network uses a DHCP server, which of the following most likely caused this issue?

The IP addresses were configured manually.

You are investigating strange traffic on your network and wish to resolve an IP address to a DNS name. What resource record should you use to perfmorm a reverse lookup?

A PTR record

Which of the following organizations does not need to install a WINS server?

An organization that has disabled NetBIOS on its computers.

Which of the following is a component that enables users to search and locate a shared folder in the Active Directory?

LDAP

Which of the following is the most likely cause for missing resource records in a secondary zone?

Zone transfer issues

Radha has changed the IP address for servery.zone1.com and updated the primary DNS server. She is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery.zone.com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

Clear the DNS Server cache, and clear the DNS cache on the resolver.

Identify a vital service provided by secondary DNS servers.

Secondary DNS servers respond to DNS lookup requests using read-only zone files.

Fayola realizes that many of her colleagues use folders on the network drive to store videos, and this consumes a lot of space on the drive. She asks the employees to delete their videos from the network drive. Which of the following steps can Fayola take to maintain a log whenever a video file is saved on the drive in the future?

Configure passive screening

What are users who only have the List folder contents permission allowed to do?

They can list files in the folder or switch to a subfolder, view folder attributes or permissions, and execute files, but cannot view file contents.

Rebecca is configuring a RAID with two storage devices. If she saves a file, the file will be divided into two sections, with each section written to separate storage devices concurrently, in half of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring?

RAID level 0

Identify the option that can be used to create storage pools that include storage devices from different servers on a network

Storage Spaces Direct

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out?

Mounting

Abu is creating a virtual machine template to enable rapid server deployment at his organization. He creates a virtual machine, installs Windows Server 2019 and names the server SERVERX. Next, he installs server roles and features and adds third-party software. He then runs the System Preparation Tool. What will this tool most likely to do?

Remove the computer name SERVERX

T/F. Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory domain.

FALSE

Catelin creates a virtual machine template named Windows Server2019VMTemplate. She wants to import this template, so she opens the Import Virtual Machine wizard in Hyper-V Manager on SERVERX and proceeds with the process. She specifies the location D:\VMS Win2019VM1 for the configuration files and virtual hard disks. When Catelin clicks Finish during the last step and the virtual machine is created, what name will it have?

WindowsServer2019VMTemplate

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E: VMS. Where will the virtual machine configuration files be stored?

E:\VMs\Virtual Machines

Miguel is using the New Virtual Machine Wizard to create a new virtual machine for the first time. Which of the following statements is true if Mugel creates a virtual machine with default settings?

The virtual machine will have 1 GB of memory.

Isabella configures three virtual machines, VMI, VM2. and VM3. on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database. Where should Isabella place the database?

On VM2

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completing, he is prompted to reboot the computer. However, his computer reboots twice. Why does Dmitry's computer reboot the second time?

To allow Hyper-V to start the host operating system

How do you create a RAID level 1 volume with two disks in the Disk Management tool?

Right-click on the disk that you want to configure as a RAID volume and thenclick New Mirrored Volume to create a RAID level 1 volume with two disks

T/F. To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-Vhost of the virtual machine that is being replicated.

FALSE. To replicate a virtual machine, the target Hyper-V host must have replication enabled.

Andrei enabled the Live Migration feature of Hyper-V during its installation. He selects a virtual machine called VM1 within Hyper-V Manager and clicks on Move within the Actions pane. Next, he selects "Move the virtual machine's storage." Which of the following is true of this scenario?

VM1's virtual hard disk files will be moved to the destination server.

Which type of virtual switch in Hyper-V can only have virtual machines connected to it?

Private

Devansh creates a checkpoint on his virtual machine before making some Windows Registry changes. After making these changes, he runs a test to verify that the virtual machine is working as intended. He notices some unintended effects of the Registry changes. Devansh applies the checkpoint to revert the virtual machine to its state before the Registry changes were made. Which of the following is true of this scenario?

The checkpoint file that is used to track and reverse the changes will be deleted from the system.

While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference?

NTFS is a journaling filesystem, while FAT32 is not.

What is the advantage of using production checkpoints over standard checkpoints?

Production checkpoints cause fewer problems than standard checkpoints when applied because they do not save system state.

Sets with similar terms

A+ 11-13

155 terms

juanarias1929

C.7 Practice Exam

19 terms

o0luna

Microsoft Windows 10 Chapters 6-10 Review

82 terms

mbeastley15

Sets found in the same folder

Servers Cha 3

42 terms

maxholmes16

Network Essentials Module 02

26 terms

EasilyAngeredElf

Server 1 and 2

26 terms

thebuck4

Server 3 and 4

26 terms

thebuck4

Other sets by this creator

Cryptography

110 terms

matthew_gilliland41

Legal Issues

64 terms

matthew_gilliland41

Security Administration and Planning

91 terms

matthew_gilliland41

Security Operations

102 terms

matthew_gilliland41

Verified questions

COMPUTER SCIENCE

What is an optimal Huffman code for the following set of frequencies, based on the first 8 Fibonacci numbers? a: 1 b: 1 c: 2 d: 3 e: 5 f: 8 g: 13 h: 21

Verified answer

COMPUTER SCIENCE

Environmental engineers are trying to determine whether the underground aquifers in a region are being drained by a new spring water company in the area. Well depth data has been collected every year at several locations in the area. Create a data file that stores on each line the year, an alphanumeric code representing the location, and the measured well depth that year. Write a script that will read the data from the file and determine whether or not the average well depth has been lowered.

Verified answer

COMPUTER SCIENCE

Formal and actual parameters are matched up by a) name b) position c) id d) interests

Verified answer

COMPUTER SCIENCE

The ______ function returns true if the character argument is a letter of the alphabet.

Verified answer

Recommended textbook solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the advantage of using production checkpoints over standard checkpoints quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

civics ch. 13

44 terms

Andrea_Convit

religion 11: reconciliation test

31 terms

amac124

HGAP Unit 1 Review

65 terms

joe_xu7

Elbow, Forearm, Wrist

62 terms

Kel_oconnorPLUS

Related questions

QUESTION

Jane suspects a bad RAM stick is causing Windows to fail to boot. What default Windows tool can she use to check the RAM?

3 answers

QUESTION

Which Windows command displays a list of files and subdirectories in a directory?

15 answers

QUESTION

MiniDP ports are an audiovisual port typically used to connect large monitors.

15 answers

QUESTION

which type of memory is very fast and is located close to the processor?

15 answers

What is the advantage of using production checkpoints over standard checkpoints?

One benefit for Production checkpoints is that they are smaller for running virtual machines than Standard checkpoints. Production virtual machines do not need a memory state, so they do not save a copy of it.

What does a production Checkpoint use to make a better backup?

A production checkpoint uses backup technologies or tools, such as Volume Shadow Copy Service, to create a data-consistent VM image that admins can restore later and continue normal operation with no loss of data.

What is the advantage of using Hyper

One of the biggest advantages of using Hyper-V containers is the extra isolation. If you need to secure a critical production application, then you can use a container in a VM instead of just a VM to be safe. There are a couple of cases where you might require this level of isolation.

Which of the following is a system memory architecture used in multiprocessor systems that allow processors to access memory more efficiently?

Cache only memory architecture (COMA) is a computer memory organization for use in multiprocessors in which the local memories (typically DRAM) at each node are used as cache. This is in contrast to using the local memories as actual main memory, as in NUMA organizations.