98-365 : Windows Server Administration Fundamentals : Part 16

  1. HOTSPOT

    You restart the Windows Server 2016 server for your computer lab.

    After the restart, a workstation cannot connect to any local network resource. Other workstations in the lab can connect to local network resources, but cannot browse the Internet.

    The Services console on the server is shown in the following image:

    98-365 Part 16 Q01 039
    98-365 Part 16 Q01 039

    Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

    98-365 Part 16 Q01 040 Question
    98-365 Part 16 Q01 040 Question
    98-365 Part 16 Q01 040 Answer
    98-365 Part 16 Q01 040 Answer
  2. The owner of Fourth Coffee wants to add a new computer to the company network. The owner configures the Host IP Address for the computer but still cannot connect to the network.

    Which component should the owner use to connect to the network?

    • DNS Server
    • DHCP address
    • Subnet mask
    • Domain name

    Explanation:

    The second item the subnet mask is missing here. It is required for TCP/IP to work.

  3. Which two files are executed so that a Windows Server 2016 server boots into the operating system? (Choose two.)

    • winload.exe
    • ntldr.exe
    • bootmgr.exe
    • boot.ini
    Explanation:
    A: The Windows Boot Manager invokes winload.exe—the operating system boot loader—to load the operating system kernel executive (ntoskrnl.exe) and core device drivers. In that respect, winload.exe is functionally equivalent to the operating system loader function of NTLDR in prior versions of Windows NT.

    C: Windows Vista and later operating systems replaced the NTLDR with the Windows Boot Manager (BOOTMGR). The BOOTMGR file is located in the 100 MB system partition automatically created during the Window 10 and Server 2016 installation.

    Incorrect Answers:
    B, D: In legacy operating systems the boot sector (boot strap loader) loads the NTLDR that would then look for the BOOT.INI.

  4. You maintain backup schedules for a Windows Server 2016 server. Some users store vital information on their local hard drives.

    You need to include the users’ data when you perform nightly backups of the server.

    Which built-in process should you use?

    • Agent backup
    • Folder redirection
    • Local backup schedules
    • System state data backup
    Explanation:
    Use folder redirection to store the vital information on a network share instead. Then it will be easy to backup this data.

    Note: Folder Redirection lets administrators redirect the path of a folder to a new location. The location can be a folder on the local computer or a directory on a network file share. Users can work with documents on a server as if the documents were based on a local drive.

  5. This question requires that you evaluate the underlined text to determine if it is correct.

    You need to troubleshoot network environment problems. First, you define the issues that are most likely causing the symptoms. Then you eliminate each issue until the symptoms disappear.

    This approach is referred to as “performance” troubleshooting.

    Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

    • Systematic
    • Specific
    • Trial and error
    • No change is needed
    Explanation:
    The ability to troubleshoot effectively reduces downtime and increases safety.

    A Systematic approach brings efficiencies to the process of troubleshooting.

    Preparation
    Step 1: Observe Behavior
    Step 2: Define Problem Area
    Step 3: Identify Possible causes
    Step 4: Determine Most Probable cause
    Step 5: Test and Repair
    Follow-up

  6. This question requires that you evaluate the underlined text to determine if it is correct.

    “Windows Deployment Services (WDS)” allows you to automate the installation of Windows Server 2016 on several servers.

    Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

    • Microsoft Software Installer (MSI)
    • Unattendinstall.exe
    • Windows Installer Service
    • No change is needed
    Explanation:
    Windows Deployment Services (WDS) enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.

    Benefits of Windows Deployment Services include:

  7. You need to restart the print spooler on a Windows Server 2016 server. Which tool should you use?

    • Devices and Printers
    • The Device Manager
    • Printer Properties
    • The Services console
    Explanation:
    You can restart a service from the Services applet (available in Administrative Tools).
  8. A disaster recovery plan should contain data, hardware, and software that are critical for a business.

    Which of the following are disaster recovery planning steps? Each correct answer represents a complete solution. Choose all that apply.

    • Prioritize business processes
    • Monitor the plan
    • Identify alternate sites
    • Identify and assess the risks
    Explanation:
    A disaster recovery plan should contain data, hardware, and software that are critical for a business. It should also include plans for a sudden loss, such as a hard disc crash. When putting together a disaster recovery plan, an organization should follow these steps:

    1. Identify and assess the risks.
    2. Prioritize business processes.
    3. Prioritize technology services.
    4. Define recovery strategies.
    5. Secure facilities.
    6. Identify alternate sites.
    7. Use redundancy and failover.
    8. Document the plan.
    9. est the plan.
    10. Update the recovery plan.

  9. You are working on a Windows 2016 environment.

    You find that some applications are not responding while creating a project. You want to terminate these applications anyhow and start a new session.

    What will you do to accomplish the task?

    • Use Device Manager.
    • Use Network Monitor.
    • Use System Monitor.
    • Use Task Manager.
    Explanation:
    In order to accomplish the task, you should use Task Manager. A task manager is a program used to provide information about the processes and programs running on a computer, as well as the general status of the computer. It can also be used to terminate processes and programs, as well as change the processes priority. The task manager is most commonly accessed by pressing the buttons Control-Alt-Delete. Task manager also displays all the services that are currently running as well as those that were stopped. All information’s about the services such as Process ID and their group if they are applicable.

    Incorrect Answers:
    A: Device Manager is a tool that can be used to manage devices on a computer. Using Device Manager, users can view and change device properties, update device drivers, configure device settings, and uninstall devices. Device Manager is organized in a tree format with the top branches representing device categories. Users can use Device Manager to identify port resource conflicts. Device Manager can also be used to enable or disable a device.

    B: Network Monitor is a tool used to monitor data sent and received by the local computer.
    Network Monitor can perform the following functions:
    – Capturing or tracing data and filtering it based on different attributes.
    – Monitoring throughput based on bytes or frames.
    – Monitoring bandwidth based on percentage of the network used.
    – Monitoring errors, which can be a possible consequence of an overloaded network.

    C: System Monitor is a Windows utility that enables users to monitor server activity and performance using predefined objects and counters or user-defined counters. It tracks items such as, I/O, memory usage, user connections, and locks. Although it can monitor the number of locks held, it cannot be used to capture information on particular locks and activities.

  10. You work as a Server Administrator for company Inc. The company has its main branch in London and two sub-branches in Tokyo and Paris. The company has 1,500 clients and a number of servers that run Windows Server 2016.

    You need to distribute workload across the cluster nodes for supporting a larger number of simultaneous clients.

    What will you do to accomplish the task?

    • Deploy Windows AIK.
    • Use Network Load Balancing.
    • Implement NIC teaming.
    • Create a failover cluster.
    Explanation:
    In order to accomplish the task, you should use Network Load Balancing. Network Load Balancing (NLB) is a clustering technology offered by Microsoft.
    In order to scale performance, it uses a distributed algorithm to load balance network traffic across multiple hosts. It also ensures high availability by detecting host failures and automatically redistributes traffic to operational hosts.

    Incorrect Answers:
    A: The Windows Automated Installation Kit (Windows AIK) is a set of tools and documentation provided with Windows operating system.
    It supports the configuration and deployment of Windows operating systems.
    Administrators can use Windows AIK for automating Windows installations, capturing Windows images with ImageX, configuring and modifying images, creating Windows PE images, and migrating user profiles and data. Windows AIK includes various Windows tools such as Volume Activation Management Tool (VAMT), Users State Migration Tools (USMT), etc.

    C: NIC teaming is used to group two or more physical NICs into a single logical NIC. It is used to make a network fault tolerant.
    Incorrect Answers:

    D: Failover clusters are a group of two or more severs that share a common set of resources. This ensures data integrity and high availability.
    It has two types of nodes: the active node and the passive node. The active node provides service to incoming connections. The passive node provides service when an active node moves offline.

  11. You work as a Server Administrator for company Inc. The company has a Windows Server 2016 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. A single domain controller is configured on the network.

    Some employees reported that they failed to log on to the domain controller. You want to know IP addresses and other details of the accounts of the employees.

    Which of the following utilities will you use to accomplish the task?

    • Server Manager
    • Resource Monitor
    • Event Viewer
    • Performance Monitor
    Explanation:
    In order to accomplish the task, you should use Event Viewer.
    By using Event Viewer, you can check for the failed logon attempts on the domain controller. It provides IP addresses and other details for the employees who are failed to log on to the domain controller.
  12. Which of the following tasks can you perform without requiring administrative permissions or rights when you log in as a standard user in Windows Server 2016? Each correct answer represents a complete solution. Choose all that apply.

    • Change Windows settings.
    • Connect Bluetooth devices to the computer.
    • Install updates from Windows Update.
    • Reset the network adapter and perform network diagnostic and repair tasks.
    Explanation:
    A user can perform the following tasks without requiring administrative permissions or rights when he logs in as a standard user in Windows Server 2016:

    – Install updates from Windows Update.
    – Install drivers from Windows Update.
    – View Windows settings.
    – Connect Bluetooth devices to the computer.
    – Reset the network adapter and perform network diagnostic and repair tasks.

    Incorrect Answers:
    A: You cannot change Windows settings when you log in as a standard user. To make changes in Windows settings, you have to log in as an administrator.

  13. Disaster recovery is the process of resuming normal business operations as quickly as possible after the disaster is over. What does the disaster recovery process include? Each correct answer represents a complete solution. Choose all that apply.

    • Testing all hardware and software before resuming operations
    • Restoring data
    • Encrypting data
    • Executing a written disaster recovery plan
    • Replacing any damaged hardware
    Explanation:
    Disaster recovery can be defined as the process of restoring systems and data if there is partial or complete failure of computers due to technical or other causes. Disaster recovery is the process of resuming normal business operations as quickly as possible, after the disaster is over. The disaster recovery process includes the following:

    – To execute a written disaster recovery plan.
    – To replace any damaged hardware.
    – To restore data.
    – To test all hardware and software before resuming operations.

    Incorrect Answers:
    C: The disaster recovery process does not include encryption of data.

  14. You work as a Network Administrator for NetTech Inc. A server in the network is unable to load the network operating system.

    You find that a POST error has occurred. You want to use a POST diagnostic hardware adapter to diagnose the error.

    How will you use it?

    • Insert the card into an open bus slot. Boot the computer. The error codes will display on the adapter.
    • Connect the card to a serial port. Boot the computer. The error codes will be stored in a memory buffer created by the card.
    • Insert the card into an open bus slot. Boot the computer. The error codes will print.
    • Insert the card into an open bus slot. Boot the computer using the floppy disk provided by the card manufacturer. The error codes will be stored on a floppy disk.
    Explanation:
    POST diagnostic hardware cards display error codes on the adapters.

    Incorrect Answers:
    B, C, D: Post does not store error codes on a floppy disk or on memory. It also does not print error codes.

  15. You are troubleshooting a system working on Windows Server 2016.

    You need to create the ntbtlog.txt file in order to list all the drivers that are installed during startup.

    Which of the following booting options will you choose to accomplish the task?

    • Safe Mode
    • Repair Your Computer
    • Directory Services Restore Mode
    • Enable Boot Logging
    Explanation:
    In order to accomplish the task, you should choose the Enable Boot Logging option.
    It is used to create the ntbtlog.txt file in order to list all the drivers that are installed during startup.

    Incorrect Answers:
    A: Safe Mode is used to start Windows with a minimal set of drivers and services.
    B: The Repair Your Computer option is used to display a list of system recovery tools that can be used to repair startup problems, run diagnostics, and restore the system.
    C: Directory Services Restore Mode is used to start Windows domain controller running Active Directory so that the directory service can be restored.

  16. Which of the following will you use to diagnose and recover from serious errors that may prevent Windows Server 2016 operating systems from booting successfully?

    • Windows RE
    • Windows DS
    • Windows AIK
    • Windows SIM
    Explanation:
    Windows Recovery Environment (WinRE) is a recovery environment that can repair common causes of unbootable operating systems. WinRE is based on Windows Preinstallation Environment (Windows PE), and can be customized with additional drivers, languages, Windows PE Optional Components, and other troubleshooting and diagnostic tools. By default, WinRE is preloaded into the Windows 10 for desktop editions (Home, Pro, Enterprise, and Education) and Windows Server 2016 installations.

    Incorrect Answers:
    B: Windows Deployment Services (Windows DS) is a new and redesigned Windows Server version of Remote Installation Services (RIS). Windows DS is used to install operating systems to set up new computers through a network without having to be physically present at each computer and without having to install directly from a CD or DVD. Windows DS is commonly used to deploy Windows operating systems in large to medium size business environment computers.

    C: The Windows Automated Installation Kit (Windows AIK) is a set of tools and documentation provided with Windows operating system. It supports the configuration and deployment of Windows operating systems. Administrators can use Windows AIK for automating Windows installations, capturing Windows images with ImageX, configuring and modifying images, creating Windows PE images, and migrating user profiles and data. Windows AIK includes various Windows tools such as Volume Activation Management Tool (VAMT), Users State Migration Tools (USMT), etc.

    D: Windows System Image Manager (Windows SIM) is a Windows tool that is used to create answer files (unattended.xml) and network shares. It is also used to modify files available in a configuration set. This answer file is then transferred to the master computer, which is used for creating the installation image.

  17. Which of the following is described in the following statement:

    “It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned.”

    • POST
    • BIOS
    • SBR
    • MBR
    Explanation:
    The Master Boot Sector (MBR) is a 512-byte long boot sector that is the first sector of a default boot drive.
    It is also known as Volume Boot Sector, if the boot drive is un-partitioned.
    When the MBR is found, the program is tested and loaded to ensure that the last two bytes are h55AA.
    The actual program is only 444 bytes long. The structure of the MBR is as follows:
    98-365 Part 16 Q17 041
    98-365 Part 16 Q17 041

    Incorrect Answers:
    A: Power On Self Test (POST) is a small program stored in a Read Only Memory (ROM) Basic Input Output System (BIOS) of a computer system starting at address hf000.
    This program tests the basic motherboard functions such as power supply, memory, buses, interfaces, etc. and reports any error with audio beep codes. It also sends diagnostic code to internal port h80 if an error occurs.

    B: Basic Input/Output System (BIOS) is software that manages hardware and enables the operating system to communicate with the computer’s hardware components.
    The BIOS software is built-in on a ROM chip, known as Complementary Metal Oxide Semiconductor (CMOS) chip, on the motherboard.

    C: This is not a valid option.

  18. You work as a Server Administrator for company Inc. The company has a Windows-based network environment.

    You need to make a balance between accessibility, security, and cost while planning for backup.

    Which of the following management methods will allow you to switch to the backup site while repairing the primary site?

    • Near-line
    • Backup site
    • Off-line
    • On-line
    Explanation:
    You should use the backup site management method.
    This method allows you to switch to the backup site while repairing the primary site. It is a very expensive solution and it is difficult to implement this solution properly.

    Incorrect Answers:
    A: The near-line method is less accessible and less expensive than the on- line method. It is used to include a tape library with restore times ranging from seconds to a few minutes.
    C: The off-line method requires some direct human action to manually load tapes into a tape library or drive. Access time can vary from minutes to hours or days.
    D: The on-line method is the most accessible type of data storage in which hard disks or disk arrays are used. In this method, restore begins in milliseconds.

  19. Which of the following hardware devices will you connect to the server in order to resist power outages or power fluctuations?

    • Hard disk
    • UPS
    • VHD
    • RAM
    Explanation:
    In order to resist power outages or power fluctuations, you should connect UPS (Uninterruptible Power Supply) to the server.
    UPS (Uninterruptible Power Supply) devices employ a large battery to provide power to a system in the event of a power outage. The amount of time it can continue to supply power to the system depends upon the size of the battery, and the power consumption. UPS is built into the system between the reader and the external power source. The reader is susceptible to power spikes (caused due to lightning strikes or generator variations). UPS keeps the readers running in case of a power failure and also protects them against unexpected power spikes. The UPS helps in keeping data, which may be in the random access memory (RAM) and not yet pushed up to the application, from being lost and the configuration is not wiped out.

    Incorrect Answers:
    A: A hard disk drive is a non-volatile storage device that stores digitally encoded data on rapidly rotating rigid platters with magnetic surfaces.

    C: Virtual Hard Disk (VHD) is a file with a .vhd extension. This file acts as a separate hard disk. In the Windows 10 or Windows Server 2016 operating system, Virtual hard disks can be created and used on computers that are not virtual machines.

    D: Random Access Memory (RAM) is a chip that comes embedded within a computer. It is loaded by an operating system while starting the computer and it also copies an application to be run on the computer, such as a word processor or database program. Whenever a new program is created by a user, the program is temporarily held by RAM and copied to the disk to save the data permanently.

  20. You are working on Windows Server 2016. You want to specify the default entry that the boot manager selects when the timeout expires.

    Which of the following commands will you use to accomplish the task?

    • /bootsequence
    • /default
    • /copy
    • /displayorder
    Explanation:
    In order to accomplish the task, you should use the BCDEdit/default command.
    This command specifies the default entry that the boot manager selects when the timeout expires.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments