What is used to keep track of what a user does on a system?
B
Explanation:
Security can be divided into three areas:
Authentication is used to prove the identity of a user.
Authorization gives access to the user that was authenticated.
To complete the security picture, you need to enable auditing so that you can have a record of the users who have logged
in and what the user accessed or tried to access.
What must you install in order to host a Web site on a Windows Server?
D
Your relative is the owner of Humongous Insurance, and you provide part time IT support for the company's Windows
desktops and servers. All of its computers are on a private network behind a firewall.
Because you are going away to college, you need a secure method to manage the servers and desktops.
Which two Windows Server 2016 features should you use? (Choose two.)
A C
Explanation:
You can set VPN Server or Remote Desktop to securely access the network remotely.
You work as a Server Administrator for company Inc. The company has a Windows Server 2016 based network
environment. There are thirty client computers running Windows 10 and three servers running Windows Server 2016.
You need to implement a system in the network that provides data access to heterogeneous network clients using
SMB/CIFS.
Which of the following will you use?
D
Explanation:
You should use Network-attached storage (NAS).
Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access
to heterogeneous network clients. NAS systems contain one or more hard disks, often arranged into logical, redundant
storage containers or RAID arrays.
It removes the responsibility of file serving from other servers on the network. NAS uses file-based protocols, such as NFS,
SMB/CIFS, or AFP.
NAS units rarely limit clients to a single protocol.
Incorrect Answers:
A: Storage Area Networks are a specialized RAID array that can be accessed by multiple servers over a specialized network
connection. A host bus adapter is required on servers that use the Storage Area Networks. The Storage Area Networks
administrator partitions the available storage into logical unit numbers and assigns them to the servers. The disk volume
shown in Disk manager is logical unit numbers. SAN use block-level protocols such as iSCSI or Fiber Channel. They do not
use SMB or CIFS.
B: Failover clustering is a technique used in the Windows Server 2016 environment to provide high availability of
applications.
C: Datafile striping, also referred to as striping, is a technique used to enhance the I/O of datafiles. In this technique, a large
datafile is split into smaller datafiles and the latter are then stored on separate disks. Hence, striping allows quicker I/Os by
reading or writing through multiple read-write heads of the disks (which store the datafiles that have been split) operating in
parallel. This technique is of great help in parallel processing where throughput is of prime concern.
What does L2TP use to encrypt data?
C
Which of the following is an application protocol for querying and modifying data using directory services running over
TCP/IP?
D
Explanation:
The Lightweight Directory Access Protocol (LDAP) is a standard protocol, which provides access to the directory. It also
provides a common language for LDAP clients and servers to communicate with each other. The LDAP is commonly used
as standard in the industry. By using a directory service such as LDAP, information existing in multiple systems and formats
can be brought at one place. LDAP is an application protocol for querying and modifying data using directory services
running over TCP/IP.
Incorrect Answers:
A: Kerberos is a secure protocol that supports ticketing authentication. A ticket is granted in response to a client computer
authentication request by the Kerberos authentication server, if the request contains valid user credentials and a valid
Service Principal Name (SPN). The ticket is then used by the client computer to access network resources. To enable
Kerberos authentication, the client and server computers must have a trusted connection to the domain Key Distribution
Center (KDC). The task of KDC is to distribute shared secret keys to enable encryption.
B: Simple Network Management Protocol (SNMP) is a part of the TCP/IP protocol suite, which allows users to manage the
network. SNMP is used to keep track of what is being used on the network and how the object is behaving.
C: User Datagram Protocol (UDP) is often used for one-to-many communications, using broadcast or multicast IP
datagrams. Microsoft networking uses UDP for logon, browsing, and name resolution. UDP is a connectionless and
unreliable communication protocol. It does not guarantee delivery or verify sequencing for any datagram. UDP provides
faster transportation of data between TCP/IP hosts than TCP.
You need to secure a server that you have been working on without disrupting the work of other employees in your
company.
What should you do?
A
Which of the following tools will you use to quickly diagnose potential causes of instability of your system so that you can
apply updates in a targeted manner, rather than attempting a reconfiguration after the occurrence of unexpected changes in
system behavior?
D
Explanation:
You should use Windows Reliability and Performance Monitor to quickly diagnose potential causes of instability of your
system so that you can apply updates in a targeted manner, rather than attempting a reconfiguration after the occurrence of
unexpected changes in system behavior. Reliability Monitor tracks the system's reliability over time and shows events that
could potentially compromise that reliability.
Which two locations can a Windows Server be backed up to? (Choose two.)
B D
You work as a Server Administrator for company Inc. You need to make a computer running Windows Server 2016 a domain
controller. Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the
solution. (Choose two.)
A D
Explanation:
To make a computer running Windows Server 2016 a domain controller, you should take the following steps:
Install Active Directory Domain Services.
Execute the dcpromo command. In Windows Server 2016, dcpromo is executed by clicking the link to complete the Active
Directory configuration.
Incorrect Answers:
B: An MX resource record is used to specify which mail exchanger to contact for a specified domain and in what order to use
each mail host.
C: The nslookup command is used to check records, domain host aliases, domain host services, and operating system
information by querying Internet domain name servers.