Windows Server Virtualization Quiz
95 Questions
8 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum size limit for a VHDX file?

  • 64 TB (correct)
  • 128 TB
  • 16 TB
  • 2 TB

Which virtual image file format is compatible with both Hyper-V on Windows Server 2019 and older Virtual Server?

  • VHS
  • VHDX
  • DIVX
  • VHD (correct)

What type of disk allows an image size of up to 2 TB?

  • VHDX
  • VHS
  • VHD (correct)
  • DIVX

What unique benefit does a differencing disk provide to administrators?

<p>An opportunity to experiment with no changes committed to the parent image (B)</p> Signup and view all the answers

How can virtual machines (VMs) access a physical hard disk?

<p>By using a pass-through disk (A)</p> Signup and view all the answers

Which tool can be used within Server Manager to create a new virtual hard disk?

<p>Hyper-V Manager (C)</p> Signup and view all the answers

Is it possible to modify an existing virtual hard disk (VHD) file?

<p>Yes, without mounting it to a VM (C)</p> Signup and view all the answers

Which methods can be used to access SAN devices over the network?

<p>Using iSCSI (B), Using Fibre Channel (C)</p> Signup and view all the answers

What is the proper term for associating a Group Policy to a set of AD DS objects?

<p>Linking (B)</p> Signup and view all the answers

When multiple GPOs are linked to a container, which GPO in the list has the highest priority?

<p>The first (B)</p> Signup and view all the answers

Which Microsoft Management Console (MMC) snap-in is used to create GPOs and manage their deployment to AD DS objects?

<p>Group Policy Management console (D)</p> Signup and view all the answers

Can an administrator launch the Group Policy Management console from a workstation?

<p>Yes, if Remote Server Administration Tools are installed (B)</p> Signup and view all the answers

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. What are the three subnodes of these categories?

<p>Software settings, Windows settings, and Administrative Templates (B)</p> Signup and view all the answers

What do you call the process where Group Policy settings are applied to all domains and child objects after linking a GPO to a site with multiple domains?

<p>Inheritance (D)</p> Signup and view all the answers

Which application allows you to configure security filtering for Group Policies?

<p>Group Policy Management console (D)</p> Signup and view all the answers

Local GPOs do not support which of the following options?

<p>Folder redirection or Group Policy software installation (A)</p> Signup and view all the answers

What is a key difference between internal and external virtual switches?

<p>Internal switches do not allow child partition VMs to communicate together. (B)</p> Signup and view all the answers

How many virtual network adapters can be created on a Hyper-V server?

<p>Up to 12 network adapters—8 synthetic and 4 emulated. (C)</p> Signup and view all the answers

What action should an administrator take to associate a virtual network adapter with a VLAN?

<p>Select Enable virtual LAN identification and enter a VLAN identifier. (D)</p> Signup and view all the answers

Which hardware acceleration feature is not supported by virtual network adapters in Windows Server 2019?

<p>MAC address caching. (D)</p> Signup and view all the answers

What is the common name for a network adapter’s hardware address?

<p>Media Access Control (MAC) address. (D)</p> Signup and view all the answers

How do synthetic and emulated network adapters communicate in a child partition?

<p>Synthetic adapters use the VMBus and emulated adapters use hypervisor calls. (A)</p> Signup and view all the answers

What is the limit on the number of virtualized ports available when using Hyper-V to create a virtual switch?

<p>Unlimited ports. (C)</p> Signup and view all the answers

Which of the following statements about external and internal virtual switches is inaccurate?

<p>Internal virtual switches speed up network communication for child partitions. (D)</p> Signup and view all the answers

How many virtual adapters are included, by default, after creating a VM?

<p>1 (C)</p> Signup and view all the answers

Which of the following is a device that operates at layer 2 of the OSI model?

<p>Virtual switch (B)</p> Signup and view all the answers

Which tasks are necessary when using NIC teaming with Windows Server 2019 virtual machines? (Choose two answers.)

<p>Create a team virtual switch. (B), Configure a NIC team virtual network adapter. (C)</p> Signup and view all the answers

What features does NIC teaming provide for Hyper-V virtual machines in Windows Server 2019? (Choose all that apply.)

<p>Aggregated bandwidth (A), Redundancy (C)</p> Signup and view all the answers

Which type of adapter communicates with the parent partition via direct calls to the hypervisor?

<p>Emulated network adapter (B)</p> Signup and view all the answers

Which type of image contains the operating system and all applications and is immediately available to the end user?

<p>Thick image (A)</p> Signup and view all the answers

Which type of file is a WIM file?

<p>A file-based disk image (A)</p> Signup and view all the answers

What is the name of the Windows Server 2019 installation DVD boot image file?

<p>boot.wim (D)</p> Signup and view all the answers

What are the three profiles used by Windows Firewall to represent the type of network connected?

<p>Domain, private, and public (B)</p> Signup and view all the answers

In a Windows Firewall private profile, what type of network is expected?

<p>An internal network that is not accessible by unauthorized users (A)</p> Signup and view all the answers

What does the term 'filter' refer to in the Windows Firewall With Advanced Security console?

<p>The ability to display inbound or outbound rules according to a profile (C)</p> Signup and view all the answers

When a user attempts to use an Internet-based e-mail account, how does Windows Firewall respond?

<p>The firewall does not block client-initiated network traffic by default. (C)</p> Signup and view all the answers

Which tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?

<p>Windows Firewall With Advanced Security snap-in for the Microsoft Management console (C)</p> Signup and view all the answers

In the Windows Firewall With Advanced Security console, what does the Program page specify when creating a new rule?

<p>Rule applies to all programs, to one specific program, or to a specific service (B)</p> Signup and view all the answers

What type of file is created by exporting the Windows Firewall policy?

<p>A file with a .wfw extension containing all its rules (D)</p> Signup and view all the answers

Which method allows for the retrieval of all files necessary to recover Active Directory?

<p>System state (C)</p> Signup and view all the answers

What is the net result of selecting the 'Faster backup performance' option during backups?

<p>Incremental backups are performed. (B), Windows maintains a shadow copy of the source volume. (D)</p> Signup and view all the answers

Which Windows feature enables users to recover files by maintaining copies at specific moments in time?

<p>Shadow Copies for Shared Volumes (D)</p> Signup and view all the answers

In Windows Firewall, how does it manage inbound and outbound traffic?

<p>Inbound—block all. Outbound—permit all (D)</p> Signup and view all the answers

What type of backup is designed to recover all volumes of a server, including critical recovery data?

<p>Full server (D)</p> Signup and view all the answers

Which backup method captures only the blocks of data changed since the last full backup?

<p>Incremental backup (B)</p> Signup and view all the answers

Which statement best describes block-level backup?

<p>Blocks are read based on their physical location on the disk. (B)</p> Signup and view all the answers

What type of threat does a firewall primarily protect against?

<p>Network intrusion attempts, such as a denial of service attack (D)</p> Signup and view all the answers

What functions does the hypervisor perform in Windows Server 2019?

<p>Controls resource allocation for VMs (B)</p> Signup and view all the answers

What best describes the environments created by the Hyper-V role?

<p>Partitions (A)</p> Signup and view all the answers

Which tool is primarily used for managing virtual machines in Hyper-V?

<p>Hyper-V Manager (D)</p> Signup and view all the answers

What is the term for the captured image of the state, data, and hardware configuration of a VM at a specific moment in time?

<p>Checkpoint (D)</p> Signup and view all the answers

Which requirement is essential for enabling Client Hyper-V on a Windows Server 2019 machine?

<p>Must support second level address translation (SLAT) (A)</p> Signup and view all the answers

Which type of virtual disk points to a physical disk drive instead of a space on a physical disk?

<p>Pass-through disk (B)</p> Signup and view all the answers

Which of the following operating systems can be virtualized using Hyper-V in Windows Server 2019?

<p>SUSE Linux (A)</p> Signup and view all the answers

What does the Resource Metering tool specifically document?

<p>Usage metrics related to each VM (A)</p> Signup and view all the answers

In Hyper-V, what type of virtual switch is configured to connect to external networks?

<p>External network switch (B)</p> Signup and view all the answers

How many MAC addresses can be assigned to virtual network adapters in Hyper-V by default?

<p>256 (B)</p> Signup and view all the answers

What do the statistics compiled by the Resource Metering tool represent?

<p>Data specific to individual virtual machines (D)</p> Signup and view all the answers

Which type of network adapter is referred to as the legacy adapter in Hyper-V?

<p>Emulated adapter due to its standard driver (C)</p> Signup and view all the answers

Which of the following is NOT a requirement to enable Client Hyper-V in Windows Server 2019?

<p>3 GB of available hard disk space (D)</p> Signup and view all the answers

What distinguishes a private virtual switch from an internal virtual switch?

<p>Private virtual switch allows communication with the parent partition. (A)</p> Signup and view all the answers

What is the primary function of an external virtual switch compared to an internal virtual switch?

<p>Allows access to the external network (D)</p> Signup and view all the answers

Which statement correctly differentiates between synthetic and emulated network adapters?

<p>Synthetic adapters utilize VMBus, improving performance. (B)</p> Signup and view all the answers

To which firewall profiles does the setting 'Block all incoming connections, including those in the list of allowed apps' apply?

<p>Public, private, and domain (B)</p> Signup and view all the answers

What is the file extension for importing or exporting firewall rules in Windows Firewall?

<p>.wfw (A)</p> Signup and view all the answers

What is the typical incoming port number used for a web server?

<p>80 (B)</p> Signup and view all the answers

Which NLB control command should be used to gracefully prepare a node for maintenance?

<p>Drainstop (C)</p> Signup and view all the answers

What is the best command to use for immediate node preparation in emergency maintenance?

<p>Stop (B)</p> Signup and view all the answers

Which of the following options can be used to configure the Windows Firewall?

<p>Ports, protocols, applications, users, and IP address ranges (B)</p> Signup and view all the answers

When a service is set to start automatically with a delayed start, what is the approximate length of the delay until it starts?

<p>Two minutes (B)</p> Signup and view all the answers

When a service is set for delayed automatic start, what is the typical delay time?

<p>Two minutes (B)</p> Signup and view all the answers

Which feature allows the Event Viewer MMC snap-in to save useful event filters?

<p>Create custom views that can be reused (C)</p> Signup and view all the answers

What type of rights and permissions should be assigned to a service account?

<p>Minimum (D)</p> Signup and view all the answers

What functionality does the Event Viewer MMC snap-in provide?

<p>Save useful event filters as custom views (D)</p> Signup and view all the answers

When is the best time to establish a performance baseline for a system?

<p>During normal usage (A)</p> Signup and view all the answers

What is the primary role of the Event Viewer tool?

<p>Log viewer (B)</p> Signup and view all the answers

What kind of overview does Task Manager provide of computer performance?

<p>High-level overview (C)</p> Signup and view all the answers

At which point should a performance baseline be established to effectively assess system performance?

<p>During normal usage (D)</p> Signup and view all the answers

What type of overview does Task Manager provide regarding computer performance?

<p>Quick glance (A)</p> Signup and view all the answers

What type of image is specifically designed to deploy the fastest?

<p>Thick image (B)</p> Signup and view all the answers

Which type of adapter serves as a standard network adapter driver that communicates directly with the hypervisor?

<p>Emulated network adapter (A)</p> Signup and view all the answers

What feature of NIC teaming allows for increased throughput by combining multiple network connections?

<p>Aggregated bandwidth (B)</p> Signup and view all the answers

When using NIC teaming in Windows Server 2019, which of the following actions is essential?

<p>Create a virtual switch (A), Configure a NIC team virtual network adapter (C)</p> Signup and view all the answers

Which file type can be classified as a file-based disk image?

<p>WIM file (B)</p> Signup and view all the answers

Which virtual network device operates specifically at layer 2 of the OSI model?

<p>Virtual switch (D)</p> Signup and view all the answers

What is the role of the Windows Deployment Services (WDS) platform?

<p>To create automated bootable images for deployment (D)</p> Signup and view all the answers

What type of image contains both the operating system and applications readily available for use?

<p>Thick image (B)</p> Signup and view all the answers

What is the key characteristic of a pass-through disk in virtual machines?

<p>It directly accesses the physical disk if exclusively allocated to the VM. (C)</p> Signup and view all the answers

Which type of disk acts like a physical hard disk drive and is part of a physical disk's space?

<p>Virtual hard disk (A)</p> Signup and view all the answers

When using differencing disks, what is a significant advantage for administrators?

<p>They permit experimentation without impacting the parent image. (C)</p> Signup and view all the answers

In Windows Server 2019, what is the maximum number of virtual ports that can be assigned to a virtual machine?

<p>4 (C)</p> Signup and view all the answers

What is required to modify an existing virtual hard disk (VHD) file?

<p>Use Windows PowerShell or modify it through a VM. (C)</p> Signup and view all the answers

What are the two commonly used methods for accessing SAN devices over a network?

<p>Using Fibre Channel and iSCSI (B)</p> Signup and view all the answers

When using the New Virtual Hard Disk Wizard, which disk type is limited to an image size of 2 TB?

<p>VHD (A)</p> Signup and view all the answers

Which tool in Windows Server can be utilized to create a new virtual hard disk?

<p>Hyper-V Manager (B)</p> Signup and view all the answers

Flashcards

Linking Group Policy Objects

The process of associating a Group Policy Object (GPO) to a set of Active Directory Domain Services (AD DS) objects.

Priority of GPOs

When multiple GPOs are linked to a container, the first GPO in the list takes precedence.

Group Policy Management Console

The Microsoft Management Console (MMC) snap-in used to create and manage Group Policy Objects (GPOs).

GPO Applicability

Linking a Group Policy to a site with multiple domains ensures the policy applies to all the domains and their child objects.

Signup and view all the flashcards

User Configuration and Computer Configuration

The two main subcategories of Group Policy settings, further divided into three different sub nodes.

Signup and view all the flashcards

Security Filtering

Configures which users or groups have access to specific resources within a network.

Signup and view all the flashcards

Local GPO Limitations

Local Group Policy Objects (GPOs) have fewer options compared to domain GPOs and do not support folder redirection or Group Policy software installation.

Signup and view all the flashcards

Remote Server Administration Tools installation

Administrator must install the Remote Server Administration Tools (RSAT) package on the workstation to access the Group Policy Management Console.

Signup and view all the flashcards

VHD file size limit

VHD files, a type of virtual hard disk, can be up to 64 TB in size.

Signup and view all the flashcards

VHDX file size limit

VHDX files, another type of virtual hard disk, are limited to 2 TB in size.

Signup and view all the flashcards

Shared Virtual Disk Format

VHD is compatible with both Hyper-V and Virtual Server.

Signup and view all the flashcards

VHDX compatibility

The VHDX file format is usually used only in newer hypervisors.

Signup and view all the flashcards

Differencing disk benefit

A differencing disk allows experimenting with changes in a virtual machine without affecting the original image.

Signup and view all the flashcards

VM physical disk access

Virtual machines (VMs) cannot directly access physical hard disks but can use a special 'pass-through' disk that provides direct access if granted.

Signup and view all the flashcards

Virtual Hard Disk Creation Tool

Hyper-V Manager is used to create new virtual hard disks.

Signup and view all the flashcards

Modifiable Virtual Hard Disk

Existing virtual hard disk (VHD) files can be modified without needing to be removed or changed into another type.

Signup and view all the flashcards

External Virtual Switch

Allows VMs to communicate with the external network, but child VMs cannot communicate with each other.

Signup and view all the flashcards

Internal Virtual Switch

Allows child VMs to communicate with each other, but parent VMs cannot access the external network.

Signup and view all the flashcards

Virtual Network Adapters

Synthetic and Emulated network adapters that can have up to 12 adapters in Hyper-V.

Signup and view all the flashcards

VLAN Communication

Setting up virtual network adapters to communicate on a VLAN involves selecting an option for virtual LAN identification and entering a VLAN identifier.

Signup and view all the flashcards

Hardware Acceleration (Hyper-V)

Virtual network adapters in Windows Server 2019 do not support MAC address caching.

Signup and view all the flashcards

MAC Address

A unique hardware address (6 bytes) for network devices.

Signup and view all the flashcards

VMBus Communication

Synthetic adapters use the VMBus to communicate with the parent partition, while emulated adapters use calls to the hypervisor.

Signup and view all the flashcards

Virtual Switch Ports

Hyper-V virtual switches have unlimited virtual ports.

Signup and view all the flashcards

Default VM Virtual Adapters

A virtual machine (VM) typically starts with one virtual network adapter (vNIC).

Signup and view all the flashcards

Layer 2 Network Device (OSI)

A virtual switch functions at the data link layer (Layer 2) of the OSI model, similar to a physical switch.

Signup and view all the flashcards

NIC Teaming with Hyper-V

Configuring a team of network adapters (NICs) on a Hyper-V VM for redundancy and aggregated bandwidth.

Signup and view all the flashcards

Emulated Network Adapter

A standard network adapter driver that communicates directly with the hypervisor, providing network functionality to the virtual machine.

Signup and view all the flashcards

Thick Image

A disk image containing the operating system and all applications, ready for use immediately.

Signup and view all the flashcards

Quickest Deployment Image Type

Thick image deployment is the quickest.

Signup and view all the flashcards

WIM File

A file-based disk image, often used with Windows Deployment Services (WDS).

Signup and view all the flashcards

WDS Function

Windows Deployment Services is a software tool for automated setup and staging of bootable images for computer deployment.

Signup and view all the flashcards

Block-level Backup

A backup method that copies data in blocks, preserving the original disk arrangement.

Signup and view all the flashcards

Faster Backup Performance

A backup configuration that prioritizes speed over thoroughness, often using incremental backups and shadow copies.

Signup and view all the flashcards

Shadow Copies

A technology that creates point-in-time snapshots of files and folders, allowing for recovery of deleted or overwritten data.

Signup and view all the flashcards

Full Server Backup

A comprehensive backup that includes all data and system files on a server, ensuring complete recovery.

Signup and view all the flashcards

System State Backup

A backup that specifically targets critical system files, such as Active Directory configuration, essential for restoring server functionality.

Signup and view all the flashcards

Firewall Rules

Sets of instructions defining what network traffic is allowed or blocked, working either by explicitly permitting or denying traffic.

Signup and view all the flashcards

Firewall Protection

Shielding a network from unauthorized access, preventing intrusion attempts like denial of service attacks.

Signup and view all the flashcards

Inbound/Outbound Firewall Traffic

Inbound traffic flows into the network, while outbound traffic flows out. Windows Firewall typically blocks all inbound traffic by default, while allowing all outbound traffic.

Signup and view all the flashcards

Windows Firewall Profiles

Windows Firewall uses three profiles (Domain, Private, Public) to represent the type of network a computer is connected to, and to apply different security rules accordingly.

Signup and view all the flashcards

Private Profile

The Private profile in Windows Firewall is intended for secure, internal networks where users are authenticated and trusted. It allows more access compared to the Public profile.

Signup and view all the flashcards

Windows Firewall 'Filter'

The term 'filter' within Windows Firewall With Advanced Security refers to the ability to display inbound or outbound rules based on different profiles (Domain, Private, Public).

Signup and view all the flashcards

Windows Firewall Default Behaviour

By default, Windows Firewall does not block client-initiated outbound traffic. This allows users to connect to resources on the internet, even if they are not explicitly authorized.

Signup and view all the flashcards

Windows Firewall Advanced Security

Windows Firewall with Advanced Security offers more flexibility and control over creating firewall rules compared to the basic Windows Firewall interface in Control Panel.

Signup and view all the flashcards

New Rule 'Program' Page

When creating a firewall rule using the Windows Firewall with Advanced Security console, the 'Program' page determines whether the rule applies to all running programs, a specific program, or a particular service.

Signup and view all the flashcards

Exporting Windows Firewall Policy

Exporting a Windows Firewall policy generates a file (with a .wfw extension) containing all configured rules, including preconfigured rules and custom ones.

Signup and view all the flashcards

Firewall Policy File

A Windows Firewall policy file (.wfw extension) contains all the rules and settings that define how the firewall works, including both preconfigured and custom rules.

Signup and view all the flashcards

Hypervisor

A software layer that manages and controls virtual machines (VMs) by creating and managing individual environments that each have their own operating system and access to hardware via the hypervisor.

Signup and view all the flashcards

What is a virtual machine?

A software-based emulation of a physical computer system, allowing you to run different operating systems and applications simultaneously on one machine.

Signup and view all the flashcards

What is Hyper-V Manager?

The primary graphical tool used for creating, managing, and monitoring virtual machines (VMs) in Hyper-V.

Signup and view all the flashcards

What is Resource Metering?

A tool that tracks and records resource usage and performance metrics of each individual virtual machine (VM), providing insights into its behavior and resource consumption.

Signup and view all the flashcards

What is a differencing disk?

A virtual disk file that captures only the changes made to a virtual machine (VM) compared to its original base image.

Signup and view all the flashcards

What is a thick image?

A virtual hard disk (VHD) image that contains the complete operating system and all its applications, ready to be used immediately without needing to download more data.

Signup and view all the flashcards

What is a WIM file?

A file-based disk image format used for Windows operating systems, often associated with Windows Deployment Services (WDS) for automated deployment.

Signup and view all the flashcards

What is a block-level backup?

A backup method that copies data in blocks, preserving the original disk arrangement, which makes it efficient for restoring data to the same location.

Signup and view all the flashcards

Checkpoint

A snapshot of a VM's state, data, and hardware configuration at a specific moment.

Signup and view all the flashcards

Pass-through Disk

A virtual disk that directly accesses a physical disk drive.

Signup and view all the flashcards

External Virtual Network

A virtual switch that allows VMs to connect to networks outside the Hyper-V environment.

Signup and view all the flashcards

Default VM Network Adapters

A virtual machine (VM) typically starts with one virtual network adapter (vNIC).

Signup and view all the flashcards

NLB Drainstop

An NLB command that gracefully prepares a node for planned maintenance by stopping new connections and allowing existing connections to complete before taking the node offline.

Signup and view all the flashcards

NLB Stop

An NLB command that immediately takes a node offline, terminating all connections without providing any grace period.

Signup and view all the flashcards

Delayed Service Start

A service configured to start automatically but with a delay of approximately two minutes after other services start.

Signup and view all the flashcards

Service Account Rights

When creating service accounts, it is best to use an account with minimum privileges to limit potential security risks.

Signup and view all the flashcards

Event Viewer MMC Snap-in

A tool that allows you to view, filter, and save event logs from various sources on a Windows system.

Signup and view all the flashcards

Performance Baseline

A measurement of a system's performance during normal usage, used as a reference point for detecting performance issues.

Signup and view all the flashcards

Task Manager Performance View

Task Manager provides a high-level, quick glance at computer performance metrics, but lacks in-depth analysis capabilities.

Signup and view all the flashcards

Resource Monitor

A comprehensive performance tool that monitors CPU, memory, disk, and network usage, as well as resource consumption by processes and services.

Signup and view all the flashcards

What is a virtual switch?

A virtual switch acts like a physical switch but within a virtual environment. It allows virtual machines (VMs) to communicate with each other and possibly the external network.

Signup and view all the flashcards

What is a Hypervisor?

A software layer that manages and controls virtual machines (VMs). It sits between the hardware and the VMs, creating virtual environments where each VM has its own operating system and resources.

Signup and view all the flashcards

Firewall Profiles

Different sets of rules that Windows Firewall applies based on the network type (Public, Private, Domain).

Signup and view all the flashcards

Firewall Default Behavior

Windows Firewall blocks all incoming traffic by default, but allows all outgoing traffic.

Signup and view all the flashcards

Inbound/Outbound Traffic

Inbound traffic comes into your network, while outbound traffic goes out.

Signup and view all the flashcards

Firewall Advanced Security

A more advanced part of Windows Firewall that allows for creating more complex rules.

Signup and view all the flashcards

Exporting Firewall Policy

Creating a copy (backup) of all the firewall rules.

Signup and view all the flashcards

Study Notes

Active Directory Study Notes

  • Active Directory Objects: Two basic classes are containers and leaf objects.
  • Active Directory Schema: Defines what objects exist and their attributes. Active Directory schema is responsible for defining the attributes associated with objects in AD.
  • Active Directory Container Object Level: Organizational Units (OUs) are the next level within a domain; another level is a subdomain.
  • Domain Trust Relationship: Enables users in one domain to access resources in another within the same domain tree. This is referred to as a bidirectional trust relationship.
  • Active Directory Forest: Composed of multiple domain trees. The domain tree is a hierarchical structure that defines the relationships between domains within a forest.
  • Active Directory Functional Level: Determined by the lowest version of Windows Server on a domain controller. It determines the capabilities of the forest.
  • Global Catalog: An index of all Active Directory objects in a forest. The global catalog is a special server that maintains a copy of all objects in an entire forest.

DNS Study Notes

  • DNS Hierarchy: Top level servers are called root servers
  • DNS Query Types: Recursive query is the typical one sent to a root name server; iterative query is a typical query. A recursive query requests resolution of a name from a root name server. An iterative query requests resolution of a name from a given or nearby server.
  • DNS Resource Records: maintained by the authoritative source for a given domain; crucial for maintaining a domain's resource records.
  • TTL: Time To Live, specified by an administrator in a DNS server to determine the length of time data within it remains cached; used for caching DNS resource records.

DHCP Study Notes

  • DHCP Infrastructure: Distributed DHCP infrastructure reduces administrative burden and minimizes network traffic on routers. It helps manage IP address assignments efficiently.
  • DHCP Lease Renewal: Clients initiate renewal 50% of the way through the lease period. Renewal is requested to maintain the IP address lease before it expires.
  • DHCP Server Configuration: DHCP server needs scope created and activated; needs to be added to the trusted list on client computers. This ensures proper functioning and assignment of IP addresses through a DHCP server.

Active Directory User Accounts

  • Built-in accounts: Two built-in user accounts are system and guest.
  • User Account Types: Two main types of user accounts in Windows Server 2019: Local and domain accounts.
  • User Authentication: The process of confirming a user's identity.
  • User Permissions and Access: Determined by the user and administrator, and also by the security of the user or computer account.
  • Permissions: Refers to the level of access that a user has to a certain resource within the system. Permissions affect how users or computers can interact with resources.

Other Study Notes

  • GPOs: Multiple Group Policies can be linked to a container, and the order of link determines their priority.
  • Important Difference Between Groups and OUs: Group membership can be a subset of an OU. This means a group can contain members from various OUs within an organizational structure.
  • Removing a Domain Controller: Use Remove Roles and Features Wizard.
  • Active Directory Object Creation: A domain user without explicit permission can't directly create computer objects. An authenticated user within a different domain can create a workstation. However, they can't create server objects.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on Windows Server virtualization concepts including VHDX files, Group Policy Management, and disk types. This quiz covers key features of Hyper-V and related technologies, ensuring you understand the complexities of virtual machine management. Perfect for IT professionals and students alike!

More Like This

Enabling Hyper-V on Windows 10/11
30 questions
Windows Server 2019 Key Concepts
9 questions
Windows Server 2019 Chapitre 1
24 questions
Quiz về các phiên bản Windows Server
55 questions
Use Quizgecko on...
Browser
Browser