Windows Server Virtualization Quiz
95 Questions
8 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the maximum size limit for a VHDX file?

  • 64 TB (correct)
  • 128 TB
  • 16 TB
  • 2 TB
  • Which virtual image file format is compatible with both Hyper-V on Windows Server 2019 and older Virtual Server?

  • VHS
  • VHDX
  • DIVX
  • VHD (correct)
  • What type of disk allows an image size of up to 2 TB?

  • VHDX
  • VHS
  • VHD (correct)
  • DIVX
  • What unique benefit does a differencing disk provide to administrators?

    <p>An opportunity to experiment with no changes committed to the parent image</p> Signup and view all the answers

    How can virtual machines (VMs) access a physical hard disk?

    <p>By using a pass-through disk</p> Signup and view all the answers

    Which tool can be used within Server Manager to create a new virtual hard disk?

    <p>Hyper-V Manager</p> Signup and view all the answers

    Is it possible to modify an existing virtual hard disk (VHD) file?

    <p>Yes, without mounting it to a VM</p> Signup and view all the answers

    Which methods can be used to access SAN devices over the network?

    <p>Using iSCSI</p> Signup and view all the answers

    What is the proper term for associating a Group Policy to a set of AD DS objects?

    <p>Linking</p> Signup and view all the answers

    When multiple GPOs are linked to a container, which GPO in the list has the highest priority?

    <p>The first</p> Signup and view all the answers

    Which Microsoft Management Console (MMC) snap-in is used to create GPOs and manage their deployment to AD DS objects?

    <p>Group Policy Management console</p> Signup and view all the answers

    Can an administrator launch the Group Policy Management console from a workstation?

    <p>Yes, if Remote Server Administration Tools are installed</p> Signup and view all the answers

    Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. What are the three subnodes of these categories?

    <p>Software settings, Windows settings, and Administrative Templates</p> Signup and view all the answers

    What do you call the process where Group Policy settings are applied to all domains and child objects after linking a GPO to a site with multiple domains?

    <p>Inheritance</p> Signup and view all the answers

    Which application allows you to configure security filtering for Group Policies?

    <p>Group Policy Management console</p> Signup and view all the answers

    Local GPOs do not support which of the following options?

    <p>Folder redirection or Group Policy software installation</p> Signup and view all the answers

    What is a key difference between internal and external virtual switches?

    <p>Internal switches do not allow child partition VMs to communicate together.</p> Signup and view all the answers

    How many virtual network adapters can be created on a Hyper-V server?

    <p>Up to 12 network adapters—8 synthetic and 4 emulated.</p> Signup and view all the answers

    What action should an administrator take to associate a virtual network adapter with a VLAN?

    <p>Select Enable virtual LAN identification and enter a VLAN identifier.</p> Signup and view all the answers

    Which hardware acceleration feature is not supported by virtual network adapters in Windows Server 2019?

    <p>MAC address caching.</p> Signup and view all the answers

    What is the common name for a network adapter’s hardware address?

    <p>Media Access Control (MAC) address.</p> Signup and view all the answers

    How do synthetic and emulated network adapters communicate in a child partition?

    <p>Synthetic adapters use the VMBus and emulated adapters use hypervisor calls.</p> Signup and view all the answers

    What is the limit on the number of virtualized ports available when using Hyper-V to create a virtual switch?

    <p>Unlimited ports.</p> Signup and view all the answers

    Which of the following statements about external and internal virtual switches is inaccurate?

    <p>Internal virtual switches speed up network communication for child partitions.</p> Signup and view all the answers

    How many virtual adapters are included, by default, after creating a VM?

    <p>1</p> Signup and view all the answers

    Which of the following is a device that operates at layer 2 of the OSI model?

    <p>Virtual switch</p> Signup and view all the answers

    Which tasks are necessary when using NIC teaming with Windows Server 2019 virtual machines? (Choose two answers.)

    <p>Create a team virtual switch.</p> Signup and view all the answers

    What features does NIC teaming provide for Hyper-V virtual machines in Windows Server 2019? (Choose all that apply.)

    <p>Aggregated bandwidth</p> Signup and view all the answers

    Which type of adapter communicates with the parent partition via direct calls to the hypervisor?

    <p>Emulated network adapter</p> Signup and view all the answers

    Which type of image contains the operating system and all applications and is immediately available to the end user?

    <p>Thick image</p> Signup and view all the answers

    Which type of file is a WIM file?

    <p>A file-based disk image</p> Signup and view all the answers

    What is the name of the Windows Server 2019 installation DVD boot image file?

    <p>boot.wim</p> Signup and view all the answers

    What are the three profiles used by Windows Firewall to represent the type of network connected?

    <p>Domain, private, and public</p> Signup and view all the answers

    In a Windows Firewall private profile, what type of network is expected?

    <p>An internal network that is not accessible by unauthorized users</p> Signup and view all the answers

    What does the term 'filter' refer to in the Windows Firewall With Advanced Security console?

    <p>The ability to display inbound or outbound rules according to a profile</p> Signup and view all the answers

    When a user attempts to use an Internet-based e-mail account, how does Windows Firewall respond?

    <p>The firewall does not block client-initiated network traffic by default.</p> Signup and view all the answers

    Which tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?

    <p>Windows Firewall With Advanced Security snap-in for the Microsoft Management console</p> Signup and view all the answers

    In the Windows Firewall With Advanced Security console, what does the Program page specify when creating a new rule?

    <p>Rule applies to all programs, to one specific program, or to a specific service</p> Signup and view all the answers

    What type of file is created by exporting the Windows Firewall policy?

    <p>A file with a .wfw extension containing all its rules</p> Signup and view all the answers

    Which method allows for the retrieval of all files necessary to recover Active Directory?

    <p>System state</p> Signup and view all the answers

    What is the net result of selecting the 'Faster backup performance' option during backups?

    <p>Incremental backups are performed.</p> Signup and view all the answers

    Which Windows feature enables users to recover files by maintaining copies at specific moments in time?

    <p>Shadow Copies for Shared Volumes</p> Signup and view all the answers

    In Windows Firewall, how does it manage inbound and outbound traffic?

    <p>Inbound—block all. Outbound—permit all</p> Signup and view all the answers

    What type of backup is designed to recover all volumes of a server, including critical recovery data?

    <p>Full server</p> Signup and view all the answers

    Which backup method captures only the blocks of data changed since the last full backup?

    <p>Incremental backup</p> Signup and view all the answers

    Which statement best describes block-level backup?

    <p>Blocks are read based on their physical location on the disk.</p> Signup and view all the answers

    What type of threat does a firewall primarily protect against?

    <p>Network intrusion attempts, such as a denial of service attack</p> Signup and view all the answers

    What functions does the hypervisor perform in Windows Server 2019?

    <p>Controls resource allocation for VMs</p> Signup and view all the answers

    What best describes the environments created by the Hyper-V role?

    <p>Partitions</p> Signup and view all the answers

    Which tool is primarily used for managing virtual machines in Hyper-V?

    <p>Hyper-V Manager</p> Signup and view all the answers

    What is the term for the captured image of the state, data, and hardware configuration of a VM at a specific moment in time?

    <p>Checkpoint</p> Signup and view all the answers

    Which requirement is essential for enabling Client Hyper-V on a Windows Server 2019 machine?

    <p>Must support second level address translation (SLAT)</p> Signup and view all the answers

    Which type of virtual disk points to a physical disk drive instead of a space on a physical disk?

    <p>Pass-through disk</p> Signup and view all the answers

    Which of the following operating systems can be virtualized using Hyper-V in Windows Server 2019?

    <p>SUSE Linux</p> Signup and view all the answers

    What does the Resource Metering tool specifically document?

    <p>Usage metrics related to each VM</p> Signup and view all the answers

    In Hyper-V, what type of virtual switch is configured to connect to external networks?

    <p>External network switch</p> Signup and view all the answers

    How many MAC addresses can be assigned to virtual network adapters in Hyper-V by default?

    <p>256</p> Signup and view all the answers

    What do the statistics compiled by the Resource Metering tool represent?

    <p>Data specific to individual virtual machines</p> Signup and view all the answers

    Which type of network adapter is referred to as the legacy adapter in Hyper-V?

    <p>Emulated adapter due to its standard driver</p> Signup and view all the answers

    Which of the following is NOT a requirement to enable Client Hyper-V in Windows Server 2019?

    <p>3 GB of available hard disk space</p> Signup and view all the answers

    What distinguishes a private virtual switch from an internal virtual switch?

    <p>Private virtual switch allows communication with the parent partition.</p> Signup and view all the answers

    What is the primary function of an external virtual switch compared to an internal virtual switch?

    <p>Allows access to the external network</p> Signup and view all the answers

    Which statement correctly differentiates between synthetic and emulated network adapters?

    <p>Synthetic adapters utilize VMBus, improving performance.</p> Signup and view all the answers

    To which firewall profiles does the setting 'Block all incoming connections, including those in the list of allowed apps' apply?

    <p>Public, private, and domain</p> Signup and view all the answers

    What is the file extension for importing or exporting firewall rules in Windows Firewall?

    <p>.wfw</p> Signup and view all the answers

    What is the typical incoming port number used for a web server?

    <p>80</p> Signup and view all the answers

    Which NLB control command should be used to gracefully prepare a node for maintenance?

    <p>Drainstop</p> Signup and view all the answers

    What is the best command to use for immediate node preparation in emergency maintenance?

    <p>Stop</p> Signup and view all the answers

    Which of the following options can be used to configure the Windows Firewall?

    <p>Ports, protocols, applications, users, and IP address ranges</p> Signup and view all the answers

    When a service is set to start automatically with a delayed start, what is the approximate length of the delay until it starts?

    <p>Two minutes</p> Signup and view all the answers

    When a service is set for delayed automatic start, what is the typical delay time?

    <p>Two minutes</p> Signup and view all the answers

    Which feature allows the Event Viewer MMC snap-in to save useful event filters?

    <p>Create custom views that can be reused</p> Signup and view all the answers

    What type of rights and permissions should be assigned to a service account?

    <p>Minimum</p> Signup and view all the answers

    What functionality does the Event Viewer MMC snap-in provide?

    <p>Save useful event filters as custom views</p> Signup and view all the answers

    When is the best time to establish a performance baseline for a system?

    <p>During normal usage</p> Signup and view all the answers

    What is the primary role of the Event Viewer tool?

    <p>Log viewer</p> Signup and view all the answers

    What kind of overview does Task Manager provide of computer performance?

    <p>High-level overview</p> Signup and view all the answers

    At which point should a performance baseline be established to effectively assess system performance?

    <p>During normal usage</p> Signup and view all the answers

    What type of overview does Task Manager provide regarding computer performance?

    <p>Quick glance</p> Signup and view all the answers

    What type of image is specifically designed to deploy the fastest?

    <p>Thick image</p> Signup and view all the answers

    Which type of adapter serves as a standard network adapter driver that communicates directly with the hypervisor?

    <p>Emulated network adapter</p> Signup and view all the answers

    What feature of NIC teaming allows for increased throughput by combining multiple network connections?

    <p>Aggregated bandwidth</p> Signup and view all the answers

    When using NIC teaming in Windows Server 2019, which of the following actions is essential?

    <p>Create a virtual switch</p> Signup and view all the answers

    Which file type can be classified as a file-based disk image?

    <p>WIM file</p> Signup and view all the answers

    Which virtual network device operates specifically at layer 2 of the OSI model?

    <p>Virtual switch</p> Signup and view all the answers

    What is the role of the Windows Deployment Services (WDS) platform?

    <p>To create automated bootable images for deployment</p> Signup and view all the answers

    What type of image contains both the operating system and applications readily available for use?

    <p>Thick image</p> Signup and view all the answers

    What is the key characteristic of a pass-through disk in virtual machines?

    <p>It directly accesses the physical disk if exclusively allocated to the VM.</p> Signup and view all the answers

    Which type of disk acts like a physical hard disk drive and is part of a physical disk's space?

    <p>Virtual hard disk</p> Signup and view all the answers

    When using differencing disks, what is a significant advantage for administrators?

    <p>They permit experimentation without impacting the parent image.</p> Signup and view all the answers

    In Windows Server 2019, what is the maximum number of virtual ports that can be assigned to a virtual machine?

    <p>4</p> Signup and view all the answers

    What is required to modify an existing virtual hard disk (VHD) file?

    <p>Use Windows PowerShell or modify it through a VM.</p> Signup and view all the answers

    What are the two commonly used methods for accessing SAN devices over a network?

    <p>Using Fibre Channel and iSCSI</p> Signup and view all the answers

    When using the New Virtual Hard Disk Wizard, which disk type is limited to an image size of 2 TB?

    <p>VHD</p> Signup and view all the answers

    Which tool in Windows Server can be utilized to create a new virtual hard disk?

    <p>Hyper-V Manager</p> Signup and view all the answers

    Study Notes

    Active Directory Study Notes

    • Active Directory Objects: Two basic classes are containers and leaf objects.
    • Active Directory Schema: Defines what objects exist and their attributes. Active Directory schema is responsible for defining the attributes associated with objects in AD.
    • Active Directory Container Object Level: Organizational Units (OUs) are the next level within a domain; another level is a subdomain.
    • Domain Trust Relationship: Enables users in one domain to access resources in another within the same domain tree. This is referred to as a bidirectional trust relationship.
    • Active Directory Forest: Composed of multiple domain trees. The domain tree is a hierarchical structure that defines the relationships between domains within a forest.
    • Active Directory Functional Level: Determined by the lowest version of Windows Server on a domain controller. It determines the capabilities of the forest.
    • Global Catalog: An index of all Active Directory objects in a forest. The global catalog is a special server that maintains a copy of all objects in an entire forest.

    DNS Study Notes

    • DNS Hierarchy: Top level servers are called root servers
    • DNS Query Types: Recursive query is the typical one sent to a root name server; iterative query is a typical query. A recursive query requests resolution of a name from a root name server. An iterative query requests resolution of a name from a given or nearby server.
    • DNS Resource Records: maintained by the authoritative source for a given domain; crucial for maintaining a domain's resource records.
    • TTL: Time To Live, specified by an administrator in a DNS server to determine the length of time data within it remains cached; used for caching DNS resource records.

    DHCP Study Notes

    • DHCP Infrastructure: Distributed DHCP infrastructure reduces administrative burden and minimizes network traffic on routers. It helps manage IP address assignments efficiently.
    • DHCP Lease Renewal: Clients initiate renewal 50% of the way through the lease period. Renewal is requested to maintain the IP address lease before it expires.
    • DHCP Server Configuration: DHCP server needs scope created and activated; needs to be added to the trusted list on client computers. This ensures proper functioning and assignment of IP addresses through a DHCP server.

    Active Directory User Accounts

    • Built-in accounts: Two built-in user accounts are system and guest.
    • User Account Types: Two main types of user accounts in Windows Server 2019: Local and domain accounts.
    • User Authentication: The process of confirming a user's identity.
    • User Permissions and Access: Determined by the user and administrator, and also by the security of the user or computer account.
    • Permissions: Refers to the level of access that a user has to a certain resource within the system. Permissions affect how users or computers can interact with resources.

    Other Study Notes

    • GPOs: Multiple Group Policies can be linked to a container, and the order of link determines their priority.
    • Important Difference Between Groups and OUs: Group membership can be a subset of an OU. This means a group can contain members from various OUs within an organizational structure.
    • Removing a Domain Controller: Use Remove Roles and Features Wizard.
    • Active Directory Object Creation: A domain user without explicit permission can't directly create computer objects. An authenticated user within a different domain can create a workstation. However, they can't create server objects.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on Windows Server virtualization concepts including VHDX files, Group Policy Management, and disk types. This quiz covers key features of Hyper-V and related technologies, ensuring you understand the complexities of virtual machine management. Perfect for IT professionals and students alike!

    More Like This

    Enabling Hyper-V on Windows 10/11
    30 questions
    Windows Server 2019 Key Concepts
    9 questions
    Quiz về các phiên bản Windows Server
    55 questions
    Use Quizgecko on...
    Browser
    Browser