100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CTEC 305 FINAL TEST QUESTIONS FULLY SOLVED

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
18-03-2025
Written in
2024/2025

CTEC 305 FINAL TEST QUESTIONS FULLY SOLVED Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses Generation 1 when prompted to pick the generation for the virtual machine. - Answers b. The guest operating system on the virtual machine is a 32-bit version of Windows 7. Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be found? - Answers c. Windows Server Catalog If is the forest root domain, you can use the command Set-ADForestMode Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2. - Answers false You need multiple boot images on a WDS server, one for each operating system. - Answers false Natalie is a graphic designer who frequently works with large files. These files, which are stored on an NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her work, and she had not faced any issues with backing up her files until recently. During a recent backup, she noticed that a newly created folder was not backed up. - Answers b. Natalie did not enable the archive attribute on the folder. Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? - Answers Mounting The subnet mask cannot be modified once a scope is created. - Answers True Hasad is the system administrator for a marketing company. The company stores sensitive data in a folder named Assets on the company's network drive. Hasad is asked to identify the users who access the files within the folder or make changes to them. Which of the following steps should Hasad take to track all the activity within the folder Assets? - Answers Any answer about auditing is correct for this question Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax returns. In which of the following scenarios should Remtax use Windows Server Core or Nano Server? - Answers a. The server will be dedicated to web services and accessed via the Internet. What is the advantage of using production checkpoints over standard checkpoints? - Answers d. Production checkpoints cause fewer problems than standard checkpoints when applied. While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. - Answers d. NTFS is a journaling filesystem, while FAT32 is not. Access-based enumeration limits the shares a user can see to only the shares for which the user has at least Read permission. - Answers True Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? - Answers b. iSCSI initiator Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be able find the folder using the search feature on File Explorer. However, in addition to finding the folder when searching for KettleProgram, he also wants the folder to show up when users search for "KettleApp." - Answers c. Add KettleApp as a keyword in the folder's properties. For zones that allow dynamic updates, you do not need to create CNAME and MX records or host records that provide for round robin or netmask ordering. - Answers false What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? - Answers b. The folder inherits the share permissions but loses the NTFS permissions. What is the IP address that is assigned to the network loopback interface? - Answers c. 127.0.0.1 By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers, ForeignSecurityPrincipals, Managed Service Accounts, and User. - Answers false Orana works for an organization that sets up several virtual machines on a day-to-day basis to be deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. - Answers c. Virtual machine templates Decision constructs such as IF and Switch allow you to perform a task multiple times. - Answers false Malaika uses the Edge Browser on her computer to access a website. The browser sends a request to another computer over the Internet, which returns web page data that is displayed on the browser. Which of these entries is the server? - Answers c. The responding computer Alina is using Windows Powershell on a windows server 2019 system for the first time She wants a list of all cmdlets in Powershell, so she types the following command....

Show more Read less
Institution
CTEC 305
Course
CTEC 305









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CTEC 305
Course
CTEC 305

Document information

Uploaded on
March 18, 2025
Number of pages
13
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CTEC 305 FINAL TEST QUESTIONS FULLY SOLVED

Lehana is creating a new virtual machine using the New Virtual Machine Wizard. After choosing the
name WindowsServer2019VM for her virtual machine, she proceeds to the next step. She chooses
Generation 1 when prompted to pick the generation for the virtual machine. - Answers b. The guest
operating system on the virtual machine is a 32-bit version of Windows 7.

Where can the most up-to-date list of compatible hardware available for Windows Server 2019 be
found? - Answers c. Windows Server Catalog

If domain1.com is the forest root domain, you can use the command Set-ADForestMode
Windows2012R2Domain to raise the forest functional level to Windows Server 2012 R2. - Answers false

You need multiple boot images on a WDS server, one for each operating system. - Answers false

Natalie is a graphic designer who frequently works with large files. These files, which are stored on an
NTFS filesystem, measure 500 MB on average. She uses a software application to create backups of her
work, and she had not faced any issues with backing up her files until recently. During a recent backup,
she noticed that a newly created folder was not backed up. - Answers b. Natalie did not enable the
archive attribute on the folder.

Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating
system. What is the term given to the process that Imran is carrying out? - Answers Mounting

The subnet mask cannot be modified once a scope is created. - Answers True

Hasad is the system administrator for a marketing company. The company stores sensitive data in a
folder named Assets on the company's network drive. Hasad is asked to identify the users who access
the files within the folder or make changes to them.



Which of the following steps should Hasad take to track all the activity within the folder Assets? -
Answers Any answer about auditing is correct for this question

Remtax offers tax consulting services over the Internet. It assists people in preparing their income tax
returns.



In which of the following scenarios should Remtax use Windows Server Core or Nano Server? - Answers
a. The server will be dedicated to web services and accessed via the Internet.

What is the advantage of using production checkpoints over standard checkpoints? - Answers d.
Production checkpoints cause fewer problems than standard checkpoints when applied.

, While copying files between folders, it is possible to retrace and complete the transfer in case of a
power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem.
- Answers d. NTFS is a journaling filesystem, while FAT32 is not.

Access-based enumeration limits the shares a user can see to only the shares for which the user has at
least Read permission. - Answers True

Which of the following is a term given to the software component in the operating system that connects
to the SAN device via iSCSI? - Answers b. iSCSI initiator

Iqbal publishes a shared folder named KettleProgram to Active Directory. He wants other users to be
able find the folder using the search feature on File Explorer. However, in addition to finding the folder
when searching for KettleProgram, he also wants the folder to show up when users search for
"KettleApp." - Answers c. Add KettleApp as a keyword in the folder's properties.

For zones that allow dynamic updates, you do not need to create CNAME and MX records or host
records that provide for round robin or netmask ordering. - Answers false

What happens when a folder with NTFS permissions is copied to a shared folder on a FAT volume? -
Answers b. The folder inherits the share permissions but loses the NTFS permissions.

What is the IP address that is assigned to the network loopback interface? - Answers c. 127.0.0.1

By default, a new domain has six organizational units: Domain Controllers, Builtin, Computers,
ForeignSecurityPrincipals, Managed Service Accounts, and User. - Answers false

Orana works for an organization that sets up several virtual machines on a day-to-day basis to be
deployed for various clients. Orana is exploring various Hyper-V options that will simplify this process. -
Answers c. Virtual machine templates

Decision constructs such as IF and Switch allow you to perform a task multiple times. - Answers false

Malaika uses the Edge Browser on her computer to access a website. The browser sends a request to
another computer over the Internet, which returns web page data that is displayed on the browser.



Which of these entries is the server? - Answers c. The responding computer

Alina is using Windows Powershell on a windows server 2019 system for the first time She wants a list of
all cmdlets in Powershell, so she types the following command....



Why does Alina use the pipe symbol (|) in this command? - Answers d. To send the output for Get-
Command to more, which displays the output page by page.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
340
Member since
1 year
Number of followers
16
Documents
28518
Last sold
23 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions