Microsoft Microsoft Certifications 98-365 Questions & Answers
Question 171:
You work as a Server Administrator for company Inc. The company has a Windows 2016-based Active Directory network.
You are assigning NTFS permissions to the E:\Projects folder for the Marketing group. You want to ensure that the members of the Marketing group can list the contents of the folder and read the data of files contained in the folder, but none of them can change or delete data from the folder.
Which of the following permissions will you apply?
A. Write
B. Full control
C. Read
D. Modify
Correct Answer: C
You should apply Read permission to the E:\Projects folder for the Marketing group. After applying this NTFS permission, the members of the Marketing group can list the contents of the folder and read the data of files contained in the folder, but none of them can change or delete data from the folder.
Incorrect Answers:
A: Write permission allows users to write in files or folders.
B: Full Control permission allows users to make changes in files or folders.
D: Modify permission allows users to make changes in files and folders.
Question 172:
You work as a Server Administrator for company Inc. The company has a Windows Server 2016 based network environment. There is a domain controller with Windows Server 2016 installed on it.
You want to install the Hyper-V role for production server consolidation and business continuity management.
Which of the following are the prerequisites for installing the Hyper-V role? Each correct answer represents a complete solution. (Choose three.)
A. x32-based processor
B. GUI accelerator
C. Hardware-assisted virtualization
D. Hardware-enforced Data Execution Prevention
E. x64-based processor
Correct Answer: CDE
The prerequisites for installing the Hyper-V role are as follows:
An x64-based processor: Hyper-V is available in x64-based versions of Windows Server 2016 - specifically, the x64-based versions of Windows Server 2016 Enterprise, Windows Server 2016 Datacenter, and Windows Server 2016 Standard.
Hardware-enforced Data Execution Prevention (DEP): This should be both available and enabled. Specifically, a user should enable the Intel XD bit (execute disable bit) or AMD NX bit (no execute bit). Hardware-assisted virtualization: It is
available in processors that include a virtualization option - particularly, Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V).
Incorrect Answers:
A, B: These are not prerequisites for installing Hyper-V.
Question 173:
You have installed and configured the Application Server role on a server running Windows Server 2016.
For which of the following options can you add support on this server? Each correct answer represents a complete solution. (Choose four.)
A. Web Server
B. COM+ Network Access
C. Windows Process Activation Service
D. DFS Management
E. File Server Resource Manager
F. TCP Port Sharing
Correct Answer: ABCF
You can add support for the following options when you install the Application Server role on a computer running Windows Server 2016:
Web Server
COM+ Network Access
Windows Process Activation Service
TCP Port Sharing
Distributed Transactions
Incorrect Answers:
D, E: You cannot add support for the DFS Management and File Server Resource Manager options.
Question 174:
Which of the following statements best describe the features of a fixed-size VHD? Each correct answer represents a complete solution. (Choose two.)
A. It offers better performance by eliminating the fragmentation associated with the growing file.
B. It has a set amount of hard disk space and that amount does not change.
C. It uses the space that is being used currently by the VHD.
D. It provides a way to set up the VHD if hard drive space is limited on the server.
Correct Answer: AB
Fixed-size VHDs have a set amount of hard disk space and that amount does not change. Fixed size means that each VHD is set to a specific hard drive storage space and that space is taken by the system even if the VHD is less than what
is set. As an example, if 16GB is designated to a fixed-size VHD, then all 16GB will be taken by VHD on the hard disk immediately - regardless of how much the system is actually using.
The fixed-size VHD option offers better performance by eliminating the fragmentation associated with the growing file.
Incorrect Answers:
C, D: Dynamic VHDs only use the space that is being used currently by the VHD. So if a dynamic VHD is set to 20GB but the VHD is currently using only 10GB, then 10 GB is all that is currently being used by the dynamic VHD. This is the
way that a user wants to set up his VHD if hard drive space is limited on the server.
References:
MCTS Windows Server Virtualization Configuration Study Guide: Exam 70-652 By William Panek Page 69.
Question 175:
David and Vivian work as Network Administrators for company Inc. David installs a printer on his Windows 10 computer. The printer will be shared on the network and will be used only by the members of the Developers local group.
David wants to accomplish the following goals:
Prevent all other members, except those of the Developers local group, from using the printer.
Members of the Developers local group will only manage print jobs sent by them.
Only he and Vivian will manage the printer and all print jobs.
David takes the following steps:
Grant the Allow-Print permission to the Developers local group.
Grant the Allow-Manage Documents and Allow-Manage Printers permissions to Vivian's and his user accounts.
Which of the above stated goals will David accomplish?
A. Only the second goal will be accomplished.
B. Only the third goal will be accomplished.
C. Only the first and third goals will be accomplished.
D. Only the second and third goals will be accomplished.
E. All the three goals will be accomplished.
F. Only the first goal will be accomplished.
G. Only the first and second goals will be accomplished.
Correct Answer: D
Granting the Allow-Print permission to the Developers local group will allow members of the group to print. By default, the Everyone group has print permission. This permission entry needs to be removed to meet the first goal.
When a printer is shared, all users by default can manage printing of their own documents. Therefore, the second goal is met.
David granted the Allow-Manage Documents and Allow-Manage Printers permissions to Vivian's and his user accounts to manage the documents printed by other users. This meets the third goal.
Question 176:
You work as a Server Administrator for company Inc. The company has a virtual server hosted on a Windows Server 2016 server with the Hyper-V role installed.
You have upgraded an application on the virtual server. You experience that this upgrade causes problems. Now, you want to quickly revert back to the point before the changes are made. Which of the following will you use to accomplish the task?
A. Virtual Server Migration Toolkit
B. Checkpoints
C. Windows System Resource Manager
D. Logical unit number
Correct Answer: B
In order to accomplish the task, you should use checkpoints. Snapshots have been improved in Windows Server 2016 and are now called checkpoints.
Checkpoints are files that contain the configuration and data in a virtualized machine.
The Hyper-V Manager Console provides the facility to take a snapshot of a virtual machine running under Hyper-V. This snapshot can be used to quickly roll-back the instance of an operating system when the snapshot was taken. In state of
any disaster such as malfunctioning virtual machine, these snapshots are very helpful to recover from such situations.
Incorrect Answers:
A: The Virtual Server Migration Toolkit (VSMT), a command-line-based tool provided by Windows Server 2016, is used to migrate existing servers in the network environment to a virtualized partition of Windows Server 2016. VSMT has been
specially designed for administrators to handle small number of servers that needs to be virtualized.
It however, cannot be used to manage these servers. It uses XML files to store configuration data during the migration process. The tool is compatible with both the Hyper-V and the Virtual Server 2005 R2.
C: Windows System Resource Manager (WSRM) is a tool for resource management and enables the allocation of resources, including processor and memory resources, among multiple applications based on business priorities. With WSRM,
a system administrator can set CPU and memory allocation policies on applications, manage CPU utilization, and apply policies to users or groups on a Terminal Services application server. WSRM also applies limits to process working set
size and committed memory consumption.
D: The logical unit number or LUN is the identifier of a SCSI logical unit, and by extension of a Fibre Channel or iSCSI logical unit. A logical unit is a SCSI protocol entity, which performs classic storage operations such as read and write. Each
SCSI target provides one or more logical units. A logical unit typically corresponds to a storage volume and is represented within a computer operating system as a device.
Question 177:
Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true? Each correct answer represents a complete solution. (Choose two.)
A. The server always authenticates the client.
B. The client can optionally authenticate the server.
C. The server can optionally authenticate the client.
D. The client always authenticates the server.
Correct Answer: CD
In the SSL model of security, the client always authenticates the server, and the server has the option to authenticate the client. In normal circumstances, Web servers do not authenticate the client during the handshake process. The
verification of the client can be done externally from the SSL session to reserve precious processing resources for encrypted transactions.
The following image shows the steps SSL takes during the handshake process:
Question 178:
Web developers request FTP access to the Web server so that they can upload and download updated contents.
Which of the following ports does FTP use for communication? Each correct answer represents a complete solution. (Choose two.)
A. 20
B. 80
C. 23
D. 21
Correct Answer: AD
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server applications, which solves the problem of different end host configurations (i.e., Operating System, file names). FTP is used with user-based password authentication or with anonymous user access. FTP uses ports 20 and 21 for communication.
Incorrect Answers:
B: Port 80 is used for HTTP which is used to request and transmit files, especially Web pages and Webpage components, on the World Wide Web.
C: Port 23 is used for Telnet which is used on the Internet to provide a bidirectional interactive text-oriented communications using a virtual terminal connection.
Question 179:
Adam works as a Software Tester for SecureEnet Inc. He is required to test the software on different operating systems. Adam installs Windows 10 on his laptop, which enables him to create, mount, and boot from VHD files. Which of the following statements are true about Virtual Hard Disk (VHD)? Each correct answer represents a complete solution. (Choose three.)
A. VHD can be used to install a wide variety of operating systems.
B. VHD allows multiple operating systems to reside on a single host machine
C. VHDs are implemented as files that reside on the native host file system.
D. VHD is a file formatted to be structurally different to a physical Hard Disk Drive.
Correct Answer: ABC
A Virtual Hard Disk (VHD) is a file formatted to be structurally identical to a physical Hard Disk Drive. It is typically used in various virtualization packages, and can be used to install a wide variety of operating systems. A Virtual Hard Disk
allows multiple operating systems to reside on a single host machine. This method enables developers to test software on different operating systems.
VHDs are implemented as files that reside on the native host file system.
Native VHD Boot refers to the ability of a physical computer to mount and boot from an operating system contained within a VHD. Windows 10 supports this ability using VHDX files, both with and without a host operating system to be present.
Question 180:
Which of the following servers is used to store and forward e-mail messages using several protocols, including SMTP, POP3, and IMAP?
A. File server
B. Monitoring server
C. Database server
D. Mail server
Correct Answer: D
A mail server is a program used to store and forward e-mail messages using several protocols, including SMTP, POP3, and IMAP. A mail server is also recognized by the names, such as a mail transfer agent or MTA, a mail transport agent, a mail router, and an Internet mailer. It works with other programs to build a messaging system.
Incorrect Answers:
A: A file server on a network is a computer configured to provide a central network location for users to store files and share them with other users on the network.
B: A monitoring server is used to monitor the network and servers for intruders or other security breaches.
C: A database server is a computer program that provides database services to other computer programs or computers, as defined by the client-server model. The term may also refer to a computer dedicated to running such a program. Database management systems frequently provide database server functionality, and some DBMSs (e.g., MySQL) rely exclusively on the client-server model for database access.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-365 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.