Ie160 Final

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ryanbecker24
R
Ryanbecker24
Community Contributor
Quizzes Created: 7 | Total Attempts: 6,399
| Attempts: 1,554 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. The Docker application must be installed in order to work with Windows Containers?

Explanation

The Docker application must be installed in order to work with Windows Containers because Docker provides a platform that allows for the creation, deployment, and management of containers. Windows Containers are a type of containerization technology that enables the running of applications in isolated environments. Docker provides the necessary tools and infrastructure to build, package, and run containers, including Windows Containers. Without Docker, it would not be possible to effectively utilize Windows Containers.

Submit
Please wait...
About This Quiz
Computer Quizzes & Trivia

IE160 Final assesses knowledge in Windows Server management, focusing on high availability, containerization, and cluster configurations. It tests skills in Docker and Hyper-V, essential for network administrators managing... see moremodern infrastructure. see less

2. Microsoft Baseline Security Analyzer (MBSA) is a utility you can download from the Microsoft website to ensure that you have the most current security updates

Explanation

The given statement is true. Microsoft Baseline Security Analyzer (MBSA) is indeed a utility that can be downloaded from the Microsoft website. Its purpose is to help users ensure that their systems have the latest security updates. By scanning the system and comparing it against a database of known security issues, MBSA can identify missing security updates and provide recommendations for remediation. Therefore, the statement is correct.

Submit
3. In Windows Server 2016, dynamic quorum management is enabled by default.

Explanation

In Windows Server 2016, dynamic quorum management is enabled by default. This means that the cluster automatically adjusts the quorum based on the number of nodes that are currently active in the cluster. It helps in maintaining the availability and stability of the cluster by dynamically adjusting the quorum configuration as the cluster membership changes. This feature eliminates the need for manual intervention to adjust the quorum configuration and ensures that the cluster remains operational even in case of node failures or network outages.

Submit
4. When choosing a quorum disk witness, the disk cannot be used in a Cluster Shared Volume (CSV)?

Explanation

When choosing a quorum disk witness, it cannot be used in a Cluster Shared Volume (CSV). This is because the quorum disk witness is responsible for maintaining the cluster's quorum configuration and ensuring that there is always a majority of votes available in the cluster. If the quorum disk is also used in a CSV, it can lead to conflicts and potential loss of quorum, which can result in cluster instability and failure. Therefore, it is recommended to use a separate disk for the quorum disk witness to ensure its proper functioning.

Submit
5. The Azure Container Service uses open-source scheduling and management tools?

Explanation

The Azure Container Service does indeed use open-source scheduling and management tools. It supports popular open-source container orchestration systems such as Kubernetes, DC/OS, and Docker Swarm. These tools provide flexible and scalable options for deploying and managing containers in Azure. Therefore, the correct answer is true.

Submit
6. WSUS allows for automatic approvals which could potentially cause problems in the network in the event that an update patch breaks one of the business applications.

Explanation

WSUS (Windows Server Update Services) is a Microsoft tool that allows administrators to manage the distribution of updates released through Microsoft Update to computers in a corporate environment. It can automatically approve updates for installation on client machines. However, this automation can lead to problems if an update patch breaks one of the business applications running on those machines. Therefore, the statement is true as automatic approvals in WSUS can potentially cause network problems if an update patch disrupts the functionality of a business application.

Submit
7. What is the maximum number of nodes that can participate in a Windows Server 2016 failover cluster?

Explanation

The maximum number of nodes that can participate in a Windows Server 2016 failover cluster is 64. This means that up to 64 servers can be part of the cluster, allowing for high availability and failover capability in case of a server failure. Having a larger number of nodes in the cluster increases the resilience and capacity of the cluster, ensuring that there are enough resources available to handle the workload and provide uninterrupted service.

Submit
8. You have been asked to start using Windows containers in your organization. Your manager wants to know what client operating systems will allow for containers?

Explanation

Windows containers can only be used on Windows 10 Enterprise (Anniversary Edition) client operating system. Windows 7 Professional, Windows 8.1 Enterprise, and Windows 10 Home do not support containers.

Submit
9. You need to disconnect a user running applications on a server. Which application can you use to disconnect a user currently connected to the server?

Explanation

The Task Manager application can be used to disconnect a user currently connected to the server. Task Manager provides information about the processes and applications running on the server, and allows the user to end or disconnect these processes. Therefore, it is the appropriate application to use in order to disconnect a user from the server.

Submit
10. In a four-node cluster set to a Node And File Share Majority quorum model, how many votes can be lost before a quorum is lost?

Explanation

In a four-node cluster set to a Node And File Share Majority quorum model, a quorum is lost when more than half of the votes are lost. Since there are four nodes in the cluster, the total number of votes is four. Therefore, if two votes are lost, which is more than half of the total votes, a quorum is lost.

Submit
11. You open Event Viewer and see a blue icon next to the event. What does the blue icon mean?

Explanation

The blue icon next to the event in Event Viewer indicates that it is an informational event. Informational events provide useful and non-critical information about the system or an application. These events are typically used for diagnostic purposes and do not indicate any errors or warnings.

Submit
12. What command line command would you type to start Resource Monitor?

Explanation

To start Resource Monitor, the correct command line command would be "Resmon.exe". Resource Monitor is a system utility in Windows that provides detailed information about the usage of hardware resources such as CPU, memory, disk, and network. By typing "Resmon.exe" in the command line, the Resource Monitor application will be launched, allowing the user to monitor and analyze resource usage on their system.

Submit
13. While setting up WSUS, you need to configure the server from which you will be getting your Microsoft updates. Under which option would you set this up?

Explanation

In order to configure the server from which you will be getting your Microsoft updates while setting up WSUS, you would need to choose the option "Update Source And Proxy Server". This option allows you to specify the location or server from where the updates will be downloaded and also configure any proxy server settings if required.

Submit
14. You are the administrator of a large organization. While setting up your Windows Server 2016 domain controller, you are creating a data recovery strategy that must meet the following requirements:
  • Back up all data files and folders in C:\Data
  • Restore individual files and folders in C:\Data
  • Ensure that data is backed up to and restored from external media
What should you do?

Explanation

The Windows Server Backup tool is specifically designed for backing up and restoring files and folders in Windows Server 2016. It allows you to create a backup of the C:\Data directory, which meets the requirement of backing up all data files and folders. Additionally, it also provides the capability to restore individual files and folders, fulfilling the second requirement. Finally, the Windows Server Backup tool supports backing up and restoring data to and from external media, which satisfies the third requirement. Therefore, using the Windows Server Backup tool is the most appropriate choice in this scenario.

Submit
15. You are the administrator for a large organization that wants to implement site-aware clustering. What two PowerShell commands would you use to help you set up site-aware clustering? A) (Get-Cluster). CrossSiteDelay = <value> B) (Get-Cluster). CrossSiteThreshold = <value> ​​​​​​​C) (Add-Cluster). CrossSiteDelay = <value> ​​​​​​​D) (Add-Cluster). CrossSiteThreshold = <value>

Explanation

The correct answer is A, B. The administrator can use the PowerShell commands (Get-Cluster).CrossSiteDelay = and (Get-Cluster).CrossSiteThreshold = to set up site-aware clustering. These commands allow the administrator to configure the delay and threshold values for cross-site communication in the clustering setup. By setting appropriate values for these parameters, the administrator can ensure that the clustering system functions effectively across multiple sites.

Submit
16. You are the administrator for your organization, which has started using containers. You need to build a new image using Windows Server Core. What command would you use to get a Windows Server Core image?

Explanation

The correct answer is "docker pull microsoft/windowsservercore". This command is used to pull an image from the Docker registry. In this case, it will pull the Windows Server Core image from the Microsoft repository, which can then be used to build containers based on Windows Server Core.

Submit
17. Windows Server 2016 does not allow you to set up a cluster without using Active Directory dependencies?

Explanation

Windows Server 2016 does allow you to set up a cluster without using Active Directory dependencies. Active Directory is not a mandatory requirement for creating a cluster in Windows Server 2016. You can choose to set up a cluster using other authentication methods such as certificate-based authentication or local accounts. Therefore, the statement that Windows Server 2016 does not allow setting up a cluster without Active Directory dependencies is false.

Submit
18. You are the network administrator for a company that has decided to start using Windows Containers. You have created some images. What command allows you to see your images?

Explanation

The correct answer is "docker images". This command allows the network administrator to view the images that have been created for the Windows Containers. By running this command, the administrator can see a list of all the available images and their details, such as the image ID, repository, tag, and size. It is an essential command for managing and organizing the images in the Docker environment.

Submit
19. What is the mechanism that is used in clustering to see if a node is online or if the node is not responding?

Explanation

In clustering, the mechanism used to determine if a node is online or not responding is called a heartbeat. A heartbeat is a signal or message sent from one node to another to indicate that it is still functioning properly. If a node does not receive a heartbeat from another node within a certain time frame, it can conclude that the node is not responding or offline. This allows the clustering system to detect and handle failures or unresponsive nodes effectively.

Submit
20. As an administrator, you need to create highly available storage spaces that connect to directly attached storage on the hosts. Which PowerShell command would you use?

Explanation

Enable-ClusterStorageSpacesDirect is the correct answer because this PowerShell command is used to enable Storage Spaces Direct on a cluster. Storage Spaces Direct is a feature in Windows Server that allows administrators to create highly available and scalable software-defined storage using directly attached storage on the hosts. By enabling Cluster Storage Spaces Direct, administrators can create a storage pool that aggregates the storage capacity of multiple servers and provides fault tolerance and high availability for virtual machines and applications.

Submit
21. Which of the following applications would be better suited on a failover cluster instead of a network load-balanced cluster? (Check all that apply) A) SQL Server B) Website C) Exchange Mailbox Server D) VPN services

Explanation

SQL Server and Exchange Mailbox Server would be better suited on a failover cluster instead of a network load-balanced cluster. This is because these applications require high availability and data integrity, which can be better achieved through failover clustering. A failover cluster ensures that if one node fails, another node takes over seamlessly, minimizing downtime and ensuring continuous availability of the application and its data. On the other hand, a network load-balanced cluster is more suitable for applications like websites, where the focus is on distributing incoming network traffic evenly across multiple servers to improve performance and scalability.

Submit
22. You have a Windows Server 2016 server named Server. You install the Docker daemon on Server1. You need to configure the Docker daemon to accept connections only on TCP port 64500. What should you do?  

Explanation

To configure the Docker daemon to accept connections only on TCP port 64500, you need to edit the daemon.json file. This file contains the configuration settings for the Docker daemon, and by editing it, you can specify the port on which the daemon should listen for incoming connections. By making the necessary changes to the daemon.json file, you can ensure that the Docker daemon only accepts connections on TCP port 64500.

Submit
23. You are the administrator for a mid-size company who wants to set up and test a cluster. What PowerShell command would you use to run a validation test on a cluster?

Explanation

The correct answer is Test-Cluster. This PowerShell command is used to run a validation test on a cluster. It allows the administrator to check the health and functionality of the cluster by performing various tests on the cluster nodes and resources. This command helps to ensure that the cluster is set up correctly and can handle the workload it is intended for.

Submit
24. You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers have the most current software installed for their operating systems, including software in the categories Critical Updates and Service Packs, Windows Server 2016 Family, and Driver Updates. You want to automate the process as much as possible, and you want the client computers to download the updates from a central server that you are managing. You decide to use Windows Server Update Services. The WSUS server software has been installed on a server called WSUSServer. You want to test the client should use WSUSServer for Windows Update? (Choose all that apply.)
  • A) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 0 data
  • B) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify 1 for data
  • C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer, and specify WSUSServer
  • C) Use HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer, and specify https://WSUSServer

Explanation

The correct answer is B, D. In order to configure the client computers to use the WSUS server for Windows Update, you need to modify the registry settings. Option B suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\AU\UseWUServer and setting the value to 1, which enables the use of the WSUS server. Option D suggests using the registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsUpdate\UseWUServer and setting the value to the URL of the WSUS server, which specifies the server to be used for Windows Update.

Submit
25. You have a Windows Server 2016 Hyper-V failover cluster that contains two nodes named NodeA and NodeB. On NodeA, you create a virtual machine named VM01 by using Hyper-V Manager. You need to configure VM01 to move to NodeB automatically if NodeA becomes unavailable. What should you do?

Explanation

To configure VM01 to move to NodeB automatically if NodeA becomes unavailable, you should run the PowerShell command Enable-VMReplication. This command enables replication for the virtual machine, allowing it to be replicated to another node in the failover cluster. By doing so, if NodeA becomes unavailable, VM01 will automatically failover to NodeB to ensure continuous availability.

Submit
26. You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to execute commands within the Dockerfile. What command would you use?

Explanation

The correct answer is "Docker build". When building a Docker image, the Docker build command is used to create a new image from a Dockerfile. The Dockerfile contains instructions on how to build the image, such as installing dependencies, copying files, and setting environment variables. The Docker build command reads these instructions and executes them, resulting in a new image that can be used to run containers.

Submit
27. In a three node cluster set to a Node Majority quorum model, how many cluster nodes can be offline before the quorum is lost?

Explanation

In a three node cluster set to a Node Majority quorum model, the quorum is lost when more than half of the nodes are offline. Since there are three nodes in total, the majority is two. Therefore, only one node can be offline before the quorum is lost.

Submit
28. If you have a running cluster and need to run the Validate a Configuration Wizard again, which of the following tests may require cluster resources to be taken offline?

Explanation

Storage tests may require cluster resources to be taken offline because these tests involve checking the health and functionality of the storage system in the cluster. To perform these tests accurately, the cluster may need to temporarily stop accessing and using the storage resources. This ensures that the tests can accurately detect any issues or potential problems with the storage configuration. Taking the cluster resources offline during storage tests helps prevent any conflicts or interference that could affect the accuracy of the test results.

Submit
29. You are the network administrator for a company that has decided to sttart using Windows Containers. You want to create a new container. What command allows you to create a container?

Explanation

The correct answer is "docker create". This command allows the network administrator to create a new container in Windows Containers.

Submit
30. You are responsible for managing several Windows Server 2016 domain controller computers in your environment. Recently, a single hard disk on one of these machines failed, and the Active Directory database was lost. You want to perform the following tasks:
  • Determine which partitions on the server are still accessible
  • Restore as much of the system configuration (including the Active Directory database) as possible
Which of the following could be used to help meet these requirements?

Explanation

A valid system state backup from the server could be used to meet the requirements mentioned. A system state backup includes critical system files, including the Active Directory database. By restoring the system state backup, the lost Active Directory database can be recovered. Additionally, the system state backup can also help in determining which partitions on the server are still accessible as it includes information about the system's configuration.

Submit
31. Your manager has decided that your organization needs to use an Active Directory application data partition. Which command can you use to create and manage application data partitions?

Explanation

NTDSUtil.exe is the correct command to create and manage application data partitions in Active Directory. NTDSUtil.exe is a command-line tool that is used to perform various maintenance and management tasks in Active Directory, including creating and managing application data partitions. It allows administrators to manage the Active Directory database, perform offline defragmentation, and manage metadata. Therefore, NTDSUtil.exe is the appropriate command for creating and managing application data partitions in Active Directory.

Submit
32. You need to view which users are running applications on a server. Which application can you use to see what users are currently connected to the server?

Explanation

Task Manager is the correct answer because it provides real-time information about the processes and applications running on a server. It allows users to view the currently connected users and the resources they are consuming. Task Manager also provides details about CPU, memory, disk, and network usage, making it a useful tool for monitoring and managing server performance.

Submit
33. You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you want to watch the CPU and Memory. Which tool can you use to get the most detained information about the resources?

Explanation

Performance Monitor is the tool that can provide the most detailed information about the CPU and Memory resources on the network. It allows the network administrator to monitor and analyze various performance counters such as CPU usage, memory usage, disk activity, network activity, and more. This tool provides real-time monitoring and also allows for data logging and analysis over time, helping the administrator identify performance bottlenecks, troubleshoot issues, and optimize resource utilization.

Submit
34. You are the network administrator for a large organization. You need to watch some of the main components on a server. These include the Memory, CPU, Network, and Disk. What utility can you use to get a quick overview of these four components?

Explanation

Resource Monitor is the utility that can provide a quick overview of the Memory, CPU, Network, and Disk components on a server. It allows the network administrator to monitor and analyze the performance of these components in real-time. Resource Monitor provides detailed information about the resource usage, processes, and services running on the server, helping the administrator to identify any performance issues or bottlenecks.

Submit
35. You need to stop an application from running in Task Manager. Which tab would you use to stop an application from running?

Explanation

To stop an application from running in Task Manager, you would use the "Details" tab. This tab provides a list of all the running processes and applications on the system. From here, you can locate the specific application you want to stop and right-click on it to select the "End Task" option. This will terminate the application and stop it from running. The other tabs mentioned, such as Performance, Users, and Options, do not have the functionality to stop applications directly.

Submit
36. You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are able to recover individual user files that are replaced or deleted during the installation. What should you do?

Explanation

To back up the existing data on a computer before installing a new application and ensure the ability to recover individual user files, the recommended action is to use the Windows Server Backup utility and click the "Backup Once" link. This will initiate a backup process that will create a copy of the data, allowing for easy restoration if any files are replaced or deleted during the installation of the new application.

Submit
37. What command line command would you type to start Performance Monitor?

Explanation

To start Performance Monitor, the correct command line command to type is "Perfmon.exe".

Submit
38. You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. All client computers run Windows 10. The company has 16 mobile sales representatives who are all members of the Power Users local group on their computers. From 6 pm until 7 am, the sales representatives' laptops are usually turned off and disconnected from the corporate network. The mobile sales representatives' computers must receive software updates every day with minimal user interaction. While verifying the recent updates on one of the laptops, you notice that the updates from the Windows Update servers were not applied. On the Automatic Updates tab of the System Properties dialog box of the mobile computer, what should you do to make sure that software updates are applied to the computer?
  • A) Select the option Automatically Download The Updates, And Install Them On The Schedule That I Specify
  • B) Select the option Notify Me Before Downloading Any Updates And Notify Me Again Before Installing Them On My Computer
  • C) Select the Keep My Computer Up To Date check box
  • D) Set the scheduled time to every day at 12 pm

Explanation

To ensure that software updates are applied to the computer, the network administrator should select the option "Automatically Download The Updates, And Install Them On The Schedule That I Specify" on the Automatic Updates tab of the System Properties dialog box. This will allow the updates to be downloaded and installed automatically without requiring any user interaction. Additionally, the administrator should also select the option "Keep My Computer Up To Date" to ensure that the computer stays updated with the latest software updates. Setting the scheduled time to every day at 12 pm is not necessary as the laptops are usually turned off and disconnected from the network during that time.

Submit
39. You are the administrator of a new Windows Server 2016 machine. You need to install WSUS. From where do you install WSUS?

Explanation

To install WSUS on a new Windows Server 2016 machine, you would use the Server Manager. The Server Manager is a management console that allows administrators to install, configure, and manage server roles and features. It provides a centralized location for managing multiple servers and their associated roles and features. Therefore, the correct answer is Server Manager.

Submit
40. You have a server named Server1 that runs Windows Server 2016. Server1 hosts an application named App1. App1 has a memory leak that occasionally causes the application to consume an excessive amount of memory. You need to log an event in the Application event log whenever App1 consume more than 4 GB of memory. If you create a performance counter data collector, it will show you the information you are looking for?

Explanation

Creating a performance counter data collector will not provide the information needed in this scenario. Performance counters are used to monitor system performance and collect data such as CPU usage, disk activity, and network traffic. They are not designed to specifically monitor memory usage by a specific application like App1. To log an event in the Application event log when App1 consumes more than 4 GB of memory, a different approach such as using a custom script or monitoring tool would be required.

Submit
41. The WSUS server must have _________ of space for the installation and __________ of space to hold the updates

Explanation

The WSUS server must have at least 100 MB of space for the installation process. Additionally, it needs a minimum of 6 GB of space to hold the updates that will be downloaded and stored on the server. This ensures that the server has enough storage capacity to accommodate the installation and the updates that will be applied to the client devices.

Submit
42. You have a Nano Server named Nano1. You deploy several containers to Nano1 that use an image named Image1. You need to deploy a new container to Nano1 that uses Image1. What should you run?

Explanation

To deploy a new container to Nano1 using Image1, you should run the "docker run" command. This command is used to create and start a new container based on a specified image. By running "docker run", you can deploy a container that uses the Image1 on Nano1.

Submit
43. You are the administrator for your organization, which has started using containers. You need to build and use a Dockerfile. You need to compile and create an image using the Dockerfile. What command would you use?

Explanation

The correct answer is "Docker build". To compile and create an image using a Dockerfile, the "Docker build" command is used. The "Docker run" command is used to run a container from an image, "Docker rm" is used to remove a container, and "Docker Compile" is not a valid Docker command.

Submit
44. You have been hired as a consultant to research a network related problem at a small organization. The environment supports many custom-developed applications that are not well documented. A manager suspects that some computers on the network are generating excessive traffic and bogging down the network. You want to do the following:
  • Determine which computers are causing the problems
  • Record and examin network packets that are coming to/from specific machines
  • View data related only to specific types of network packets.
What tool should you use to accomplish all the requirements?

Explanation

Microsoft Message Analyzer is the correct tool to use in this scenario because it allows you to determine which computers are causing the network problems by capturing and analyzing network packets. It also provides the ability to record and examine network packets that are coming to/from specific machines, as well as filter and view data related only to specific types of network packets. Performance Monitor, Event Viewer, and Task Manager do not provide the same level of functionality and flexibility for network packet analysis.

Submit
45. You are the network administrator for a company that has decided to start using Windows Containers. You want to delete a container. What PowerShell command allows you to delete a container?

Explanation

The correct answer is "Remove-Container". This PowerShell command allows the network administrator to delete a container in Windows Containers. The other options ("docker delete", "Delete-docker-Container", and "docker kill container") are not valid PowerShell commands for deleting a container.

Submit
46. You are the administrator of a large company, and you need to ensure that you can recover your Windows Server 2016 Active Directory configuration and data if the computer's hard disk fails. What should you do?

Explanation

Creating a complete PC Backup and Restore image is the best option in this scenario because it allows for the recovery of the entire Windows Server 2016 Active Directory configuration and data in case of a hard disk failure. This image includes the operating system, system settings, applications, and data, providing a comprehensive backup solution. Automated System Recovery (ASR) backup is not available in Windows Server 2016, and creating a backup of all file categories or creating a system restore point may not capture all the necessary components for a full recovery.

Submit
47. You are the network administrator for a company that has decided to start using Windows Containers. You have build a bunch of containers. What PowerShell command allows you to view the containers?

Explanation

The correct answer is Get-Container. This PowerShell command is used to view the containers in Windows Containers. By running this command, the network administrator can retrieve information about the containers that have been built and are currently running on the system.

Submit
48. You are the network administrator for a Fortune 500 company. You are responsible for all client computers at the central campus. You want to make sure that all of the client computers are secure. You decide to use MBSA to scan your client computers for possible security violations. You want to use the command line version of MBSA to scan your computers based on IP address. Which of the following commands should you use? 

Explanation

The correct answer is "mdsacli.exe /hf -i xxxx.xxxx.xxxx.xxxx". This command is the correct syntax for using the command line version of MBSA to scan client computers based on IP address. The "/hf" flag specifies a high-level scan, and the "-i" flag is used to specify the IP address of the target computer.

Submit
49. You need to install Microsoft Baseline Security Analyzer. How do you need to do the install?

Explanation

To install Microsoft Baseline Security Analyzer (MBSA), you need to download it from Microsoft's website. This implies that the software is not available through the Add/Remove Programs or Server Manager. Therefore, the correct method to install MBSA is by downloading it directly from Microsoft's website.

Submit
50. You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. Windows Server Update Services (WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software updates from Microsoft Windows Update servers. You manually synchronized SERVERB with the Windows Update servers, and now you need to complete the WSUS configuration on SERVERB. Which of the following is not a step you might take to complete the configuration of WSUS on SERVERB?

Explanation

Setting SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from is not a step you might take to complete the configuration of WSUS on SERVERB. This is because the question states that SERVERA receives software updates from Microsoft Windows Update servers, which means it is not configured to draw updates from any other source. Therefore, setting SERVERB to draw updates automatically from SERVERA would not be a valid configuration step.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 23, 2018
    Quiz Created by
    Ryanbecker24
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The Docker application must be installed in order to work with Windows...
Microsoft Baseline Security Analyzer (MBSA) is a utility you can...
In Windows Server 2016, dynamic quorum management is enabled by...
When choosing a quorum disk witness, the disk cannot be used in a...
The Azure Container Service uses open-source scheduling and management...
WSUS allows for automatic approvals which could potentially cause...
What is the maximum number of nodes that can participate in a Windows...
You have been asked to start using Windows containers in your...
You need to disconnect a user running applications on a server. Which...
In a four-node cluster set to a Node And File Share Majority quorum...
You open Event Viewer and see a blue icon next to the event. What does...
What command line command would you type to start Resource Monitor?
While setting up WSUS, you need to configure the server from which you...
You are the administrator of a large organization. While setting up...
You are the administrator for a large organization that wants to...
You are the administrator for your organization, which has started...
Windows Server 2016 does not allow you to set up a cluster without...
You are the network administrator for a company that has decided to...
What is the mechanism that is used in clustering to see if a node is...
As an administrator, you need to create highly available storage...
Which of the following applications would be better suited on a...
You have a Windows Server 2016 server named Server. You install the...
You are the administrator for a mid-size company who wants to set up...
You are the network administrator for a Fortune 500 company. You are...
You have a Windows Server 2016 Hyper-V failover cluster that contains...
You are the administrator for your organization, which has started...
In a three node cluster set to a Node Majority quorum model, how many...
If you have a running cluster and need to run the Validate a...
You are the network administrator for a company that has decided to...
You are responsible for managing several Windows Server 2016 domain...
Your manager has decided that your organization needs to use an Active...
You need to view which users are running applications on a server....
You are the network administrator for your company. You want to look...
You are the network administrator for a large organization. You need...
You need to stop an application from running in Task Manager. Which...
You need to back up the existing data on a computer before you install...
What command line command would you type to start Performance Monitor?
You are the network administrator for your company. The network...
You are the administrator of a new Windows Server 2016 machine. You...
You have a server named Server1 that runs Windows Server 2016. Server1...
The WSUS server must have _________ of space for the installation and...
You have a Nano Server named Nano1. You deploy several containers to...
You are the administrator for your organization, which has started...
You have been hired as a consultant to research a network related...
You are the network administrator for a company that has decided to...
You are the administrator of a large company, and you need to ensure...
You are the network administrator for a company that has decided to...
You are the network administrator for a Fortune 500 company. You are...
You need to install Microsoft Baseline Security Analyzer. How do you...
You are a network administrator for your company. The network consists...
Alert!

Advertisement