Windows Routing Tables Trivia Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ryanbecker24
R
Ryanbecker24
Community Contributor
Quizzes Created: 7 | Total Attempts: 6,399
| Attempts: 561 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. Which Windows tool is used to provide routing?

Explanation

Routing and Remote Access is the correct answer because it is a Windows tool that is used to provide routing functionality. It allows a computer to act as a router, enabling it to forward network traffic between different networks or subnets. This tool is commonly used in scenarios where multiple networks need to be connected and data needs to be routed between them. It provides features such as Network Address Translation (NAT), DHCP relay, and VPN server capabilities, making it a versatile tool for managing network routing in Windows environments.

Submit
Please wait...
About This Quiz
Windows Routing Tables Trivia Quiz - Quiz

Dive into the Windows routing tables Trivia Quiz to enhance your knowledge on securing DFS Namespaces, VPN encryption, and using Windows Server as a router. This quiz is... see moreideal for those preparing for IT certifications or managing network configurations. see less

2. Server virtualization in Windows Server 2016 is based on a module called:

Explanation

Server virtualization in Windows Server 2016 is based on a module called Hyper-V. Hyper-V is a hypervisor-based virtualization technology that allows multiple virtual machines to run on a single physical server. It provides the ability to create, manage, and run virtual machines, allowing for better utilization of hardware resources and increased flexibility in managing server workloads. Hyper-V is a key component of Microsoft's virtualization strategy and is widely used in enterprise environments for consolidating servers and optimizing resource allocation.

Submit
3. Your company has two a server called FS1. FS1 has a folder named Folder1 that contains MS Excel financial files. After several days, you discover that random Word and PowerPoint files are showing up. You need to ensure that all of the files in Folder1 are MS Excel file format, how can you do this?

Explanation

By creating a file screen using FSRM (File Server Resource Manager), you can restrict the file types that can be saved in the shared folder. This means that only MS Excel file formats will be allowed, preventing any random Word or PowerPoint files from being saved. FSRM helps in enforcing file management policies and ensures that the desired file types are maintained in the folder.

Submit
4. In which of the following situations is it appropriate to use Windows Server 2016 as a router between two networks?

Explanation

Windows Server 2016 can be used as a router between two networks for light traffic on small networks. This means that if the networks have low data transfer requirements and a limited number of devices, Windows Server 2016 can efficiently handle the routing tasks. However, for heavy traffic or large networks, it may not be suitable as it may not have the necessary capacity and performance capabilities to handle the increased load.

Submit
5. How are routing tables created dynamically?

Explanation

Routing tables are created dynamically by using a routing protocol. A routing protocol is a set of rules and algorithms that enable routers to exchange information and dynamically update their routing tables. These protocols allow routers to communicate with each other, share information about network topology, and determine the most efficient paths for forwarding data packets. By continuously exchanging and updating routing information, routers can adapt to changes in network conditions, such as link failures or new network connections, and dynamically update their routing tables to ensure efficient and reliable packet forwarding.

Submit
6. Which VPN feature prevents readable access to data without possession of the appropriate key?

Explanation

Encryption is the correct answer because it is a VPN feature that ensures that data cannot be accessed or read without the appropriate key. Encryption involves encoding the data in such a way that it can only be decoded or decrypted with the correct key. This ensures that even if someone intercepts the data, they will not be able to understand or access it without the encryption key, providing a high level of security and privacy for the data being transmitted over the VPN.

Submit
7. Which authentication method is the weakest (least secure)?

Explanation

PAP (Password Authentication Protocol) is the weakest authentication method among the options provided. PAP sends the password in clear text, without any encryption or protection, making it vulnerable to interception and unauthorized access. In contrast, CHAP (Challenge Handshake Authentication Protocol) and MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2) use stronger encryption and mutual authentication mechanisms. EAP (Extensible Authentication Protocol) is a framework that supports multiple authentication methods, some of which can provide stronger security than PAP.

Submit
8. Which of the following can use to show a list of duplicate files on a volume?

Explanation

Reports can be used to show a list of duplicate files on a volume. Reports provide a comprehensive overview of the files and their attributes on a volume, allowing users to identify duplicate files by comparing their names, sizes, or other characteristics. By generating a report, users can easily identify and manage duplicate files, freeing up storage space and improving file organization. Disk quotas, file screens, and folder quotas do not specifically focus on identifying duplicate files, making them less suitable for this purpose.

Submit
9. Which of the following is the primary difference between domain-based namespace and stand-alone namespace?

Explanation

The primary difference between domain-based namespace and stand-alone namespace is where the namespaces are stored. In a domain-based namespace, the namespace information is stored in Active Directory, allowing for centralized management and access control. On the other hand, in a stand-alone namespace, the namespace information is stored on individual servers, making it more decentralized and potentially less scalable.

Submit
10. RRAS has multiple options available to select one or more services to provide users. Which of the following is the correct description for the Network Address Translation (NAT) option?

Explanation

The correct description for the Network Address Translation (NAT) option is that it sets up the server to provide NAT services to clients on a private network that need to access the internet. This means that the server will translate the private IP addresses of the clients to a public IP address when accessing the internet, allowing them to communicate with external networks while maintaining their privacy.

Submit
11. Which of the following is the primary disadvantage of DFS Replication?

Explanation

DFS Replication is a feature in Windows Server that allows files to be replicated between servers for redundancy and availability. The primary disadvantage of DFS Replication is that it requires additional storage space. This is because the replicated files are stored on multiple servers, which increases the overall storage requirements. The more servers involved in the replication, the more storage space is needed. However, this disadvantage is offset by the benefits of redundancy and availability provided by DFS Replication.

Submit
12. Which mode of BranchCache conifguration uses one or more dedicated servers to provide the cached copy in the branch office?

Explanation

Hosted cache mode is the correct answer because it involves using one or more dedicated servers to provide the cached copy in the branch office. In this mode, the cache is hosted on a server located in the branch office, allowing clients in the same office to access the cached content locally. This mode is suitable for branch offices that have a reliable server infrastructure and can provide efficient caching services to the clients.

Submit
13. Which type of screening prevents users from saving the defined unauthorized files?

Explanation

Active screening is a type of screening that actively monitors and restricts user actions to prevent the saving of unauthorized files. It involves implementing security measures such as access controls, data loss prevention systems, and content filtering to detect and block any attempts to save files that are not permitted or violate organizational policies. By actively monitoring user activities and enforcing restrictions, active screening helps to ensure that only authorized files are saved, enhancing data security and preventing unauthorized access or leakage of sensitive information.

Submit
14. On Windows, which command is used to view and define static routes?

Explanation

The correct answer is "Route." On Windows, the "Route" command is used to view and define static routes. This command allows users to manually configure the routing table, specifying the destination network, subnet mask, gateway, and metric. By using the "Route" command, users can control the flow of network traffic and determine the most efficient path for data packets to reach their destination.

Submit
15. Which of the following is the primary graphical tool for creating and managing virtual machines?

Explanation

Hyper-V Manager is the primary graphical tool for creating and managing virtual machines. It allows users to create, configure, and manage virtual machines and their resources. With Hyper-V Manager, users can easily create new virtual machines, modify their settings, start or stop them, and monitor their performance. It provides a user-friendly interface for managing virtual machines, making it the preferred tool for virtualization management.

Submit
16. Which of the following DON'T you perform when you change a quota template?

Explanation

When changing a quota template, you do not perform any actions related to the "File type." Changing a quota template typically involves modifying settings such as the warning level, hard vs soft limits, and size limits. However, file type is not a parameter that is typically adjusted when changing a quota template.

Submit
17. Which type of quota used with FSRM prevents users from saving files when the quota is exceeded?

Explanation

A hard quota is a type of quota used with FSRM (File Server Resource Manager) that prevents users from saving files when the quota is exceeded. This means that once the allocated storage limit is reached, users will no longer be able to save any additional files until they either delete existing files or request additional storage space. Unlike soft quotas, which only generate warnings when the limit is exceeded, hard quotas enforce strict limitations on file storage and help maintain disk space management. Therefore, the correct answer is hard quota.

Submit
18. How many virtual adapters are included by default, after creating a VM?

Explanation

After creating a VM, only one virtual adapter is included by default. This virtual adapter allows the VM to connect to the network and communicate with other devices. Additional virtual adapters can be added if needed, but the default configuration includes only one.

Submit
19. Which of the following do you use to simplify the management of file screens?

Explanation

A file screen template is used to simplify the management of file screens. It provides a predefined set of rules and settings that can be applied to multiple file screens, making it easier to enforce consistent file screening policies across an organization. This template allows administrators to quickly create and apply file screens without having to manually configure each screen individually. By using a file screen template, administrators can streamline the process of managing file screens and ensure that the desired restrictions and notifications are consistently applied to files.

Submit
20. DFS Namespace shared folders are reffered to as which of the following in relation to the virtual folders?

Explanation

DFS Namespace shared folders are referred to as "Targets" in relation to the virtual folders. This term is used to indicate that these shared folders are the destinations or endpoints that the DFS Namespace points to. When a client accesses a DFS Namespace, it is redirected to one of the available targets, which are the shared folders, to access the files or resources within them. Therefore, the correct answer is "Targets".

Submit
21. Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?

Explanation

Data integrity is the VPN feature that ensures that a transferred message was sent and received by the two parties claiming to have sent and received the message. Data integrity ensures that the data remains intact and unaltered during transmission, preventing any unauthorized modifications or tampering. This feature verifies the integrity of the data, providing assurance that it has not been modified or corrupted during transit.

Submit
22. In which NLB cluster operation mode is the MAC address of every node's network adapter replaced with a single shared MAC address?

Explanation

In Unicast mode, the MAC address of every node's network adapter is replaced with a single shared MAC address. This allows the NLB cluster to appear as a single server to the clients, improving load balancing and fault tolerance. In this mode, the cluster nodes receive and process all incoming requests, and the load is distributed among them.

Submit
23. Which of the following can be used to add Network Load Balancing (NLB) to a Windows Server 2016 computer?

Explanation

Server Manager can be used to add Network Load Balancing (NLB) to a Windows Server 2016 computer. Server Manager is a management console that allows administrators to manage and configure various server roles and features, including NLB. It provides a centralized interface to install, configure, and manage server roles and features on remote and local servers. Therefore, using Server Manager, administrators can easily add NLB to a Windows Server 2016 computer.

Submit
24. Which of the following technologies transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name?

Explanation

Network Load Balancing is a technology that transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name. This allows for efficient utilization of server resources and ensures high availability and scalability of the network. By evenly distributing incoming requests, Network Load Balancing prevents any single server from being overwhelmed and ensures that the workload is evenly distributed across the servers in the cluster.

Submit
25. Which of the following terms is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or name space server when the user with targets"?

Explanation

Referral is the correct answer because it refers to an ordered list of servers or targets that a client computer receives from a domain controller or name space server when the user with targets. This list helps the client computer determine which server or target to connect to for a specific task or request.

Submit
26. How do you secure DFS Namespaces?

Explanation

To secure DFS (Distributed File System) Namespaces, both NFS (Network File System) and shared folder permissions are required. NFS permissions are necessary to control access to the files and folders within the DFS Namespace, while shared folder permissions are needed to restrict access to the shared folders themselves. By properly configuring both NFS and shared folder permissions, the DFS Namespace can be secured effectively.

Submit
27. Which VPN tunneling protocol uses IPsec with 3DES for data confidentiality?

Explanation

L2TP (Layer 2 Tunneling Protocol) is the correct answer. L2TP uses IPsec (Internet Protocol Security) with 3DES (Triple Data Encryption Standard) for data confidentiality. IPsec provides secure communication over the internet by encrypting the data packets. 3DES is a symmetric encryption algorithm that applies the Data Encryption Standard (DES) algorithm three times to each data block, making it more secure. Therefore, L2TP with IPsec and 3DES ensures the confidentiality of data transmitted through the VPN tunnel.

Submit
28. Which NLB control command would be the correct one to use to gracefully prepare a node for a planned maintenance activity?

Explanation

The correct answer is "Drainstop". When preparing a node for planned maintenance activity, using the "Drainstop" command in NLB control helps to gracefully remove the node from the load balancing pool. This command allows the node to finish processing any existing connections before stopping new connections, ensuring a smooth transition without causing disruptions to the overall system performance.

Submit
29. Which of the following enables centralized management of virtualized workloads?

Explanation

SCVMM (System Center Virtual Machine Manager) enables centralized management of virtualized workloads. It is a Microsoft software solution that allows administrators to create, deploy, and manage virtual machines (VMs) on a virtualized infrastructure. With SCVMM, administrators can easily provision and configure VMs, monitor their performance, and automate tasks such as load balancing and live migration. It provides a single interface for managing multiple virtualization platforms, such as Hyper-V, VMware, and Citrix. SCVMM simplifies the management of virtualized workloads by providing a centralized and comprehensive solution.

Submit
30. Which of the following is required to use the Client Hyper-V feature in Windows Server 2016?

Explanation

To use the Client Hyper-V feature in Windows Server 2016, the computer must have a 64-bit processor that incorporates second level address translation (SLAT) technology. This technology allows for efficient virtualization and improves performance by providing hardware-assisted memory virtualization. It is a requirement because Hyper-V relies on SLAT technology to efficiently manage and allocate memory resources for virtual machines. The other requirements mentioned in the question, such as the number of SAS disk drives or the amount of memory, are not relevant to the use of Client Hyper-V in Windows Server 2016.

Submit
31. Which of the following allows central configuration and management of physical and virtual network devices, including routers, switches, and gateways in a data center?

Explanation

Software-Defined Networking (SDN) allows central configuration and management of physical and virtual network devices, including routers, switches, and gateways in a data center. With SDN, the control plane is decoupled from the data plane, enabling administrators to programmatically manage and control the network infrastructure through a centralized controller. This provides flexibility, scalability, and automation, making it easier to configure and manage the network devices in a data center environment.

Submit
32. Which of the following is the minimum number of nodes that a production-ready failover cluster requires?

Explanation

A production-ready failover cluster requires a minimum of 2 nodes. This is because a failover cluster is designed to provide high availability and redundancy. With only 1 node, there would be no redundancy as there would be no other node to failover to in case of a failure. Therefore, a minimum of 2 nodes is required to ensure that there is at least one backup node available to take over in case of a failure.

Submit
33. A company's administrator has installed the FSRM role service to manage stored data on a file server. The administrator would like to configure quotas limits for users when they create new folders. Which of the following should the administrator configure to enforce quota limits for users when they create new folders?

Explanation

To enforce quota limits for users when they create new folders, the administrator should configure the "File quota template." A file quota template allows the administrator to define specific quota limits that will be applied to new folders created by users. By configuring the file quota template, the administrator can ensure that users do not exceed a certain amount of storage space when creating new folders. This helps in managing and controlling the amount of stored data on the file server.

Submit
34. Of the four VPN tunneling protocols, which has the weakest encryption?

Explanation

SSTP stands for Secure Socket Tunneling Protocol, which is a VPN tunneling protocol that uses SSL/TLS encryption. While it is generally considered secure, it is considered to have weaker encryption compared to the other options listed. Therefore, SSTP is the VPN tunneling protocol with the weakest encryption among PPTP, L2TP, SSTP, and IKEv2.

Submit
35. What must be configured for a Windows desktop client to support BranchCache

Explanation

To enable BranchCache on a Windows desktop client, it must be configured to turn on via Active Directory. This means that the Group Policy settings in Active Directory need to be configured to enable BranchCache on the client. By turning on BranchCache via Active Directory, the client will be able to utilize the caching technology to improve network performance by caching content from remote servers and sharing it with other clients on the same network.

Submit
36. Which Windows Server 2016 feature can be used to run a virtual machine inside another virtual machine?

Explanation

Nested virtualization is a feature in Windows Server 2016 that allows a virtual machine to run inside another virtual machine. This feature enables the creation of a virtualization environment within an existing virtual machine, providing the ability to run multiple layers of virtual machines. Nested virtualization is useful in scenarios where virtual machines need to be isolated or when testing and development environments require multiple levels of virtualization.

Submit
37. Which of the following names is given to the Fibre Channel network used by failover clusters to connect to a shared storage device?

Explanation

A fabric is the correct answer because in the context of failover clusters connecting to a shared storage device, a fabric refers to the Fibre Channel network. A fabric is a high-speed network infrastructure that allows multiple devices to communicate with each other, providing a reliable and scalable connection for failover clusters to access shared storage.

Submit
38. Which additional role should be installed in Windows Server 2016 hosts running Hyper-V?

Explanation

In this scenario, the correct answer is "None" because when running Hyper-V on Windows Server 2016 hosts, there is no additional role that needs to be installed. Hyper-V is a built-in feature of Windows Server 2016 and does not require any additional roles to be installed for its functionality. Therefore, the correct answer is "None" as no additional roles are needed.

Submit
39. In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device drivers. Which Hyper-V software package can help remedy compatibility issues?

Explanation

Guest integration services is the correct answer because it is a Hyper-V software package that helps remedy compatibility issues with certain Hyper-V guest operating system features. These services provide drivers and services that enhance the performance and functionality of the guest operating system running on a Hyper-V virtual machine. They enable features such as time synchronization, heartbeat, backup integration, and improved network and storage capabilities, ensuring that the guest operating system functions properly within the Hyper-V environment.

Submit
40. Which of the following options is NOT used when configuring port rules for NLB clusters?

Explanation

The question is asking for the option that is NOT used when configuring port rules for NLB clusters. The correct answer is "The node IP address to which the rule should apply." When configuring port rules for NLB clusters, the node IP address to which the rule should apply is a necessary parameter that needs to be specified. Therefore, this option is not correct. The filtering mode, on the other hand, is used when configuring port rules for NLB clusters, as it determines how network traffic is filtered and distributed among the nodes in the cluster.

Submit
41. Which of the following statements about Network Load Balancing is NOT true?

Explanation

Network adapters in the NLB cluster cannot use both multicast and unicast simultaneously. NLB clusters can use either multicast or unicast mode, but not both at the same time. In multicast mode, all hosts in the cluster share a single multicast IP address, while in unicast mode, each host in the cluster has its own unique IP address.

Submit
42. Which of the following operating systems can NOT be used in Hyper V virtual machines for Windows Server 2016?

Explanation

Windows Server 2003 cannot be used in Hyper V virtual machines for Windows Server 2016 because Windows Server 2003 is an older operating system that is not compatible with the newer version of Hyper V. Hyper V requires a minimum version of Windows Server 2008 as the guest operating system.

Submit
43. Which of the following is used to communicate with the network?

Explanation

The correct answer is "Southbound API." A Southbound API is used to communicate with the network. Southbound APIs are responsible for communication between the network controller and the network devices. They allow the controller to send instructions and commands to the network devices, enabling control and management of the network infrastructure.

Submit
44. Which type of quorum configuration can sustain the loss of one-half of the cluster nodes (rounded up), minus one?

Explanation

Node Majority (no witness) is the correct answer because in this quorum configuration, a majority of the cluster nodes is required for the cluster to remain online. In case of a loss of one-half of the cluster nodes (rounded up), the remaining nodes will still form a majority and the cluster will continue to function. The other quorum configurations mentioned either require a witness disk or do not have enough nodes to sustain the loss of one-half of the cluster nodes.

Submit
45. When the Hyper-V role is added to a Windows Server 2016 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer's hardware via the hypervisor. Which term refers to those individual environments?

Explanation

When the Hyper-V role is added to a Windows Server 2016 server, the hypervisor creates individual environments called "partitions". These partitions have their own operating system installed and access the computer's hardware through the hypervisor. Each partition operates independently, allowing multiple virtual machines to run on the same physical server.

Submit
46. Which cluster operation mode is designed to prevent the network switch from flooding with traffic?

Explanation

IGMP Multicast is the correct answer because it is a cluster operation mode specifically designed to prevent the network switch from becoming flooded with traffic. IGMP (Internet Group Management Protocol) is a communication protocol used by hosts and adjacent routers on an Internet Protocol (IP) network to establish multicast group memberships. By using IGMP Multicast, the network switch can efficiently handle multicast traffic by only forwarding it to the devices that have explicitly requested to join the multicast group, thus preventing unnecessary flooding of traffic.

Submit
47. According to Microsoft, Windows Server 2016 can run many virtual machines on each failover cluster; how many?

Explanation

Windows Server 2016 can run up to 8,000 virtual machines on each failover cluster. This means that the failover cluster has the capacity to support a large number of virtual machines, allowing for efficient and scalable virtualization capabilities.

Submit
48. Hyper-V server

Explanation

The correct answer is VHDX files, up to 64 TB. VHDX is the newer file format used by Hyper-V server, and it supports larger file sizes compared to VHD files. VHDX files can be as large as 64 TB, making them suitable for storing large amounts of data.

Submit
49. Your network consists of an Active Directory domain. You have 1 domain controller and 2 file servers at the main site, all locations are connected to the main one via a high-speed and reliable connection. You have a shared folder accessed by numerous users across an enterprise with multiple locations. You need to suggest a solution to make the access to the shared documents more efficient for users on outside locations in the most-cost effective way.

Explanation

Installing servers at all other locations, creating a DFS namespace, and adding the shared folder as a target would be the most cost-effective solution to make access to the shared documents more efficient for users on outside locations. This solution would allow the users to access the shared folder locally from their respective locations, reducing the latency and improving the overall performance. Additionally, DFS provides fault tolerance and load balancing, ensuring that the shared folder remains accessible even if one of the servers goes down.

Submit
50. Which of the following is the function of port rules in an NLB cluster?

Explanation

Port rules in an NLB cluster are used to define which ports are balanced among the hosts of the cluster. This means that the traffic coming through those ports will be distributed evenly among the hosts, allowing for load balancing. By specifying the ports that should be balanced, the cluster ensures that no single host is overwhelmed with traffic, improving performance and availability.

Submit
View My Results

Quiz Review Timeline (Updated): Sep 5, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 05, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 10, 2018
    Quiz Created by
    Ryanbecker24
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which Windows tool is used to provide routing?
Server virtualization in Windows Server 2016 is based on a module...
Your company has two a server called FS1. FS1 has a folder named...
In which of the following situations is it appropriate to use Windows...
How are routing tables created dynamically?
Which VPN feature prevents readable access to data without possession...
Which authentication method is the weakest (least secure)?
Which of the following can use to show a list of duplicate files on a...
Which of the following is the primary difference between domain-based...
RRAS has multiple options available to select one or more services to...
Which of the following is the primary disadvantage of DFS Replication?
Which mode of BranchCache conifguration uses one or more dedicated...
Which type of screening prevents users from saving the defined...
On Windows, which command is used to view and define static routes?
Which of the following is the primary graphical tool for creating and...
Which of the following DON'T you perform when you change a quota...
Which type of quota used with FSRM prevents users from saving files...
How many virtual adapters are included by default, after creating a...
Which of the following do you use to simplify the management of file...
DFS Namespace shared folders are reffered to as which of the following...
Which VPN feature guarantees that a transferred message was sent and...
In which NLB cluster operation mode is the MAC address of every...
Which of the following can be used to add Network Load Balancing (NLB)...
Which of the following technologies transparently distributes traffic...
Which of the following terms is defined as "an ordered list of...
How do you secure DFS Namespaces?
Which VPN tunneling protocol uses IPsec with 3DES for data...
Which NLB control command would be the correct one to use to...
Which of the following enables centralized management of virtualized...
Which of the following is required to use the Client Hyper-V feature...
Which of the following allows central configuration and management of...
Which of the following is the minimum number of nodes that a...
A company's administrator has installed the FSRM role service to...
Of the four VPN tunneling protocols, which has the weakest encryption?
What must be configured for a Windows desktop client to support...
Which Windows Server 2016 feature can be used to run a virtual machine...
Which of the following names is given to the Fibre Channel network...
Which additional role should be installed in Windows Server 2016 hosts...
In some cases, certain Hyper-V guest operating system features do not...
Which of the following options is NOT used when configuring port rules...
Which of the following statements about Network Load Balancing is NOT...
Which of the following operating systems can NOT be used in Hyper V...
Which of the following is used to communicate with the network?
Which type of quorum configuration can sustain the loss of one-half of...
When the Hyper-V role is added to a Windows Server 2016 server, the...
Which cluster operation mode is designed to prevent the network switch...
According to Microsoft, Windows Server 2016 can run many virtual...
Hyper-V server
Your network consists of an Active Directory domain. You have 1 domain...
Which of the following is the function of port rules in an NLB...
Alert!

Advertisement