Final Prep
Final Prep
Enable-PSSession
Enable-PSRemoting
Enable-PSSessionConfiguration
Explanation
Question 2
True
False
Explanation
The Windows Admin Center is not supported on Internet Explorer and will
return an error if you try to launch it.
Question 1
Standard
Essentials
Hyper-V
Datacenter
Explanation
The Standard edition is the best choice because its license allows two VMs to
run and you need two servers. The Essentials edition does not allow that
many users and Datacenter would be expensive for only two servers. Hyper-
V is free but you would have to pay for two server licenses for the VMs that
run on it.
Question 2
Explanation
Question 1
Which of the following roles or role services can run on Server Core? Select
two.
SMTP server
Explanation
You can install certain roles on Server Core while some roles are not
available because Server Core does not have the code base required for
those roles.
Question 1
What tool is commonly used for the initial configuration of Server Core?
Windows PowerShell
Sconfig
Server Manager
Explanation
Sconfig is the best tool for the initial configuration of Server Core. It allows
for IP address assignment, setting computer name, and domain membership.
Question 2
You have Windows Server Standard edition installed and it has DNS and
DHCP and Hyper-V installed. How many VMs can you run in Hyper-V before
you need to buy a license?
One
Two
Unlimited
None
Explanation
You can run one VM before you must buy a license because you are using
this host server for more than just a Hyper-V host.
Question 3
True or False: You must install an SSL certificate to use the Windows Admin
center.
True
False
Explanation
Question 4
You want the helpdesk group to only be able to add and remove users from
security groups. How should you accomplish this?
Explanation
Use the Delegation of Control Wizard to assign the task. Although Account
Operators and Domain Admins would work, it would give too much
administrative rights to the helpdesk group.
MODULE 02
The AD DS schema is the component that defines all the object classes and
attributes that AD DS uses to store data.
What would you use to synchronize user details to Microsoft Azure Active
Directory (Azure AD) from Active Directory Domain Services (AD DS)?
You would use Azure AD Connect to synchronize user details to Azure AD
from AD DS.
If you linked a Group Policy Object (GPO) to the domain object in your Active
Directory Domain Services (AD DS), what are the different ways to prevent
this policy from applying to all users in the domain?
You could unlink the GPO from the domain. You could use Security Group
filtering to target the GPO settings to a specific group. You could also use
Block Inheritance on child OUs.
The two default GPOs are called Default Domain Policy and Default Domain
Controllers Policy.
Revocation is the process in which you disable the validity of one or more
certificates. By initiating the revocation process, you publish a certificate
thumbprint in the corresponding certificate revocation list (CRL). This
indicates that a specific certificate is no longer valid.
What are the two reasons to create organizational units (OUs) in a domain?
The first reason is because you want to group users and computers, for
example, by geography or depart-ment. The second reason is that you might
want to delegate administration on the OU or configure the objects in an OU
by using Group Policy Objects (GPOs).
If the domain controller that holds the primary domain controller (PDC)
Emulator operations master role is going to be offline for an extended period,
what should you do?
You should transfer the operations master role to another server in the same
domain ahead of the planned outage.
You could download and install the latest .admx files for Office. If you install
these into the Central Store, you could configure the new Office settings in
one location.
Certificate templates define how you can request or use a certificate, such as
for file encryption or email signing.
MODULE 03
Question 1
If you configure a DHCP scope with a lease length of four days, when will
computers attempt to renew the lease for the first time?
1 day
2 days
3 days
3.5 days
Explanation
Two (2) days is the correct answer. If you configure a DHCP scope with a
lease length of four days, computers will attempt to renew the lease for the
first time after two days.
Question 2
Explanation
Question 1
PTR record
TXT record
AAAA record
CNAME record
Explanation
The correct answer is AAAA record. An AAAA record is a host record that
resolves a name to an IPv6 address. IPv4 uses an A record.
Question 2
Which DNS functionality should you use to direct DNS queries for a single
domain to a partner organization through firewalls?
Forwarder
Stub zone
Root hints
Conditional forwarder
Explanation
The correct answer is conditional forwarder. Partner organizations commonly
use a conditional forwarder because it defines settings for a single domain.
Also, you can configure specific IP addresses for communication, which
simplifies firewall configuration.
Question 1
Which of the following are valid options for storing IP Address Management
(IPAM) data? (Choose two.)
JET database
Access database
Explanation
Windows Internal Database and Microsoft SQL Server database are the
correct answers.
Question 2
Which IPAM security groups can manage IP address blocks and IP address
inventory? (Choose two.)
IPAM Administrator
Explanation
IPAM ASM Administrator and IPAM Administrator are the correct answers.
Question 1
Explanation
IPAM is the correct answer. IPAM is used to centrally monitor and manage
DNS, DHCP, and IP address ranges.
Question 2
Which of the following are true about DHCP Failover? (Select two.)
Explanation
The correct answers are "A failover relationship can have only two partners"
and "The necessary firewall rules are configured automatically when the
DHCP role is installed."
Question 3
MAC address
Description
IP address
Reservation name
Computer name
Explanation
The correct answers are MAC address, IP address, and reservation name.
Question 4
Primary
Secondary
Stub
Active Directory-integrated
Explanation
Question 5
Which service running on domain controllers creates the SRV records used by
clients to locate the domain controller?
Netlogon
DNS client
Workstation
DHCP Client
Explanation
Which feature of DNS can you use to resolve a host record to different IP
addresses depending on user location?
DNSSEC
Stub zone
Conditional forwarder
DNS policies
Explanation
DNS policies is the correct answer. When you create a DNS policy, you can
specify conditions that control how a DNS server responds to a request. This
includes alternate host records based on the client IP address.
Question 7
How do you create the Group Policy Objects (GPOs) used to configure a
server that is managed by IPAM?
Explanation
MODULE 04
Question 1
Question 2
What file system do you currently use on your file server and will you
continue to use it?
Question 3
If permissions on a file are inherited from a folder, can you modify them on a
file?
No, you can't modify inherited permissions. You can modify them on the
folder where they were set explicitly, and then your modified permissions will
be inherited with a file. Conversely, you can disable inheritance on a file,
select or convert inherited permissions to explicit permissions, and then
modify explicit permissions on it.
Question 4
No. You can set permissions on folders and entire volumes, including the root
folder. Permissions that you set on folders or volumes are inherited to all
content on that volume or in that folder, by default. You can set permissions
on NTFS volumes and on Resilient File System (ReFS) volumes.
Question 1
No. Only users with the appropriate permissions can connect to shared
folders. You configure permissions on shared folders when you share a folder,
and you can modify permissions.
Question 2
What could be a reason that a user can't open files on a share?
There can be many reasons why a user can't open files on a share, including
network connectivity issues, authentication problems, and issues with share
and file permissions.
Question 3
What is the main difference between sharing a folder by using "Network File
and Folder Sharing" and by using the "Advanced Sharing" option?
If you share a folder by using "Network File and Folder Sharing", you can set
share and file permissions in a single step. If you share a folder by using the
"Advanced Sharing" option, you can set only share folder permissions. You
can't modify file permissions by using the "Advanced Sharing" option in a
single step.
Question 4
What could be a reason that a user doesn't have the "Always available
offline" option when they right-click or access the context menu for a file in
the share, but when they right-click or access the context menu for a file in
another share, the "Always available offline" option is available?
The most probable reason for such behavior is that the share doesn't allow
offline files, and it has been configured with the "No files or Programs from
the shared folder are available offline" option.
Question 1
What are the advantages of using Storage Spaces compared to using system
area networks (SANs) or a network access server (NAS)?
Question 2
Question 1
No, you can't configure data deduplication on a boot volume. You can
configure data deduplication only on volumes that aren't system or boot
volumes.
Question 2
Can I change the Data Deduplication settings for my selected usage type?
Question 3
With Windows Server 2016, Data Deduplication wasn't available for ReFS,
and only available for NTFS file system. Now, with Windows Server 2019,
Data Deduplication is available for both ReFS and NTFS file systems.
Question 1
IP network
iSCSI targets
iSCSI initiators
Explanation
If you access the iSCSI target through IP addresses, DNS isn't a required part
of an iSCSI solution. iSCSI has its own name service, *internet Storage Name
Service (iSNS)*. DNS is required only if you want to use fully qualified
domain names (FQDN) to access your iSCSI storage.
Question 2
You can use Server Manager to configure both the iSCSI Target Server and
the iSCSI initiator.
True
False
Explanation
You can configure the iSCSI Target Server by using Server Manager and
Windows PowerShell. However, you can't configure the iSCSI initiator by
using Server Manager; you can only configure the iSCSI initiator through its
own interface, or through Windows PowerShell.
Question 1
What kinds of Distributed File System (DFS) namespaces are there and how
do you ensure their availability?
There are two kinds of DFS Namespaces: Standalone, and domain-based. For
standalone DFS namespaces, you ensure the availability of a standalone DFS
root by creating it on the cluster storage of a clustered file server by using
the Cluster Administrator snap-in. For domain-based DFS namespaces, you
ensure the availability of domain-based DFS roots by creating multiple root
targets on non-clustered file servers or on the local storage of the nodes of
server clusters. (Domain-based DFS roots can't be created on cluster
storage.) All root targets must belong to the same domain. To create root
targets, use the DFS snap-in or the Dfsutil.exe command-line tool.
Question 2
Yes, DFS Replication can replicate folders on volumes that use Data
Deduplication in Windows Server.
Question 3
Can you use the Volume Shadow Copy Service (VSS) with DFS Replication?
Yes. DFS Replication is supported on VSS volumes, and you can restore
previous snapshots successfully with the previous version's client.
Question 4
Question 1
You attach five 2-terabyte (TB) disks to your Windows Server 2012 computer.
You want to simplify the process of managing the disks. In addition, you want
to ensure that if one disk fails, the failed disk’s data isn't lost. What feature
can you implement to accomplish these goals?
You can use Storage Spaces to create a storage pool of all five disks, and
then create a virtual disk with parity or mirroring to make it highly available.
Question 2
Your manager has asked you to consider using Data Deduplication within
your storage architecture. In what scenarios are the Data Deduplication role
service particularly useful?
You should consider using deduplication for file shares, software deployment
shares, and VHD and VHDX file libraries. For file shares, include group
content publication or sharing, user home folders, and profile redirection for
accessing offline files. With the release to manufacturing (RTM) version of
Windows Server 2012, you could save approximately 30 to 50 percent of
your system’s disk space. With the Cluster Shared Volume (CSV) support in
Windows Server 2012 R2, the disk savings can increase up to 90 percent in
certain scenarios. Software deployment shares include software binaries,
images, and updates. You might be able to save approximately 70 to 80
percent of your disk space. VHD and VHDX file libraries include VHD and
VHDX file storage for provisioning to hypervisors. You might be able to save
disk space of approximately 80 to 95 percent.
Question 3
Can you use both local and shared storage with Storage Spaces Direct?
No. Storage Spaces Direct can use only local storage. A standard storage
space can use shared storage.
MODULE 05
Question 1
What is the correct term for the virtualization layer that is inserted into the
boot process of the host machine that controls access to the physical
hardware?
Question 2
Question 3
Question 1
You need to create a virtual machine (VM) that supports Secure boot. Which
generation would you choose when you create the VM?
Which virtual hard disk (VHD) type only uses the amount of space that needs
to be allocated and grows in size as more space is necessary?
Question 3
Question 4
Question 2
Question 3
The Shielded Template Disk Creation Wizard, which is part of the Shielded
VM Tools available from the Remote Administration Tools feature.
Question 1
A container shares the kernel with the host operating system and other
containers. A virtual machine is totally isolated and has its own kernel and
user mode.
Question 2
Docker containers are fully supported by the latest releases of the Windows
operating system.
Question 3
Which container base image is used primarily to support .NET core APIs and
is good to use if you want to have a very small base image starting point?
The Nano Server container base image is the smallest images and has
support for the .NET Core APIs.
Question 4
What can you use to help automate container image creation and
management?
Question 1
Question 2
Question 3
Question 1
Which of the following are requirements for installing the Hyper-V server role
in Windows Server? Choose two.
A 32-bit processor
Minimum 32 GB of memory
A 64-bit processor
BitLocker enabled
Explanation
To install the Hyper-V server role, you need a 64-bit processor with second-
level address translation (SLAT). You also need to enable Intel VT or AMD-V.
You also must have a processor with VM Monitor Mode extensions and must
enable Hardware-enforced Data Execution Prevention (DEP).
Question 2
You plan to enable nested virtualization on a Hyper-V host. What do you need
to do to ensure that network traffic of nested VMs can reach an external
network?
Enable BitLocker
Question 3
Which of the following are true for considerations when implementing a Host
Guardian service? Choose two.
The Host Guardian service uses certificates for signing and encryption
tasks.
The Host Guardian service must be installed in the same domain as the
Hyper-V guarded hosts.
Explanation
The Host Guardian Service (HGS) can be run on physical or virtual machines.
The HGS can run on Windows Server 2019 or Windows Server 2016 Standard
or Datacenter editions. The HGS will set up the server in a new AD DS forest
dedicated so that HGS ensures sensitive key information is as secure as
possible. The Hyper-V guarded hosts are installed in the standard AD DS
environment.
Question 4
A basic disk
A dynamic disk
Must be generalized
Explanation
When creating a shielded template disk, the disk must be Basic and cannot
be dynamic because BitLocker does not support dynamic disks. The
operating system also needs to be generalized, which can be done using
sysprep.exe.
Question 5
You download a container base image. When you attempt to create and run a
container using the base image, you get an error message that relates to
incompatibility with the host machine. What should you do?
Download a new container base image that matches the version of the
operating system installed on the host machine.
Explanation
The Windows host operating system version needs to match the container
operating system version. To run a container based on a newer Windows
build, you need to ensure that an equivalent operating system version is
installed on the host. Note that if your host server contains a newer
operating system version, you can use Hyper-V isolation mode to run an
older version of Windows containers.
Question 6
Nano Server
Linux
Explanation
Windows Server 2019 and Linux are both supported as worker nodes in a
Kubernetes cluster.
MODULE 06
Question 1
Storage Replica
Cluster set
Quorum
Explanation
Question 2
CSV
Cluster set
Quorum
Explanation
Question 3
Dynamic quorum mode and dynamic witness provide the highest level of
scalability for a cluster in most standard configurations.
Question 1
Does Windows Server 2019 require all nodes to be in the same domain?
Yes
No
Explanation
No is the correct answer. Windows Server 2019 doesn't require all nodes to
be in the same domain; however, we recommend having all nodes in the
same domain.
Question 2
Can a node that runs Windows Server 2016 and one that runs Windows
Server 2019 both run in the same cluster?
Yes
No
Explanation
Yes is the correct answer. A node that runs Windows Server 2016 and one
that runs Windows Server 2019 both can run in the same cluster. This is part
of the Cluster Operating System Rolling Upgrade feature that's new in
Windows Server 2016. It's a best practice to move toward having the cluster
run the same operating system and not run in mixed mode for an extended
period.
Question 3
You must install what feature on every server that you want to add as a
failover cluster node?
Cluster set
Failback Clustering
Hyper-V
Failover Clustering
Explanation
Failover Clustering is the correct answer. You must install the Failover
Clustering feature on every server that you want to add as a failover cluster
node.
Question 4
When running the Validate a Configuration Wizard, what does the yellow
yield symbol indicate?
The failover cluster that's being tested isn't in alignment with Microsoft
best practices.
Explanation
When running the Validate a Configuration Wizard, the yellow yield symbol
indicates that the aspect of the proposed failover cluster that's being tested
isn't in alignment with Microsoft best practices. Investigate this aspect to
make sure that the configuration of the cluster is acceptable for the
environment of the cluster, for the requirements of the cluster, and for the
roles that the cluster hosts.
Question 1
Which type of witness uses a basic format and doesn't keep a copy of the
cluster database?
USB witness
Failback witness
Explanation
Microsoft Azure Cloud Witness is the correct answer. An Azure Cloud Witness
builds on the foundation of the file share witness. An Azure Cloud Witness
uses the same basic format as the file share witness regarding its arbitration
logic, and it doesn't keep a copy of the cluster database.
Question 2
What technology enables replication of volumes between servers or clusters
for disaster recovery?
Cluster set
Storage Replica
Explanation
Question 3
Question 1
Which feature would you use to configure a failover cluster when you use
Hyper-V host servers?
Site-aware clustering
Client clustering
Live clustering
Host clustering
Explanation
Host clustering is the correct answer. By using host clustering, you can
configure a failover cluster when you use the Hyper-V host servers. When
you configure host clustering for Hyper-V, you configure the virtual machines
(VMs) as a highly available resource. You implement failover clustering
protection at the host server–level. This means that the guest operating
system and applications that run within the VM don't have to be cluster-
aware. However, the VM is still highly available.
Question 2
Which feature can you use to transparently move running VMs from one
Hyper-V host to another without perceived downtime?
Site-aware cluster
Storage migration
Cluster set
Live Migration
Explanation
Live Migration is the correct answer. You can use Live Migration, a Hyper-V
feature in Windows Server, to transparently move running VMs from one
Hyper-V host to another without perceived downtime.
Question 1
Cluster set
Failback Clustering
Hyper-V
Failover Clustering
Explanation
Cluster set is the correct answer. A cluster set is a loosely coupled grouping
of multiple failover clusters; it enables virtual machine (VM) fluidity across
member clusters within the set and a unified storage namespace across the
set.
Question 2
When running the Validate a Configuration Wizard, what does the red "X"
indicator mean?
The failover cluster needs to fail back to the original node.
You can't use the part of the failover cluster that failed.
The failover cluster that's being tested isn't in alignment with Microsoft
best practices.
Explanation
Question 3
Storage Replica
Cluster set
Quorum
Explanation
Cluster Shared Volume (CSV) is the correct answer. Failover clusters provide
CSV functionality that provides a consistent, distributed namespace that
clustered roles can use to access shared storage from all nodes. With the
Failover Clustering feature, users experience a minimum of disruptions in
service.336 Module 6 High availability in Windows Server
Question 4
Which type of witness is ideal when shared storage isn't available or when
the cluster spans geographical locations?
USB witness
Failback witness
File share witness
Explanation
File share witness is the correct answer. A file share witness is ideal when
shared storage isn't available or when the cluster spans geographical
locations. This option doesn't store a copy of the cluster database.
Question 5
What technology provides high availability where each site has a separate
storage system with replication among the sites?
Stretch cluster
Cluster set
CSV
Storage Replica
Explanation
Question 6
Site-aware clustering
Client clustering
Live clustering
Host clustering
Explanation
Host clustering is the correct answer. Host clustering provides high
availability for applications or services running in the VM that don't have to
be compatible with failover clustering; additionally, they don't have to be
aware that the VM is clustered. Because the failover is at the VM-level, there
are no dependencies on the software that's installed in the VM.
Question 7
Site-aware cluster
Storage migration
Live Migration
Explanation
Network Load Balancing (NLB) is the correct answer. NLB distributes IP traffic
to multiple instances of a TCP/IP service.
Module 08
Question 1
You can perform a planned failover when both Hyper-V hosts—at the primary
site and at the recovery site—are available. A planned failover is performed
without any data loss. When this isn't possible, for example if the primary
site is no longer available because of a disaster, you can perform failover,
which means unplanned failover. After failover, you'll be able to use a
replicated virtual machine (VM), but changes that were performed at the
primary site and weren't yet replicated will be lost.
Question 2
Can you use Hyper-V Replica to replicate only VMs that have integration
services installed?
No. You can use Hyper-V Replica to replicate any VM regardless of whether it
has integration services installed. However, some features such as Failover
TCP/IP settings are applied to a replicated VM only if it has integration
services installed.
Question 1
Can you use Microsoft Azure Site Recovery to manage virtual machine (VM)
replication between two Hyper-V hosts?
No. You can't use Site Recovery to manage replication between two Hyper-V
hosts. You can use Site Recovery to manage VM replication from a Hyper-V
host to Azure or between two clouds that Microsoft System Center Virtual
Machine Manager manages. If you want to manage VM replication between
two Hyper-V hosts, you should use Hyper-V Manager.
Question 2
Question 1
How can you monitor virtual machine (VM) replication health by using
Windows PowerShell?
Question 2
You can perform planned failover when both the Hyper-V hosts at the
primary site and the recovery site are available and planned failover is
performed without any data loss. When this isn't possible—for example, if
the primary site is no longer available because of a disaster—you can
perform failover, which means unplanned failover. After failover, you'll be
able to use a replicated VM, but changes at the primary site that weren't yet
replicated will be lost.
Question 3
Question 4
Yes. It's possible to back up both on-premises and Azure VMs by using
Backup.
MODULE 08
Logon Hours
Explanation
"Do not require Kerberos preauthentication" is the correct answer. Kerberos
preauthentication reduces the risk of replay attacks. Therefore, you should
not enable this option. All other answers are valid ways to configure
additional security for administrative user accounts.
Question 2
Authentication policies
NTLM blocking
Explanation
Question 3
Group policy
Explanation
"Adding server role" is the correct answer. You cannot enable Windows
Defender Credential Guard through a server role. However, you can enable
Windows Defender Credential Guard by using a Group Policy object, by
updating the registry on the server, or by running the Hypervisor-Protected
Code Integrity and Windows Defender Credential Guard hardware readiness
tool, which is a Windows PowerShell script.404 Module 8 Windows Server
security
Question 4
What are two types of problematic user accounts you should check for
regularly?
Explanation
Users with passwords that do not expire or who have not signed in for an
extended period of time are both problematic accounts that you should
identify and remediate on a regular schedule. Passwords that do not expire
are considered insecure. Therefore, you should disable user accounts that
are not being used to limit a potential avenue of attack. Complex passwords
are not considered insecure, and limiting user permissions to only those
needed (the principle of least privilege) is considered a best practice.
Question 1
Explanation
Question 2
Ensure that only authorized users can sign in to the PAW. Standard user
accounts should not be able to sign in.
Explanation
"Ensure the PAW can access the internet" is the correct answer. You should
not enable PAWs to access the internet, because it's a significant source of
cyberattacks. All the other options are valid ways to secure PAWs.Module 08
lab and review 405
Question 3
Which options are valid ways to secure a domain controller? Select all that
apply.
Ensure that domain controllers run the most recent version of the
Windows Server operating system and have current security updates.
Explanation
All of these are valid options for securing domain controllers. In addition, you
should keep physically deployed domain controllers in dedicated, secure
racks that are separate from other servers. You should run virtualized
domain controllers either on separate virtualization hosts or as a shielded
virtual machine on a guarded fabric. You should also review CIS (Center for
Internet Security) benchmarks for Windows Server operating systems for
security guidance specific to domain controllers and use Device Guard to
control the execution of scripts and executables on the domain controller.
Question 4
Level 0
Level 1
Level 2
None
Explanation
"Level 1" is the correct answer. The security baselines included in the SCT
align closely to CIS Level 1 benchmark hardening guidelines.
Question 1
What security benefit does JEA (Just Enough Administration) provide?
Explanation
Question 2
What file allows you to define which commands are available from a JEA
endpoint?
Explanation
"Role capability file" is the correct answer. role capability files help you
specify what can be done in a Windows PowerShell session. Session
configuration files are used to register a JEA endpoint, and there are no
Endpoint configuration files or Session capability files in JEA.
Question 3
Get-DNSOpsCommand
Explanation
Question 1
SMB 3.1.1.c
SMB 3.2.2.c
SMB 1.0
SMB 1.1.2
Explanation
"SMB 3.1.1.c" is the correct answer. Windows Server 2019 supports SMB 3.x
and SMB 2.x, but SMB 2.x is not listed. The default server configuration for
Windows Server 2019 does not install support for SMB 1.x, but it is available.
Question 2
Which cmdlet would you use to create a new, encrypted SMB file share?
Explanation
Question 1
What are the options for a WSUS (Windows Server Update Services)
database? Choose two:
SQL Server
MariaDB
MySQL
Explanation
"Windows Internal Database (WID)" and "SQL Server" are both correct
answers. MySQL and MariaDB are not valid database options for the WSUS
database.
Question 2
Explanation
Question 3
Assess
Identify
Classify
Deploy
Explanation
"Assess", "Identify", and "Deploy" are the correct answers. The update
management process includes the following steps: Access, Identify, Evaluate
and Plan, and Deploy. Classify is not a step in the update management
process. However, during the Assess phase you will decide what
classification of updates you want to deploy.
Question 4
Azure Automation
Azure Sentinel
Azure Monitor
Explanation
Question 1
Explanation
Prior to blocking NTLM, you should ensure that existing applications are no
longer using the protocol. You can audit NTLM traffic by enabling policies in
the Computer Configuration\Policies\Windows Settings\ Security Settings\
Local Policies\Security Options node. After you perform the audit and
determine there are no existing applications that use the protocol, you will
configure the Restrict NTLM: NTLM Authentication Group Policy to enable
NTLM blocking. Kerberos authentication is already enabled in Windows
Server.
Question 2
Disable-ADAccount
Update-AdmPwdADSchema
Get-AdmPwdPassword
Set-AdmPwdComputerSelfPermission
Explanation
Question 3
SMB 1.0
SMB 2.0
SMB 3.02
SMB 3.1.1
Explanation
MODULE 11
Question 1
Question 2
Question 1
Question 2
You must enable disk metrics to collect data about disk performance.
Question 1
You must add the computer account of the collector computer to the local
Event Log Readers group on each of the source computers.
Question 2
On which computer must you run the wecutil qc command when
establishing an event subscription?
You run that command on the collector computer to enable the Wecsvc
service.
Question 1
Question 2
Question 3