We share the latest updated Microsoft 98-365 test questions and answers for free, all test questions are real cracked, guaranteed to be true and effective! You can practice the test online!
Or download the latest 98-365 exam pdf. The free exam questions are only part of what we share. If you want to get the complete Microsoft 98-365 exam questions and answers, you can get them in lead4pass.
The lead4pass 98-365 exam dumps contain VCE dumps and PDF dumps.
Microsoft 98-365 Exam “Windows Server Administration Fundamentals” https://www.lead4pass.com/98-365.html (Total Questions: 400 Q&A)

Get FREE Microsoft 98-365 pdf from Lead4Pass for free

Free share Microsoft 98-365 exam PDF from Fulldumps provided by Lead4pass

Microsoft 98-365 exam questions online practice test

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2016 network
environment. The network is configured as a Windows Active Directory-based single forest network.
You are configuring a new computer. You want to configure the computer\\’s hard disk as a dynamic disk.
Which of the following command-line tools will you use to convert a hard disk from basic to dynamic?
Correct Answer: B
In order to accomplish the task, you will have to use the DISKPART command-line utility.
A dynamic disk is a physical disk, which supports volumes that span multiple disks such as striped volume, RAID- 5
volume, etc. A dynamic disk uses a hidden database to track information about dynamic volumes on the disk and other
dynamic disks in the computer. Dynamic disks can be made by converting the basic disks. This can be done by using
Disk Management or the DISKPART command-line utility. When a basic disk is converted into a dynamic disk, all
existing basic volumes become dynamic volumes.


What technology is used to standardize the Windows environment on all client computers?
A. Group Policy
B. Registry
C. Bindery
Correct Answer: A
One of Active Directory\\’s most powerful features is Group Policy, which controls the working environment for user
accounts and computer accounts. Group Policy provides centralized management and configuration of operating
systems, applications, and user settings in an Active Directory environment.


Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of resources?
Correct Answer: D
Internet Storage Name Service (iSNS) is a protocol that allows automated discovery, management, and configuration of
iSCSI and Fibre Channel devices (using iFCP gateways) on a TCP/IP network. iSNS provides management services
similar to those found in Fibre Channel networks, allowing a standard IP network to operate in much the same way that
a Fibre Channel storage area network does. Because iSNS is able to emulate Fibre Channel fabric services and
manage both iSCSI and Fibre Channel devices, an iSNS server can be used as a consolidated configuration point for
an entire storage network.
Incorrect Answers:
A: Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated
Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk
drive and CD-ROM drive, are better suited in a network environment in which many users access shared drives
simultaneously. SCSI has three standards: SCSI-1, SCSI-2, and SCSI-3.
B: The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission
on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses
a program layer located between the Internet\\’s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol
(TCP) layers. URLs that require an SSL connection start with https: instead of http:.
C: Transport Layer Security is a standard protocol used to secure Web communications on the Internet or intranets by
means of encryption. With the help of TLS, clients can authenticate servers or servers can authenticate clients. TLS is
the latest version of the Secure Sockets Layer (SSL) protocol.


You manage the servers for the School of Business at your university. The school has a Hyper-V server that runs three
virtual machines (VMs). Each VM runs Windows Server 2016.
You need to apply the latest Windows server updates to each of the VMs. You need to be able to revert the servers
back to their original state before applying the updates.
Which Microsoft Virtualization feature should you use?
A. Live Migration
B. Checkpoints
C. VHD Virtual Hard Disks
D. Failover Cluster
Correct Answer: B
Checkpoints (formerly called snapshots) provide a fast and easy way to revert the virtual machine to a previous state.

Which two are Windows Server Cluster types? (Choose two.)
A. Shared storage
B. Failover
C. Network Load Balancing (NLB)
D. Shared services
Correct Answer: BC
The difference between NLB and Windows Failover Cluster.
An NLB array allows load to be spread NLB and Windows Failover Cluster.
A failover cluster provides high availability and redundancy, but doesn\\’t spread the load. Only one server is live at any
time, but the clustered application(s) can be moved to the other server very quickly.


What is the default port used by iSCSI?
A. 8080
B. 3128
C. 3260
D. 9000
Correct Answer: C
Internet Small Computing System Interface (iSCSI) is an Internet Protocol (IP) – based storage networking standard for
linking data storage facilities. iSCSI allows clients to send SCSI commands over a TCP/IP network using TCP port


What is the minimum share permission needed to modify files and its attributes?
A. Full Control
B. Change
C. Write
D. Write
Correct Answer: B
The Change permission give users the Read permission and the additional capability to create files and subfolders,
modify files, change attributes on files and subfolders, and delete files and subfolders.


To protect a server in case of a blackout, you should use a/an:
A. Uninterruptible Power Supply.
B. Dedicated surge protector.
C. Power Supply Unit.
D. Redundant power supply.
E. Hot-swappable power supply.
F. Line conditioner.
Correct Answer: A


What is used to grant access to objects such as NTFS files or Active Directory user accounts?
A. right
B. permission
C. certificate
D. template
Correct Answer: B
Permissions defined as the type of access granted to objects such as NTFS files and folders.


The best method to data recovery is:
A. backup
D. spare drives
Correct Answer: A
A backup, or the process of backing up, refers to making copies of data so that these copies can be used to restore the
original after a data-loss event. They can be used to restore entire systems following a disaster or to restore small file
sets that were accidentally deleted or corrupted.


The University Chess Club has a single Windows Server 2016 server. The server has 12 GB of RAM and 1TB of disk
space on a RAID 5 array. Using this server, you need to install two separate instances of Windows Server 2016: one to
act as a web server and one to act as a database server.
Which Windows Server 2016 role or feature provides this capability?
A. Windows Deployment Services
B. Hyper-V
C. Windows System Resource Manager
D. Windows Internal Database
Correct Answer: B
Hyper-V can create virtual machines on x86-64 systems.
Starting with Windows 8, Hyper-V supersedes Windows Virtual PC as the hardware virtualization component of the
client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual
machines to
one or more networks.


Which technology provides both e-mail and database services?
A. Windows Server Enterprise Edition
B. Microsoft Office Communications Server
C. Windows Server Essentials
D. Microsoft Project Server
Correct Answer: C
Windows Server Essentials (formerly Windows Small Business Server or SBS) is an integrated server suite from
Microsoft designed for running network infrastructure (both intranet management and Internet access) of small and
midsize businesses having no more than 25 users or 50 devices. Application server technologies are tightly integrated
to provide and offer management benefits such as integrated setup, enhanced monitoring, Remote Web Workplace, a
unified management console, and remote access.

What type of driver is tested and includes a digital certificate?
A. published
B. certified
C. compliant
D. signed
Correct Answer: D
A signed device driver includes a digital signature, which is an electronic security mark that can indicate the software
publisher and information that can show whether a driver has been altered. When Microsoft signs it, the driver has been thoroughly tested to ensure that it will not cause problems with the system\\’s reliability or cause a security problem.

Thank you for reading! I have told you how to successfully pass the Microsoft 98-365 exam.
You can choose: https://www.lead4pass.com/98-365.html to directly enter the 98-365 Exam dumps channel! Get the key to successfully pass the exam! Wish you happiness!

Get free Microsoft 98-365 exam PDF online: https://www.fulldumps.com/wp-content/uploads/2021/05/Lead4pass-Microsoft-MTA-98-365-Exam-Dumps-Braindumps-PDF-VCE.pdf