Explanation/Reference:
Explanation:
Application Server is an expanded server role of Windows Server 2016 that simplifies the process of deploying applications that respond to requests sent over the network from remote applications. Windows Server 2016 provides support for applications by enhancing application availability and accessibility through the Application Server role. The Application Server role provides environment for deploying and running line-of-business (LOB) applications that are built with the Microsoft .NET Framework.
The features provided by Application Server role are provided in the table below:
During the server role installation, administrators select services that support applications that are designed to use COM+, Message Queuing, Web services, and distributed transactions. Microsoft recommends installing the Application Server role when a custom business application is deployed on the network and the developer has indicated that specific role services are required.
Incorrect Answers:
A: The Windows Server Virtualization server role is a server role of Windows Server 2008. It was renamed to Hyper-V in later versions of Windows. This server role offers services for creating and managing virtual machines and their resources. A virtual machine is a computer system that allows a user to run more than one operating system simultaneously.
B: The Network Policy and Access Services server role is a server role of Windows Server 2016. This server role offers various methods to provide users with local and remote network connectivity, to connect network segments, and to permit network administrators to centrally manage network access and client health policies.
These methods use VPN servers, dial- up servers, routers, and 802.11 protected WAP (wireless access point).

C: The Active Directory Certificate Services server role is a server role of Windows Server 2016. This server role offers services to create and manage public key certificates that are used in software security systems. These software security systems use public key technologies to verify the identity of a person, device, or service, which can be used by secure mail, secure wireless networks, VPNs, lPSec, EFS, smart card logon, and others.