SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How do you remove a resource record from a zone file?
Use dnscmd /recorddelete
The latest Vista Service Pack
To display friendly labels to capture packet address headers.
Disable AutoComplete in Internet Explorer
2. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
It is the authentication header protocol and digitally sign packets but not encrypt them.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Enforce IPSEC on the network
From the Network Policy Access Services role in system manager.
3. How do you decrease zone transfer traffic?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
Increase the SOA refresh interval parameter.
1723
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
4. What tool is used to manage shadowcopies?
To display friendly labels to capture packet address headers.
vssadmin.exe. This can view previous version files as well.
The DHCP server will ping an ip address before assigning it.
4 (bits 49 - 52) /52 Allows for 16 regions.
5. How do you export the DNS zone to a text file?
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
By using the dnscmd /zoneexport command.
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
It is the authentication header protocol and digitally sign packets but not encrypt them.
6. Why would you add additional drivers for the various operating systems in your organization that will be connecting to the shared printer when sharing a printer?
To will ensure the clients download the appropriate printer driver.
Use dnscmd /zonerefresh.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
7. What does the WSUS DB Store?
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
8. What is DiskPart?
On the properties of the DNS server in the DNS manager.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
9. How do you connect to a wireless access point is not broadcasting its SSID?
A file that is loaded when a DNS server starts up and populate the root hints.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
By creating or modifying a wireless connection in Network and Sharing Center.
wbadmin.exe. This can backup critical files.
10. What should you do to provide redundancy in DNS dynamic updates?
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Use AD integrated zones so the clients can update to more than one DNS server.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
11. What does the Hosted Cache mode do?
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
A .WFW file
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
SP3
12. What does Scanstate /GENMIGXML do?
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
It create a report of which files will be migrated
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
13. What event viewer log is the Radius server (NPS) logs stored?
System Restore Points as well as Previous Versions of Files (configured through the System applet).
The local security logs.
Restrict the share permissions of the DFS root share.
No
14. How do you setup DNS single label (unqualified) name resolution?
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
Setup a GlobalNames zone.
Add an AD integrated zone
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
15. What does Cipher /X do?
Use it to can backup certificates to a .PFX file that is password protected.
Setup a GlobalNames zone.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
16. How do you can disable programs from autostarting?
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
By running the Update Status summary report.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Windows 7 Ultimate.
17. What OSs are all Windows Games installed on?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Windows 7 Enterprise and Ultimate Editions
they are enforced and will not allow a user to exceed the space limit.
18. What is the cache.DNS file?
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
A file that is loaded when a DNS server starts up and populate the root hints.
19. What wireless protocolls can be used to authenticate smart cards?
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
WPA2 and 802.1x but require EAP-TLS to be enable.
The ICMP protocol.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
20. EFS encrypt files will not be __________.
Sent across the network
DHCPv6 obtains additional configuration settigns.
Send email notifications
They need to be configured us use 802.1x RADIUS authentication
21. What is Optimize for Consistency polling mode do?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
Command to configure the TCP/IP settings.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
22. What does Aero require?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
Only sites added to the local Intranet Zones
Windows PE and Windows.old.
23. What is a WSUS server?
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
WIndows Update Server
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
24. How can non Microsoft PCs connect to print services?
Deploy a secondary zone.
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Ping the Link Local Address (FE80 Address)
25. What happens if the router advertisement has the M flag set to 0 but the other staeful configuration (o) flag set to 1?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Use it to can backup certificates to a .PFX file that is password protected.
DHCPv6 obtains additional configuration settigns.
26. What do you provide to Scanstate to prevent certain system settings from being migrated?
Use the Advanced Firewall to define Connection Security Rules.
DHCP server cannot assign an ip address
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
A CONFIG.XML file
27. What port does RDP use?
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
By unbinding the DHCP protocol from the nic attached to the subnet.
Yes
3389
28. Use ocsetup instead of servermanagercmd.exe _________.
On a core server
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
A type of port forwarding that allows public network computers on a Private network through nat devises.
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
29. How do you configure WSUS computer groups for defined updates?
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
The local security logs.
By either using WSUS management console (server side targeting) or GPO (client side targeting).
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
30. How can you modify event viewer from being filled up with the printer related events?
Turn off the Log Spooler event on a print server.
Can be used to create virtual hard disks
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
Us edit dnscmd /zoneupdatefromdns command.
31. How do you ping the IPV6 address of a remote computer?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What is BCDEdit?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
33. What will a (.root) zone do in a DNS server?
Prevents the server from performing Internet name resolution.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Windows 7 Enterprise and Ultimate Editions
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
34. NAP can be configured to ____________.
Enforce IPSEC on the network
Prevents the server from performing Internet name resolution.
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Use it to can backup certificates to a .PFX file that is password protected.
35. What is the difference between MSCHAP2 and EAP-TLS?
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
IN the WindowsUpdateClient log in the system log portion of event viewer.
They must be configured with the ip addresses of the radius server.
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
36. What does Scanstate /OfflineWinOld: C:Windows.old do?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Perform an offline migration
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
37. What is an example of a exceptions to rule?
Windows XP and Server 2003.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
DNS suffix search lists
38. What is "Transparent Caching"?
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
The local security logs.
DHCP server cannot assign an ip address
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
39. How can you restrict users to create sub-folders in a dfs root share?
3389
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Restrict the share permissions of the DFS root share.
40. How do you move a Dynamic Disk from one computer to another?
Use the Import Foreign Disk option on the target computer
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
41. What does "wbdadmin -startrecovery -version" do?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Use it to generate an EFS user certificate
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
42. What does Windows XP Mode for Windows 7 makes it easy to do?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Either from wbadmin or windows server backup.
43. What is DirectAccess?
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
they are enforced and will not allow a user to exceed the space limit.
It is a network health policy defines the minumum level of client health required to connect to the network.
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
44. How can you disable IPV6 from OSs that cant be uninstalled?
Uncheck IPV6 from the network properties.
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
Setup a GlobalNames zone.
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
45. What does Windows uses the index for?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
It will display driver signing status
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
46. What does "Create System Repair Disk" option do?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Problem history but also application installation history.
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Create a customized shell
47. What is a bootstrap wireless profile?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. What does a BranchCache client hosting content in distributed cache mode must have?
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
Use it to generate an EFS user certificate
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
49. What can Windows 7 Enterprise can be directly upgraded to?
Windows 7 Ultimate.
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Which processes currently consume a resource like processor utilization.
50. Where is Software RAID is configured?
Used to get a list of installed 3rd party drivers
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
At the volume level - not the drive level.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.