SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can configure a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. What does dnscmd /zoneadd primary do?
Clear the content being cached
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
WPA2 and 802.1x but require EAP-TLS to be enable.
Adds a file based zone
3. How can you can upgrade an offline image's Windows 7 edition?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
DNS suffix search lists
wbadmin.exe. This can backup critical files.
It is the max size is expressed in megabytes.
4. Where is scavaging configured?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
On the properties of the DNS server in the DNS manager.
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
5. What does it mean to Extend a Basic Disk Volume?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Clear the content being cached
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
6. How can you use ImageX to apply a WIM Image directly to a VHD file?
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
7. What tool is used to manage shadowcopies?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
vssadmin.exe. This can view previous version files as well.
driveletter:\\WindowsImageBackup\
DHCPv6 obtains additional configuration settigns.
8. How do you route IPV6 traffic on your private network?
Through a GPO.
Use IPV6 Unique Local Addresses.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
9. How do you configure IPSEC?
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
10. How do you secure a WSUS connection to a remote SQL server?
They relay the status on polices to the Security center for NAP to validate the system to use the network.
IPSEC
It is a network health policy defines the minumum level of client health required to connect to the network.
By running the Update Status summary report.
11. What does Scanstate /p do?
Pool Active Directory.
Export and import it from another computer.
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
12. How do you enable rdp on a core server?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
13. What firewall profile is configured for AD domain computers?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
The domain profile not the public or private.
No
Enterprise Admins
14. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
Anew vpn protocol that uses SSL (port 443) for encryption.
SP3
15. What does Cipher /X do?
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
Use the Cipher.exe command line tool.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
Use it to can backup certificates to a .PFX file that is password protected.
16. What account must be used to activate a DHCP server in active directory?
Enterprise Admins
The domain profile not the public or private.
Not supported
Which processes currently consume a resource like processor utilization.
17. How do you create a subscription?
Using wecutil -cs in an xml file.
Delegate permission by configuring the dacl of the zone file.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
WIndows Update Server
18. EFS encrypt files will not be __________.
No they are disabled
Sent across the network
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
19. How do you export the DNS zone to a text file?
By using the dnscmd /zoneexport command.
Yes - it can be modified to apply to a network location.
At the volume level - not the drive level.
Windows Vista - Window 7 and Server 2008.
20. What can storage reports be used for?
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
21. Where do you get the USMT?
Comes with the Windows Automated Installation Kit (WAIK)
Can be configured through a GPO
Use the Cipher.exe command line tool.
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
22. What are WIM files used for?
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
23. What does Windows XP Mode for Windows 7 makes it easy to do?
To deploy the policy and understand its impact before enforcing it.
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Windows 7 Professional.
To will ensure the clients download the appropriate printer driver.
24. How do you make a Windows 7 Answer File used for unattended setup?
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
Enterprise Admins
IPSEC
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
25. What does DISM do?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
It can enable a windows feature on an offline image with the /Enable-Feature option
Problem history but also application installation history.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
26. Why would a secondary DNS server stop responding to client queries?
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Windows Vista - Window 7 and Server 2008.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
You can allow by adding the device vendor's GUID to the allow list in a GPO.
27. What extensions is Firewall rules can be exported and imported?
A .WFW file
Windows Vista - Window 7 and Server 2008.
Add an AD integrated zone
The latest Vista Service Pack
28. What does DISM /UNMOUNT-WIM /COMMIT do?
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Use the "Connect to a Workplace" option
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
29. Who can run the Windows Easy Transfer Wizard?
Only a local administrator
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
30. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Deploy a secondary zone.
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
The local security logs.
31. What are IPV6 host records in DNS?
They are AAAA records.
Uncheck IPV6 from the network properties.
Adds a file based zone
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
32. Can users can share encrypted files with another user by giving them permission?
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
WECUTIL QC
33. How do you setup Windows 7 setup to run unattended?
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
Migrates EFS encrypted files?
It backs up digitally identities to a password protected file.
34. What does Credential Manager allows you to store?
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
It pings with IPV6
Use dnscmd /recorddelete
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
35. What is the Microsoft Application Compatibility Toolkit (ACT)?
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
36. How can Transparent Caching is be enabled?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
It improves performance
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
37. What is Optimize for Consistency polling mode do?
Run scripts
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
38. What is File Server Resource Manager?
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
39. How do you delegate permissions to modify a specific DNS zone?
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
Delegate permission by configuring the dacl of the zone file.
Modify/Create a GPO
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
40. What does the Ping -6 option do?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
On a core server
It pings with IPV6
41. What are the ESRB Ratings?
Not supported
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Se a capture filter based on the mac address of the problem PC.
42. What is a NAP policy?
From the Network Policy Access Services role in system manager.
It is a network health policy defines the minumum level of client health required to connect to the network.
Can be used to create virtual hard disks
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
43. How do you upgrade windows vista to windows 7?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
Which processes currently consume a resource like processor utilization.
44. What can In-Private Browsing not display?
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Suggested Sites
To deploy the policy and understand its impact before enforcing it.
Use it to can backup certificates to a .PFX file that is password protected.
45. What is a reservation?
They are monitored but not enforced. Users can exced there quota limit.
Extensive Authentication Protocol used in PPP authentication.
The domain profile not the public or private.
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
46. What are some of the IPV6 transition technologies?
ISATAP - Teredo and 6to4
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
EAP protocol.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
47. What does "wbdadmin -startrecovery -version" do?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
48. How do you verify that an Auto Update Client is connecting to its WSUS Server?
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
Computer certificates be installed on client computers
Prevents the server from performing Internet name resolution.
49. What should you do if you receive warnings that your virtual memory is low?
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
50. What can Windows 7 Enterprise can be directly upgraded to?
Windows 7 Ultimate.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
WPA2 and 802.1x but require EAP-TLS to be enable.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.