SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the command to set a collecting computer for event log forwarding?
WPA-Enterprise (radius authentication)
Pool Active Directory.
Deploy a secondary zone.
WECUTIL QC
2. How do you export the DNS zone to a text file?
They relay the status on polices to the Security center for NAP to validate the system to use the network.
By using the dnscmd /zoneexport command.
Add an AD integrated zone
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
3. What does AppLocker allows you to generate default rules for?
Configure aging and scavenging.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
4. What can NAP do?
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Place unhealthy computers in a quarantined network and auto-remediate clients.
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
5. What are WIM files used for?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
The Default Programs Control Panel applet
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
6. What versions of Windows 7 support Bitlocker Drive Encryption?
Run scripts
By running the Update Status summary report.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
7. How do you initiate a zone transfer?
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
Use the BCDEDIT.EXE command
Use dnscmd /zonerefresh.
8. What is s stub zone?
It is the authentication header protocol and digitally sign packets but not encrypt them.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
Contains a list of dynamically updated list of authorities for the zone.
9. What windows 7 OSs can join a domain?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
10. What is the cache.DNS file?
A type of port forwarding that allows public network computers on a Private network through nat devises.
A file that is loaded when a DNS server starts up and populate the root hints.
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
Can be configured through a GPO
11. What does IMAGEX /SPLIT do?
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
Divide up a large WIM file into multiple smaller .SWM files
12. What do Print permission only allows?
Divide up a large WIM file into multiple smaller .SWM files
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Use dnscmd /zonerefresh.
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
13. What does MISEXEC.EXE do?
Does not
Install Windows Installer Packages (.MSI) files. You can script the installation.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
Use the Import Foreign Disk option on the target computer
14. What do RRAS/NPS policys govern?
It governs remote access and a user must meet the conditions of at least one of the policies.
SP3
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
SSL
15. How do you configure client computers to use a WSUS server as the source for Windows Update?
Use it to generate an EFS user certificate
Modify/Create a GPO
Through a GPO.
Delegate permission by configuring the dacl of the zone file.
16. How many bits are in the GLOBAL/UNIQUE LOCAL prefix?
Clear the content being cached
They are in the first 48 bits /48
Setup a GlobalNames zone.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
17. What does windows cardspace do?
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
Ping the Link Local Address (FE80 Address)
It backs up digitally identities to a password protected file.
18. What type of router can RRAS be configured as?
A LAN Router only or a LAN to WAN Router
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
It is the max size is expressed in megabytes.
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
19. What is Network Level Authentication?
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
20. How do you add the Windows 7 VHD to the boot choices menu?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
EAP protocol.
Use the BCDEDIT.EXE command
21. What are Entertainment Software Rating Board (ESRB) ratings for?
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
22. Can Offline migration be performed on Windows 2000?
Use dnscmd /recorddelete
Either from wbadmin or windows server backup.
No
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
23. What is AH?
It is the authentication header protocol and digitally sign packets but not encrypt them.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
By unbinding the DHCP protocol from the nic attached to the subnet.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
24. What does System Protection cover?
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Delegate permission by configuring the dacl of the zone file.
SP3
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
25. What OS can Applocker policies not be enforced?
dynamic drives
Windows 7 Professional.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
They are monitored but not enforced. Users can exced there quota limit.
26. What can you use the User State Migration Tools (USMT) for?
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
It can can forward requests from DHCP clients for ip addresses to a remote DHCP server.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
27. How do you setup a remote site that resolves names even when there is no connectivity to the main site?
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Deploy a secondary zone.
28. How do you setup a DHCP server for redundancy?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
It is the Microsoft SMB client for accessing shared network resources
It improves performance
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
29. What does the Windows 7 Upgrade Advisor do?
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Windows 7 Professional.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
30. What is System protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. How can you disable IPV6 from OSs that cant be uninstalled?
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Uncheck IPV6 from the network properties.
Extensive Authentication Protocol used in PPP authentication.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
32. What does the Ping -6 option do?
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
It pings with IPV6
Extensive Authentication Protocol used in PPP authentication.
33. What type of drives can Software RAID 0 -1 -5 can only be implemented on?
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
dynamic drives
Using wecutil -cs in an xml file.
34. How can you can prevent users from accessing certain MMC console snap ins?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Through a GPO.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Turn off the Log Spooler event on a print server.
35. What does DRIVERQUERY /SI do?
It will display driver signing status
L2TP/IPSEC with EAP-TLS.
Modify/Create a GPO
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
36. What are soft disk quotas?
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
They are monitored but not enforced. Users can exced there quota limit.
Configure aging and scavenging.
Command to configure the TCP/IP settings.
37. What account must be used to activate a DHCP server in active directory?
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
Enterprise Admins
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Use IPCONFIG or Status Details for the Network Connection.
38. What OS can be upgraded to Windows 7?
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
It can add a driver to an offline WIM image with the /Add-Driver option
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
39. What does Aero require?
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
Backups of the full system including all critical volumes (volumes that contain operating system state).
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
By either using WSUS management console (server side targeting) or GPO (client side targeting).
40. Where is Reliability Monitor data kept?
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
41. What is a HOSTS file?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
SSL
Use the Import Foreign Disk option on the target computer
42. How do you setup Ready Boost?
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
43. What is a NPS server?
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
Use dnscmd /recorddelete
The DHCP server will ping an ip address before assigning it.
44. How do you delegate permissions to modify a specific DNS zone?
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Extensive Authentication Protocol used in PPP authentication.
Delegate permission by configuring the dacl of the zone file.
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
45. Where are Applocker policies are configured?
Through a GPO under Application Control Policies in the Computer Security Settings Node.
It is the max size is expressed in megabytes.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
46. Where is scavaging configured?
4 (bits 49 - 52) /52 Allows for 16 regions.
On the properties of the DNS server in the DNS manager.
Divide up a large WIM file into multiple smaller .SWM files
Can be configured through a GPO
47. What does the WSUS DB Store?
Set IE back to its default settings
A roecord to indicate the smtp server.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
48. What port does RDP use?
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
WPA-Personal (uses a preshared key)
3389
49. What is Oscdimg?
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
50. What do you do if the firewall is running on the remote PC?
Using wecutil -cs in an xml file.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
Use the net sh command to configure the proper ports for remote management.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo