SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is WPA-PSK?
Restrict the share permissions of the DFS root share.
On a core server
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
WPA-Personal (uses a preshared key)
2. What are hard disk quotas?
By creating or modifying a wireless connection in Network and Sharing Center.
they are enforced and will not allow a user to exceed the space limit.
Configure a firewall rule to the specific port and block all connections.
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
3. What are Entertainment Software Rating Board (ESRB) ratings for?
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
Use IPCONFIG or Status Details for the Network Connection.
It governs remote access and a user must meet the conditions of at least one of the policies.
4. What is AH?
A type of port forwarding that allows public network computers on a Private network through nat devises.
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
It is the authentication header protocol and digitally sign packets but not encrypt them.
Windows Aero was revised to be more touch-friendly.
5. What does the MigApp.xml file do?
A type of port forwarding that allows public network computers on a Private network through nat devises.
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
6. How does AppLocker reduce administrative overhead and help administrators control how users can access and use files - such as executable files - scripts - Windows Installer files - and DLLs?
The Application Identity Service
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
7. You can still ___________ if root hints are disabled.
Forward to another DNS server
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
Use the Programs and Features Control Panel applet to
8. How do you restore a System Image from backup?
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
Yes
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
9. What does IMAGEX /MountRW do?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
10. What does NETSH BRANCHCACHE FLUSH do?
Use Safe Mode and then roll back the driver if it was recently updated.
No
Clear the content being cached
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
11. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
They relay the status on polices to the Security center for NAP to validate the system to use the network.
SP3
SSL
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
12. How do you verify your IPV6 address?
Can be configured through a GPO
IPV4 and IPV6
Use IPCONFIG or Status Details for the Network Connection.
they are enforced and will not allow a user to exceed the space limit.
13. What are the two ways that you can take advantage of system protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. You can configure process monitor alerts to _____.
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
Configure the enforcement points as RADIUS clients.
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Run scripts
15. What do you do if a computer is missing the data recovery agent certificate for the EFS recovery agent?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Export and import it from another computer.
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
16. What is PSR.EXE?
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
Configure aging and scavenging.
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
17. What type of drives can Software RAID 0 -1 -5 can only be implemented on?
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
dynamic drives
Add an AD integrated zone
Use Safe Mode and then roll back the driver if it was recently updated.
18. How do you setup a remote site that resolves names even when there is no connectivity to the main site?
To another hard disk in the same computer - network or to removable media.
Deploy a secondary zone.
Windows 7 Ultimate.
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
19. How do you review files in the Offline Files Cache?
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Use SYNC Center
Suggested Sites
IPV6 transition technologies
20. What is "Transparent Caching"?
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
they are enforced and will not allow a user to exceed the space limit.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
21. Why would a secondary DNS server stop responding to client queries?
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
A OOBE ready and will be booted into Windows Welcome
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
22. How do you configure IPSEC between two computers?
Comes with the Windows Automated Installation Kit (WAIK)
Adds a file based zone
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Use the Advanced Firewall to define Connection Security Rules.
23. What is s stub zone?
Only a local administrator
Use SYNC Center
They are monitored but not enforced. Users can exced there quota limit.
Contains a list of dynamically updated list of authorities for the zone.
24. What is IPP?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Internet printing protocol. Used for connecting to printers via web browser.
DHCP server cannot assign an ip address
dynamic drives
25. Where is scavaging configured?
IPSEC
On the properties of the DNS server in the DNS manager.
Use dnscmd /zonerefresh.
Se a capture filter based on the mac address of the problem PC.
26. In case the _______________ - DHCP clients can be configured with an alternative static ip address?
dynamic drives
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
DHCP server cannot assign an ip address
Yes
27. What does a BranchCache client hosting content in distributed cache mode must have?
DHCPv6 obtains additional configuration settigns.
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
IPSEC
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
28. How does a autoconfiguration router or DHCP assign a IPV6 address (after the Local Link Address)?
Use it to can backup certificates to a .PFX file that is password protected.
Encapsulating Security payload protocol used for encryption the packets created by the AH.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Send email notifications
29. What service has to be started for Applocker to work?
The Application Identity Service
They are AAAA records.
To will ensure the clients download the appropriate printer driver.
Use the Cipher.exe command line tool.
30. What is the command to add a DNS server?
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Command to configure the TCP/IP settings.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Perform an offline migration
31. What is terminal server network level authentication?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
1723
32. What is DiskPart?
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Create a customized shell
33. What windows 7 OSs can join a domain?
Which processes currently consume a resource like processor utilization.
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
They are AAAA records.
34. IPV6 is _____ on Windows 2000
Comes with the Windows Automated Installation Kit (WAIK)
Not supported
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
35. What is a HomeGroup?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. What is System protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. What does Diskpart.exe do?
Can be used to create virtual hard disks
Create persistent connections to computers with POWERSHELL
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
Cannot be in different domains
38. What does the MigUser.xml file do?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
It is the Microsoft SMB client for accessing shared network resources
Use IPCONFIG or Status Details for the Network Connection.
39. How do you add the Windows 7 VHD to the boot choices menu?
Migrates EFS encrypted files?
Divide up a large WIM file into multiple smaller .SWM files
Use the BCDEDIT.EXE command
Is a command-line tool for managing BCD stores. It can be used for a variety of purposes - including creating new stores - modifying existing stores - adding boot menu options - and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on
40. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
A LAN Router only or a LAN to WAN Router
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
By unbinding the DHCP protocol from the nic attached to the subnet.
41. What mode is BranchCache configured for branch offices with fewer than 50 users?
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
WPA-Personal (uses a preshared key)
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
42. How do you move a Dynamic Disk from one computer to another?
Use the Import Foreign Disk option on the target computer
Divide up a large WIM file into multiple smaller .SWM files
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
43. What type of router can RRAS be configured as?
Use the Cipher.exe command line tool.
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
The DHCP server will ping an ip address before assigning it.
A LAN Router only or a LAN to WAN Router
44. How do you install applications in Windows XP Mode?
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
On a core server
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
To deploy the policy and understand its impact before enforcing it.
45. How do you configure client computers to use a WSUS server as the source for Windows Update?
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
Us edit dnscmd /zoneupdatefromdns command.
Modify/Create a GPO
Drop both inbound and outbound traffic
46. What is Reliability Monitor display?
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
IN the WindowsUpdateClient log in the system log portion of event viewer.
47. Where is Software RAID is configured?
At the volume level - not the drive level.
Windows Aero was revised to be more touch-friendly.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
48. What does "Create System Repair Disk" option do?
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
WECUTIL QC
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
49. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
50. How can non Microsoft PCs connect to print services?
The local security logs.
Forward to another DNS server
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
To deploy the policy and understand its impact before enforcing it.