SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is a split tunnel VPN?
Computer certificates be installed on client computers
Pool Active Directory.
Internet printing protocol. Used for connecting to printers via web browser.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
2. How do you capture a computer's hard disk to a .WIM file?
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Use the BCDEDIT.EXE command
3. What is a ns record?
It designates an authoritative DNS server - not the soa record.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Windows 7 Professional.
4. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
They need to be configured us use 802.1x RADIUS authentication
Divide up a large WIM file into multiple smaller .SWM files
Place unhealthy computers in a quarantined network and auto-remediate clients.
5. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Run scripts
It is the Microsoft SMB client for accessing shared network resources
By unbinding the DHCP protocol from the nic attached to the subnet.
6. What are IPV6 host records in DNS?
They are AAAA records.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Yes
You can allow by adding the device vendor's GUID to the allow list in a GPO.
7. How do you configure client computers to use a WSUS server as the source for Windows Update?
Yes
Modify/Create a GPO
By running the Update Status summary report.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
8. What does Scanstate /p do?
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Extensive Authentication Protocol used in PPP authentication.
Yes - it can be modified to apply to a network location.
9. What does the Ping -6 option do?
Yes
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
It pings with IPV6
Use the Import Foreign Disk option on the target computer
10. How do you have a Firewall rule apply only to a specific computer?
IN the WindowsUpdateClient log in the system log portion of event viewer.
To another hard disk in the same computer - network or to removable media.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
They are monitored but not enforced. Users can exced there quota limit.
11. How do you upgrade windows 7?
Se a capture filter based on the mac address of the problem PC.
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
12. What does dnscmd /zoneadd dsprimary do?
Use the route delete command.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
Enforce IPSEC on the network
Add an AD integrated zone
13. What is IPP?
Conditional forward
Internet printing protocol. Used for connecting to printers via web browser.
It backs up digitally identities to a password protected file.
Use the Cipher.exe command line tool.
14. What is Drvload?
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
Use the Cipher.exe command line tool.
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
15. What is the difference between MSCHAP2 and EAP-TLS?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
System Restore Points as well as Previous Versions of Files (configured through the System applet).
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
L2TP/IPSEC with EAP-TLS.
16. What does DirectAccess uses to authenticate?
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
17. Can you choose which media libraries you want to share with your homegroup?
Use the Programs and Features Control Panel applet to
Enforce IPSEC on the network
Yes
Computer certificates be installed on client computers
18. What is System protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. What are WIM files used for?
At the volume level - not the drive level.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
The ICMP protocol.
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
20. What is EAP?
It will display driver signing status
Only sites added to the local Intranet Zones
Extensive Authentication Protocol used in PPP authentication.
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
21. How do you configure IPSEC?
dynamic drives
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
It designates an authoritative DNS server - not the soa record.
Delete all the zone files or reinstall the DNS service.
22. What does dnscmd /zoneadd primary do?
A file that is loaded when a DNS server starts up and populate the root hints.
Adds a file based zone
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
23. How do you connect to a wireless access point is not broadcasting its SSID?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
By creating or modifying a wireless connection in Network and Sharing Center.
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
24. What is a WSUS server?
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Send email notifications
WIndows Update Server
The DHCP server will ping an ip address before assigning it.
25. There is a RESET option in Internet Explorer to...
Prevents the server from performing Internet name resolution.
Comes with the Windows Automated Installation Kit (WAIK)
Configure the enforcement points as RADIUS clients.
Set IE back to its default settings
26. How do you set a DNS server to a cache only DNS server?
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
The latest Vista Service Pack
Uncheck IPV6 from the network properties.
Delete all the zone files or reinstall the DNS service.
27. What event viewer log is the Radius server (NPS) logs stored?
The local security logs.
On the properties of the DNS server in the DNS manager.
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
28. Why is PKi needed to encypt vpn traffic?
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
Setup a GlobalNames zone.
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
29. What does MISEXEC.EXE do?
Use it to generate an EFS user certificate
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Install Windows Installer Packages (.MSI) files. You can script the installation.
30. What does Reliability Monitor display?
Problem history but also application installation history.
No
Yes
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
31. What is the cache.DNS file?
A file that is loaded when a DNS server starts up and populate the root hints.
At the volume level - not the drive level.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
32. What do DFS nameservers need to do to obtain the most current namespace data?
Run scripts
Pool Active Directory.
Sent across the network
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
33. Is the DHCP automatically authorized in active directory?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
WINRM QUICKCONFIG.
It is the max size is expressed in megabytes.
It can enable a windows feature on an offline image with the /Enable-Feature option
34. What has Windows 7 modified in searching?
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
35. What port uses PPTP uses?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
1723
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Use dnscmd /zonerefresh.
36. Where should you backup to automate System Image backups and maintain multiple images?
Use SYNC Center
They must be configured with the ip addresses of the radius server.
A network location.
IPV6 transition technologies
37. How do you add the Windows 7 VHD to the boot choices menu?
Comes with the Windows Automated Installation Kit (WAIK)
Use the BCDEDIT.EXE command
It will display driver signing status
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
38. What preforms authentication at a computer level for vpn?
Ping the Link Local Address (FE80 Address)
Run slmgr.vbs -ato and then open up 3389 on windows firewall using netsh.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
L2TP/IPSEC with EAP-TLS.
39. How do you setup Ready Boost?
Use Safe Mode and then roll back the driver if it was recently updated.
To display friendly labels to capture packet address headers.
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
40. What does DISM /UNMOUNT-WIM /COMMIT do?
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
DHCP server cannot assign an ip address
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
It create a report of which files will be migrated
41. What is the RACAgent?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Use Safe Mode and then roll back the driver if it was recently updated.
Enterprise Admins
42. Where is scavaging configured?
vssadmin.exe. This can view previous version files as well.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
On the properties of the DNS server in the DNS manager.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
43. What can In-Private Browsing not display?
Yes
4 (bits 53 - 56) /56 Allows for 16 regions
Suggested Sites
Use the Programs and Features Control Panel applet to
44. What protocol does NAP enforce when used in 802.1x authentication?
No
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
It can enable a windows feature on an offline image with the /Enable-Feature option
EAP protocol.
45. What is BCD?
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
IPV6 transition technologies
46. What does IP Helper service has to run for?
On a core server
IPV6 transition technologies
They are monitored but not enforced. Users can exced there quota limit.
Yes
47. What is Optimize for scalability polling mode do?
Windows XP and Server 2003.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
48. What can you use the User State Migration Tools (USMT) for?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
DNS suffix search lists
49. How do you setup a remote site that resolves names even when there is no connectivity to the main site?
Deploy a secondary zone.
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
WPA-Personal (uses a preshared key)
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
50. What is another way to deploy an application compatibility database across multiple computers?
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
Through a GPO.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).