SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is EAP?
IPV6 transition technologies
Extensive Authentication Protocol used in PPP authentication.
Use the Cipher.exe command line tool.
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
2. What is the name of the folder that stores all the system backup images?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. What is "Transparent Caching"?
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Run scripts
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
It governs remote access and a user must meet the conditions of at least one of the policies.
4. What is Aero Snap?
Which processes currently consume a resource like processor utilization.
Use the BCDEDIT.EXE command
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
5. What should you do if a host file is missing?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
Enforce IPSEC on the network
6. Windows 9x ___________ an automatic update client.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Does not have
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
7. What is IPsec Encapsulating Security Payload (ESP) tunnel?
Create persistent connections to computers with POWERSHELL
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
8. Does Windows 7 does have an email client like Outlook Express or Windows Mail?
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
No
A file that is loaded when a DNS server starts up and populate the root hints.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
9. What does Windows uses the index for?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Delete all the zone files or reinstall the DNS service.
Uncheck IPV6 from the network properties.
To perform very fast searches of the most common files on your computer. The easiest way to add something to the index is to include a folder in a library. When you do that - the content in that folder is automatically indexed.
10. How do you configure IPSEC between two computers?
Use the Advanced Firewall to define Connection Security Rules.
Default Programs Control Panel applet
The Default Programs Control Panel applet
The ICMP protocol.
11. Where can Windows Backup backup a local drive to?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
To another hard disk in the same computer - network or to removable media.
Contains a list of dynamically updated list of authorities for the zone.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
12. Where is Reliability Monitor data kept?
Sett up a priority for the preferred smtp server.
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
It contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7 - Windows Vista - a Windows Update - or a new version of Windows Internet Explorer in your environment.
13. What is the command line version of windows server backup?
wbadmin.exe. This can backup critical files.
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
The Default Programs Control Panel applet
14. What does netsh do?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
Command to configure the TCP/IP settings.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
15. What account must be used to activate a DHCP server in active directory?
Enterprise Admins
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
16. How do you setup a remote site that resolves names even when there is no connectivity to the main site?
Pool Active Directory.
Deploy a secondary zone.
SSL
driveletter:\\WindowsImageBackup\
17. What is DHCP conflict detection?
Us edit dnscmd /zoneupdatefromdns command.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
The DHCP server will ping an ip address before assigning it.
18. You cannot delete an individual restore point - but you can either delete all restore points or all but the most recent restore point. Deleting restore points temporarily frees up disk space. As new restore points are created - disk space will be use
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
It operates by deploying a computer that is running Windows Server 2008 R2 as a host in the branch office. Clients are configured with the fully qualified domain name of the host computer so that they can retrieve content from the Hosted Cache - when
A file that is loaded when a DNS server starts up and populate the root hints.
19. What should you use for enhanced wireless security?
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
20. What do wireless access point need to be configured with to to preform 802.1x authentication?
Uncheck IPV6 from the network properties.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
They must be configured with the ip addresses of the radius server.
From the Network Policy Access Services role in system manager.
21. How do you block all traffic for a specific port in windows firewall?
Configure a firewall rule to the specific port and block all connections.
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
WPA-Enterprise (radius authentication)
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
22. What are Entertainment Software Rating Board (ESRB) ratings for?
They are designed to provide concise and impartial information about the content in computer and video games so consumers - especially parents - can make an informed purchase decision. ESRB ratings have two equal parts: rating symbols suggest age app
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
23. How can you secure file transfers across a network?
Use the route delete command.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
The ICMP protocol.
24. How do you change the ReadyBoost configuration of a flash drive?
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
Extensive Authentication Protocol used in PPP authentication.
A LAN Router only or a LAN to WAN Router
25. What does the max=32000 mean in 'create vdisk file = c: vhd windows 7 vhdfilename.vhd max = 32000'
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
It is the max size is expressed in megabytes.
26. What protocol does Ping uses?
Default Programs Control Panel applet
Configure aging and scavenging.
Use the BCDEDIT.EXE command
The ICMP protocol.
27. Where are Applocker policies are configured?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Through a GPO under Application Control Policies in the Computer Security Settings Node.
Conditional forward
28. How do you verify your IPV6 address?
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
Through a GPO.
They are AAAA records.
Use IPCONFIG or Status Details for the Network Connection.
29. What OSs are all Windows Games installed on?
Windows 7 Enterprise and Ultimate Editions
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
an email address where the @ is replaced with a period.
4 (bits 49 - 52) /52 Allows for 16 regions.
30. What service has to be started for Applocker to work?
SP3
The Application Identity Service
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
31. What does the WSUS DB Store?
Configure a GPO to modify the computers location to look for updates.
Use dnscmd /recorddelete
DHCP server cannot assign an ip address
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
32. How do you reload an active directory integrated zone from a ad database?
Us edit dnscmd /zoneupdatefromdns command.
Devices and Printers Control Panel applet has a
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Set IE back to its default settings
33. How does a autoconfiguration router or DHCP assign a IPV6 address (after the Local Link Address)?
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Contains a list of dynamically updated list of authorities for the zone.
Comes with the Windows Automated Installation Kit (WAIK)
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
34. What is a reservation?
Run: Cscript slmgr.vbs /dl
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
35. How can you removed a stale resource record from DNS?
DHCP server cannot assign an ip address
Configure aging and scavenging.
A file that is loaded when a DNS server starts up and populate the root hints.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
36. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Cannot be in different domains
Either from wbadmin or windows server backup.
37. Use ocsetup instead of servermanagercmd.exe _________.
It is the max size is expressed in megabytes.
Use IPCONFIG or Status Details for the Network Connection.
Place unhealthy computers in a quarantined network and auto-remediate clients.
On a core server
38. Can the Application Compatibility Kit can also search and report on the applications installed on a Windows 7 computer?
By either using WSUS management console (server side targeting) or GPO (client side targeting).
4 (bits 53 - 56) /56 Allows for 16 regions
Delete all the zone files or reinstall the DNS service.
Yes
39. What is a split tunnel VPN?
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
40. Why would you deploy an application compatibility database across multiple computers?
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
The local security logs.
41. What do you modify to define CD Autoplay settings and file associations?
Set IE back to its default settings
Default Programs Control Panel applet
IPSEC
IPV4 and IPV6
42. What does the MigDocs.xml file do?
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
It will display driver signing status
Uncheck IPV6 from the network properties.
Conditional forward
43. How do you export the DNS zone to a text file?
Extensive Authentication Protocol used in PPP authentication.
Configure the enforcement points as RADIUS clients.
Send email notifications
By using the dnscmd /zoneexport command.
44. What can you use the User State Migration Tools (USMT) for?
It is the max size is expressed in megabytes.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
45. What is IPsec ESP tunnel?
WINRM QUICKCONFIG.
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
Run scripts
Restrict the share permissions of the DFS root share.
46. What can In-Private Browsing not display?
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Suggested Sites
Using wecutil -cs in an xml file.
47. How do you connect to a wireless access point is not broadcasting its SSID?
Clear the content being cached
By creating or modifying a wireless connection in Network and Sharing Center.
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
48. What dows Windows Anytime Upgrade do?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Windows 7 Enterprise and Ultimate Editions
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
49. What is WPA-EAP?
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
WPA-Enterprise (radius authentication)
Setup a GlobalNames zone.
They are monitored but not enforced. Users can exced there quota limit.
50. Where is Software RAID is configured?
At the volume level - not the drive level.
Backups of the full system including all critical volumes (volumes that contain operating system state).
Contains a list of dynamically updated list of authorities for the zone.
Use it to can backup certificates to a .PFX file that is password protected.