SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You can still ___________ if root hints are disabled.
SSL
Forward to another DNS server
Use the Advanced Firewall to define Connection Security Rules.
One of the tunnels if DirectAccess by using both a computer certificate and user credentials. This tunnel authenticates the user and provides access to intranet resources and application servers.
2. What does MISEXEC.EXE do?
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
Install Windows Installer Packages (.MSI) files. You can script the installation.
Yes
3. What is s stub zone?
Install Windows Installer Packages (.MSI) files. You can script the installation.
Contains a list of dynamically updated list of authorities for the zone.
Use it to can backup certificates to a .PFX file that is password protected.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
4. What do RRAS/NPS policys govern?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
It governs remote access and a user must meet the conditions of at least one of the policies.
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
5. How many bits are in the regional prefix?
4 (bits 49 - 52) /52 Allows for 16 regions.
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
Computer certificates be installed on client computers
Run scripts
6. What is DirectAccess?
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
Use the Cipher.exe command line tool.
Setup a GlobalNames zone.
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
7. What is Touch UI?
Windows Aero was revised to be more touch-friendly.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
IPSEC
Configure aging and scavenging.
8. How do you reload an active directory integrated zone from a ad database?
Us edit dnscmd /zoneupdatefromdns command.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
9. How can you delete route table entries?
Use the route delete command.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
Add an AD integrated zone
10. What can administrators due with file server resource manager?
It can add a driver to an offline WIM image with the /Add-Driver option
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
Use AD integrated zones so the clients can update to more than one DNS server.
By running the Update Status summary report.
11. What do you do if you install an older operating AFTER you install Windows 7?
To another hard disk in the same computer - network or to removable media.
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
12. What must you do if you have a static ip address assigned?
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
On the zone file of the DNS server in the DNS manager.
13. What is a bootstrap wireless profile?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. IPV6 is _____ on Windows 2000
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Not supported
15. What will a (.root) zone do in a DNS server?
Ping the Link Local Address (FE80 Address)
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
Prevents the server from performing Internet name resolution.
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
16. What does the Resource Monitor display?
Which processes currently consume a resource like processor utilization.
4 (bits 53 - 56) /56 Allows for 16 regions
No they are disabled
Only sites added to the local Intranet Zones
17. What can In-Private Browsing not display?
Suggested Sites
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
18. What does netsh do?
Configure the enforcement points as RADIUS clients.
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
A network location.
Command to configure the TCP/IP settings.
19. Where do you get the USMT?
Comes with the Windows Automated Installation Kit (WAIK)
To will ensure the clients download the appropriate printer driver.
4 (bits 53 - 56) /56 Allows for 16 regions
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
20. How can you secure file transfers across a network?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
21. You can configure process monitor alerts to _____.
Run scripts
4 (bits 49 - 52) /52 Allows for 16 regions.
Used to get a list of installed 3rd party drivers
Send email notifications
22. What is BranchCache?
Use SYNC Center
DHCP server cannot assign an ip address
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
23. How do you ping the IPV6 address of a remote computer?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. How do you view failed WSUS updates on the WSUS server?
Command line equilivant of Server Manager. You can install/remove roles and features on server 2008?
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
No
By running the Update Status summary report.
25. How do you setup a DHCP server for redundancy?
Run: Cscript slmgr.vbs /dl
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
26. What does running network monitor in PMode do?
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
Create persistent connections to computers with POWERSHELL
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
27. What is Aero Peek?
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
Windows Aero was revised to be more touch-friendly.
Can be configured through a GPO
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
28. What does IMAGEX /SPLIT do?
Restrict the share permissions of the DFS root share.
Encapsulating Security payload protocol used for encryption the packets created by the AH.
DNS suffix search lists
Divide up a large WIM file into multiple smaller .SWM files
29. What does DISM do?
It can enable a windows feature on an offline image with the /Enable-Feature option
Backups of the full system including all critical volumes (volumes that contain operating system state).
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
No
30. What does the MigUser.xml file do?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
31. The WSUS server and remote SQL server _____________.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
Cannot be in different domains
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
32. How do you determine if your PC's ip and its default gateway are on the same network?
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
Use Safe Mode and then roll back the driver if it was recently updated.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
WPA-Enterprise (radius authentication)
33. Windows firewall can be configured to ___________.
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Drop both inbound and outbound traffic
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
34. What does Cipher /K do?
WPA2 and 802.1x but require EAP-TLS to be enable.
Use it to generate an EFS user certificate
Use the route delete command.
Yes
35. What windows 7 OSs can join a domain?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
Internet printing protocol. Used for connecting to printers via web browser.
Place unhealthy computers in a quarantined network and auto-remediate clients.
36. Does Windows 7 does have an email client like Outlook Express or Windows Mail?
No
DNS suffix search lists
4 (bits 53 - 56) /56 Allows for 16 regions
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
37. What will happen if click on a hyperlink when you are viewing a web page offline in Internet Explorer?
Run: Cscript slmgr.vbs /dl
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
38. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
SSL
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
39. What is a HOSTS file?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
WINRM QUICKCONFIG.
an email address where the @ is replaced with a period.
40. How do you verify your IPV6 address?
Perform an offline migration
Use IPCONFIG or Status Details for the Network Connection.
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Certain firewall rules configured for the Peer Discovery and Content Retrieval.
41. What does Windows XP Mode requires?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
WIndows Update Server
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
42. How many bits are in the site subnet?
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Can be used to create virtual hard disks
Through a GPO under Application Control Policies in the Computer Security Settings Node.
43. What is the command to add a DNS server?
It can enable a windows feature on an offline image with the /Enable-Feature option
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
44. What does Parental Controls do?
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Restrict when a child can logon to a computer.
Computer certificates be installed on client computers
Us edit dnscmd /zoneupdatefromdns command.
45. Where can Windows Backup backup a local drive to?
DNS suffix search lists
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
To another hard disk in the same computer - network or to removable media.
46. What does DirectAccess uses to authenticate?
The Default Programs Control Panel applet
Sent across the network
Us edit dnscmd /zoneupdatefromdns command.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
47. What extensions is Firewall rules can be exported and imported?
4 (bits 49 - 52) /52 Allows for 16 regions.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Windows XP and Server 2003.
A .WFW file
48. What is the command to set a collecting computer for event log forwarding?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
WECUTIL QC
Delete all the zone files or reinstall the DNS service.
Through a GPO.
49. How do you statically add a route to a route table?
Not supported
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
Devices and Printers Control Panel applet has a
50. What service has to be started for Applocker to work?
Default Programs Control Panel applet
The local security logs.
A .WFW file
The Application Identity Service