SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Scanstate /p do?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
driveletter:\\WindowsImageBackup\
Yes
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
2. What drive is System protection is automatically setup on?
Us edit dnscmd /zoneupdatefromdns command.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
3. Can the Application Compatibility Kit can also search and report on the applications installed on a Windows 7 computer?
Install Windows Installer Packages (.MSI) files. You can script the installation.
Cannot be in different domains
Yes
A file that is loaded when a DNS server starts up and populate the root hints.
4. How do you view failed WSUS updates on the client PC?
Configure the enforcement points as RADIUS clients.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
IN the WindowsUpdateClient log in the system log portion of event viewer.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
5. What do RRAS/NPS policys govern?
Comes with the Windows Automated Installation Kit (WAIK)
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
It governs remote access and a user must meet the conditions of at least one of the policies.
No
6. What happens when 3rd party vendors create a new driver?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
A stability index rating and specific event information. Data is propagated 24 hours after system installation.
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
7. What is a mx record?
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
A roecord to indicate the smtp server.
To will ensure the clients download the appropriate printer driver.
8. What is a bootstrap wireless profile?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. What OSs can IPV6 be uninstalled?
Problem history but also application installation history.
Windows Aero was revised to be more touch-friendly.
3389
Windows XP and Server 2003.
10. How do you statically add a route to a route table?
By unbinding the DHCP protocol from the nic attached to the subnet.
Cannot be in different domains
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
dynamic drives
11. How does DirectAccess work?
Use the Programs and Features Control Panel applet to
It is the authentication header protocol and digitally sign packets but not encrypt them.
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
12. How do you enable a recovery agent?
Issue a recovery agent certificate to a user and then import that certificate into a GPO that applies to the computer where that user will be allowed to recover any EFS encrypted files. EFS Data recovery agents are optional
By either using WSUS management console (server side targeting) or GPO (client side targeting).
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
13. Direct Access requires...
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Computer certificates be installed on client computers
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Use IPCONFIG or Status Details for the Network Connection.
14. What do wireless access point need to be configured with to to preform 802.1x authentication?
They must be configured with the ip addresses of the radius server.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
No
Command to configure the TCP/IP settings.
15. What dows Windows Anytime Upgrade do?
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
The domain profile not the public or private.
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
an email address where the @ is replaced with a period.
16. How can you use ImageX to apply a WIM Image directly to a VHD file?
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Who can shutdown a computer
Prevents the server from performing Internet name resolution.
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
17. How do you upgrade windows vista to windows 7?
It will display driver signing status
They are monitored but not enforced. Users can exced there quota limit.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
18. What is a ESP?
IPV4 and IPV6
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Forward to another DNS server
Encapsulating Security payload protocol used for encryption the packets created by the AH.
19. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
Setup a GlobalNames zone.
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
The local security logs.
Install Windows Installer Packages (.MSI) files. You can script the installation.
20. What are IPV6 host records in DNS?
They are AAAA records.
Configure the enforcement points as RADIUS clients.
On the properties of the DNS server in the DNS manager.
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
21. What is Internet Explorer Content Advisor?
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Use IPV6 Unique Local Addresses.
Extensive Authentication Protocol used in PPP authentication.
22. What happens if the router advertisement has the M flag set to 1?
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
DNS suffix search lists
Prevents the server from performing Internet name resolution.
23. How can you removed a stale resource record from DNS?
Disable AutoComplete in Internet Explorer
Use the BCDEDIT.EXE command
The DHCP server will ping an ip address before assigning it.
Configure aging and scavenging.
24. What is the difference between MSCHAP2 and EAP-TLS?
IPSEC
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Configure aging and scavenging.
It is a network health policy defines the minumum level of client health required to connect to the network.
25. What OSs disallow the uninstalliatin of IPV6?
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Windows Vista - Window 7 and Server 2008.
26. What does DISM /UNMOUNT-WIM /COMMIT do?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
27. What is Network Level Authentication?
By either using WSUS management console (server side targeting) or GPO (client side targeting).
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Set IE back to its default settings
WINRM QUICKCONFIG.
28. Why would you use audit-only mode?
To deploy the policy and understand its impact before enforcing it.
vssadmin.exe. This can view previous version files as well.
On a core server
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
29. Why would you nest WSUS servers?
DNS suffix search lists
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Either from wbadmin or windows server backup.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
30. What requirements must your system must meet to use BranchCache?
The domain profile not the public or private.
To display friendly labels to capture packet address headers.
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
31. How does AppLocker reduce administrative overhead and help administrators control how users can access and use files - such as executable files - scripts - Windows Installer files - and DLLs?
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
DNS suffix search lists
Create persistent connections to computers with POWERSHELL
32. How do you restore individual files?
The Application Identity Service
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
Either from wbadmin or windows server backup.
33. How do you manage EFS from the command line?
Vista SP1 and Server 2008 and above.
A OOBE ready and will be booted into Windows Welcome
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
Use the Cipher.exe command line tool.
34. How do you setup a DHCP server for redundancy?
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Used to get a list of installed 3rd party drivers
35. What are hard disk quotas?
they are enforced and will not allow a user to exceed the space limit.
It will prevent a user from deleting files in a folder. Granting Modify permission to the Creator Owners Group will allow users to delete the files they create but not the files of other users.
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
36. How do you determine if your PC's ip and its default gateway are on the same network?
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
Use the route delete command.
They are in the first 48 bits /48
It can add a driver to an offline WIM image with the /Add-Driver option
37. What is Bcdboot?
Command to configure the TCP/IP settings.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Extensive Authentication Protocol used in PPP authentication.
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
38. What are the ESRB Ratings?
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
System Restore Points as well as Previous Versions of Files (configured through the System applet).
Disable AutoComplete in Internet Explorer
39. What should you do if a host file is missing?
Streamline and simplify user state migration during large deployments of Windows Vista and Windows 7 operating systems. USMT captures user accounts - user files - operating system settings - and application settings - and then migrates them to a new
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
40. How do you have a Firewall rule apply only to a specific computer?
WPA2 and 802.1x but require EAP-TLS to be enable.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
41. What should you do if you receive warnings that your virtual memory is low?
Enforce IPSEC on the network
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Use the route delete command.
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
42. What service has to be started for Applocker to work?
Use the route delete command.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
The Application Identity Service
43. How do you configure client computers to use a WSUS server as the source for Windows Update?
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
To deploy the policy and understand its impact before enforcing it.
Modify/Create a GPO
44. Windows 9x ___________ an automatic update client.
It designates an authoritative DNS server - not the soa record.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Use your computer's zone ID at the end of the destination address. The zone ID of an IPV6 address is locally significant.
Does not have
45. What are network monitor aliases used for?
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
To display friendly labels to capture packet address headers.
Can be configured through a GPO
On a core server
46. What is File Server Resource Manager?
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
The Default Programs Control Panel applet
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
47. What does Cipher /X do?
Windows 7 Ultimate.
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
Use it to can backup certificates to a .PFX file that is password protected.
driveletter:\\WindowsImageBackup\
48. What does "wbdadmin -startrecovery -version" do?
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
Used to get a list of installed 3rd party drivers
Clients establish an IPsec tunnel for the IPv6 traffic to the DirectAccess server - which acts as a gateway to the intranet. The DirectAccess client establishes two IPsec tunnels: Psec Encapsulating Security Payload (ESP) tunnel and IPsec ESP tunnel.
49. What are a few types of NAP enforcement points?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
You will be prompted to reconnect online. To disable offline mode - select it from the Tools menu.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
It improves performance
50. What OSs support SSTP?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
dynamic drives
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Vista SP1 and Server 2008 and above.