Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Domain.com's network has a single forest and single domain. Users currently share files using the corporate FTP server and DropBox. You need a better solution for managing document and allowing access. The solution must meet the following: allow for






2. To configure Administrator Role Separation for an RODC






3. To ensure that administrators are allowed to install USB drives on their Windows 7 computers - but NOT allow non-administrators






4. To ensure that a group in not giving too many permissions when delegating be sure to delagate permissions at the lower level OUs vs. at the domain level for example






5. To be able to remotely administer DNS servers that run on the Server Core installation of Server 2008 R2 - via MMC console






6. You need to devise a security solution so that after 15 days the documents distributed to the members of the School Board can only be opened by the creator owners in the high school year book department. You should recommend...






7. All 2008 R2 servers and Windows 7 clients are connected to managed switches. The following are requirements for network access: only client computers that have up-to-date service packs installed can access the network; have up-to-date anti-malware so






8. AD CS is configured on Server1 as a standalone CA. What two actions should you do to audit changes to the CA configuration settings and the CA security settings?






9. You have three domain controllers that perform a full back up every day. You need a recovery strategy for AD objects that meets these requirements: allows objects in a backup to be compared to objects in the live AD database; minimizes admin effort.






10. To join a server/PC outside of the domain to the network...






11. If a new application needs to be deployed on the network and it comes as a .msi package and then do this.






12. The ability to set quotas at the volume level has been around for many years - however if you have have servers that need quotas - but instead of placing the quota at the volume level you need to place the quota on an individual folder -






13. The two role services must be deployed to prevent machines from connecting to the network if their security center settings (Firewall - Windows Updates - Defender) are NOT up to date are






14. You need to design patch management for satellite offices that meet the following requirements: WSUS updates are approved independently for each satellite office; Internet traffic is minimized. To accomplish






15. If you want to implement BitLocker and store recovery informaiton in a central location






16. To recover objects deleted from Active Directory you should recommend






17. Recently it was decided to increase the performance of the company's Web Servers by deploying a NLB Web server farm. You need to ensure that the content is easily replicated across all the servers in the farm. You should implement this.






18. SiteA is an existing AD site. You just created a new site in AD named SiteB. AD replication needs to be configured betwen the two sites so you install a new DC and you careatd a site link between the two sites. What should be done next?






19. You plan to upgrade your networks desktops to Windows 7 however - after testing you discover an application that will only run on Windows XP. You need to make this application available to a large number of desktops.






20. For the users that work remotely that need access to files from the corporate office you should...






21. When service account passwords need to be changed for SQL they should be...






22. To decrease the amount of time it takes for the certain users to generate reports. You should recommend






23. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






24. You need to plan the deployment of an application that must meet these requirements: users must have - access to the app when they are connected to the network; access the application from an icon on their desktops.






25. CAPublishGP needs to be able to publish new certificate revocation lists - but not be able to revoke certificates. How is this accomplished?






26. You need to deploy 15 Server Core installations that are only accessible by HTTP and HTTPS. Administration of these must be able to enable administrators to install and administer server roles remotely and fully manage servers remotely






27. Two different solutions are available to help assign IP addresses to remote clients that need to VPN or Dial-in to the branch office.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


28. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails






29. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






30. If you need to encrypt all data on all disks






31. If the branch office has its own high speed WAN link and you need to minimize traffice between the corporate office and the Branch office - configure this.






32. When implementing a Hyper-V environment the benefits are enormous - however there are certain aspects of virtualization that can create some additional administrative overhead that you can not have in a pure physical environment for example






33. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






34. If you need a VPN soluction that stores VPN passwords as encrypted text and supports automatic enrollment of certificates






35. You need to recommend a BitLocker recovery method you should recommend this.






36. To restore previous version of script without taking up too much of time...






37. To protect all computers on the network from unwanted access and to ensure a consistent configuration






38. When using Remote Desktop and Remote Desktop Session hosts - to be able to control both who can gain access - and to what - on the network configure;






39. To monitor replication of group policy template files when DFL set at Windows 2008 R2...






40. To prevent account password from being cached on RODC server...






41. You have been tasked with backing up all the GPOs in the domain. The IT manager also wants you to minimize the size of the backup. You decide to use...






42. To ensure that the branch office with its own high speed internet connection receives the exact same updates as the corporate office you should recommend this.






43. You have a 2008 R2 server configured as Remote Desktop Session host. You need to deploy a line-of-business app; however - the app requires desktop themes to be enabled. Your deployment strategy must meet these requirements: only authorized users must






44. In order to replicate SYSVOL shares by using DFS Replicaiton (DFS-R)






45. If you need to ensure that data is protected by BitLocker then you will...






46. to increase the reliability of the print server - configure...






47. All servers run 2008 R2 and all client computers run Windows 7. Provide a necessary access solution that meets: only computers that have the most up-to-date service packs can be granted general network access; all noncompliant computers must be redir






48. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






49. GPO setting to prevent all users from running an application






50. You have few Server 2003 servers that have Terminal services installed. You also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meeet the following: restricts accsss to specific Remote Desktop