Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 2 ways to relocate user and computer accounts to different OUs






2. With Group Polices having over 8 -000 different settings - the possibility of conflicting policies - and security filters you should track multiple versions and offline modifications to GPOs. You should recommend






3. Currently you already have in place AD - DNS and DHCP. You need an automated deployment solution for the new servers that will boot using native VHD's. You should recommend






4. to minimize the attack surface area of the servers and reduce licensing cost you should recommend






5. If your company has the need to create administrative templates (.admx) files for Active Directory runnin on server 2008 R2 you should recommend...






6. You have two identical print devices. You must plan a print services infrastructure where: the print services must be available - even if one print device fails and have the ability to manage the print queue from a central location






7. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails






8. Tool to montior replicaiton of group policy template files when DFL set at Windows SVR 2003






9. Several employees say they can't get on domain with "password incorrect" message. What utility tool can be used to identify issue and also ensure users can log into domain?






10. An AD LDS instance needs to be replicated from one server to another...






11. When recommending a monitoring solution for an application so that it's events can be stored in a central






12. File that contains the last logon time and custom attributes values for each user in your forest.






13. In order for admins at a branch office to be able to change their passwords and logon if a single DC fails even if the WAN Link to the corporate office fails you shoud

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


14. You need to allow remote access to the servers on your network while meeting the following requirements: all remote connections to the servers must be encrypted; all remote authentication attempts to the servers must be encrypted; only inbound connec






15. To protect all computers on the network from unwanted access and to ensure a consistent configuration






16. To recover objects deleted from Active Directory you should recommend






17. You need to ensure that your Windows 2008 R2 file servers meet the following: supports volumes larger than 2 terabytes - if a single disk fails - maintain data redundancy - if a single server fails - maintain access to all data - maximize disk throug






18. For complete fault tolerance the backend SQL Server should be protected as well - by placing it in a MSCS Failover Cluster) - To allow computers that are members of the domain to receive updates from a local WSUS you can easily create a group policy






19. If you need to deploy a DHCP server that supports computers that start from a PXE network adapater and support Win7






20. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






21. USB storage deviced on the client computers can be very convenient; however they create a huge security risk. To help reduce the risk of USB deviced you can implement...






22. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






23. If you need to implement a Cert Services solution that automates distribution of certificates - ensures security and gives external users acess to resources that use cert-based authentication






24. to protect file servers and hard disks that may be at risk of being accessed or stolen






25. To control access to resources using WSRM and to help prevent memory leaks from monopolizing your web server






26. Your data provisioning solution must meet the following requirements: users must have access to their Documents folder regardless of the client computer that they use; user documents should not be stored on the local client computer; minimize the tim






27. Your AD domain has an OU named Sales OU that contains the user accounts of the Sales department. A new password polity needs to be created for the Sales department that is different from the domain password policy. How is this accomplished?






28. To ensure that admins in the corporate office can manage and control all Windows Updates and manage WSUS computer groups - deploy this.






29. All client computers run Windows 7. You have 8 Window Server 2003 servers that run Terminal Services. There is also an ISA server that runs the firewall. You need to plan on giving remote users access to the Terminal Servers according to these requir






30. A specific application requires registry modifications to be in place before installing; you should use






31. If you need to deploy multiple servers through automation of installation and activation and minimize network traffic






32. 3 servers are configured as DNS servers and are ADI for the company.com zone. DNS only allows for secure updates - but you need to enable dynamic DNS updates on DCC.company.com...What do you do?






33. When one needs to audit files - folders - printers and the registry enable






34. Can be used to install the Windows RE on existing servers






35. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






36. The two role services must be deployed to prevent machines from connecting to the network if their security center settings (Firewall - Windows Updates - Defender) are NOT up to date are






37. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






38. There's an AD domain named company.com. There are 3 DC's that also hold the DNS server role which host an ADI zone named company.com. This zone is configured to update settings to Secure only Dynamic Updates. The CIO has issued a new security policy






39. You have a main office and a branch office. Your Active Director domain runs at functional level Windows Server 2008. You are planning to implement file servers in each office. Your file sharing implementation must meet the following requirements: us






40. You need a solution that replaces servers that host 2 applications. This solution must use Windows Server 2008 R2 and minimize cost.






41. All servers run 2008 R2. All client computers run Windows 7 and Outlook 2010. The sales team needs to use Outlook 2003 to support a custom application. You need a deployment strategy that meets these requirements: provide access to Outlook 2003 and 2






42. Your data recovery strategy for your Server 2008 R2 file server must meet the followign requirements: All data volumes on the server must be backed up daily; backups must have a minimal impact on performance; if a disk fails - the recovery strategy m






43. You have administrative templates that another company wants to use on their domain. How would you configure the other company's domain to use these administrative templates?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. All servers run 2008 R2 and all client computers run Windows 7. Provide a necessary access solution that meets: only computers that have the most up-to-date service packs can be granted general network access; all noncompliant computers must be redir






45. You need to recommend a solution to minimize the amount of time it takes for the sales department users to locate files in teh course bookings share.






46. If you need to minimize the bandwidth for installation






47. In order to replicate SYSVOL shares by using DFS Replicaiton (DFS-R)






48. You are upgrading only a few computers in one department to Windows 7. These computers are running a legacy XP application you should recommend...






49. A script fails to create user accounts. Which cmdlet should be added to the script to create user accounts?






50. Srv1 is a file server that has five internal SCSI hard drives. Your storage strategy needs to meet the following requirements: Physically separates the operating system data from the user data; maximize the disk space available for data storage; uses