Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The two role services must be deployed to prevent machines from connecting to the network if their security center settings (Firewall - Windows Updates - Defender) are NOT up to date are






2. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






3. Your domain has three OUs - HR - IT - and Sales. You need to redesign the layout of the OUs to support the following: Prevent GPOs that are linked to the domain from applying to computers located in IT OU; minimize number of GPOs; minimize number of






4. To create AD Domain Services snapshot






5. If a file server reaches 15% free disk space - you could free up some disk space by






6. What should be done so application does not fail after 30 days while still keeping password policy in mind?






7. 2 ways to relocate user and computer accounts to different OUs






8. When recommending a monitoring solution for an application so that it's events can be stored in a central






9. to increase the reliability of the print server - configure...






10. you have fewer Server 2003 servers that have Terminal Services installed. you also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meet the following: encrypts all remote connections to the ter






11. When one needs to audit files - folders - printers and the registry enable






12. To restore previous version of script without taking up too much of time...






13. When you need to distribute a large number of incoming connections to stateless applications such as Web servers or VPN servers you should implement this.






14. In Active Directory Sites and Services - what should be configured to ensure domain controllers only replicate between domain controllers in adjacent sites?






15. Backup solutions for the files servers that support a robotic-based tape library must support the enterprise; you should recommend






16. What should be done so the application does not fail after 30 days while still keeping the password policy in mind?






17. You need to recommend a solution to ensure that users in the Philadelphia corporate office can access the courseware files in the remote Fernwood office. You should deploy this.






18. Need a solution that will ensure that the initial settings when creating new policies for both forests will become more consistent. You should...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. If subnets are connected by CISCO router that is RFC-1542 compliant






20. Your forest containts only Windows Server 2008 domain controllers. What should be done to prepare the AD domain to install Windows Server 2008 R2 DCs?






21. IF you need to automate deployment of 32 and 64 bit 2008 R2 servers






22. George needs to administer a read-only domain controller named Server1 - but to do this with minimal permissions assigned to him. What tool should be used for this daunting task?






23. Auditing the deletion of Registry keys on all Domain Controllers






24. To allow administrators to create and store .ADMX templates in a way that allows them to have access to the template no matter what administrative computer they logon to you must






25. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -






26. DNS zone is stored in custom applicaiton directory partition. What tool is used to ensure replicaiton to new installed DC?






27. To ensure that the SQL Servers can fail over autoatically and support 2 TB drives






28. If you need to minimize the bandwidth for installation






29. To ensure that admins in the corporate office can manage and control all Windows Updates and manage WSUS computer groups - deploy this.






30. To ensure that user's documents are stored on the file server and thus subject to the corporate backup solution - you should implement this.






31. Srv1 - Srv2 - Srv 3 are Network Policy Servers (NPS) that function as RADIUS Servers. Srv1 is also Microsoft SQL Server 2008 server. The network has 20 wireless access points that are configured as RADIUS clients. You need an audit strategy with the






32. What should be done first to defragment the AD database?






33. Domain.com's network has a single forest and single domain. Users currently share files using the corporate FTP server and DropBox. You need a better solution for managing document and allowing access. The solution must meet the following: allow for






34. You plan to deploy 12 file servers. All computers and servers connect to Ethernet switches. Your data storage solution must meet these: maximizes performance and fault tolerance; allocates storage to the servers as needed; utilizes the existing netwo






35. To prevent account password from being cached on RODC server...






36. If you need to implement a Cert Services solution that automates distribution of certificates - ensures security and gives external users acess to resources that use cert-based authentication






37. SrvA has Remote Desktop Services role installed. You notice that users are consuming more than 40% of CPU resources. You want to prevent them from consuming more than 10% - however - administrators should not be limited.






38. To identify users who bypass the new corporate security policy -






39. You have a failover cluster that has an application installed. Service level agreement requires 55 percent of processor and memory utilization to be reserved for the app. A solution to guarantee service level agreement would be






40. to make shares at a remote location available to users you should implement this.






41. There are now 4 primary types of VPN solutions - PPTP - L2TP - SSTP and Direct Access. If you need to implement a VPN on Vista SP1 or higher machines you can implement SSTP.






42. Your DFS deployment needs to meet these requirements: minimize the bandwidth required to replicate data; ensure users see only folders to which they have access; ensure users can access the data locally.






43. So a user can install updates on an RODC while preventing them from logging on to any other domain controller...






44. Users need to be warned when uploading or copying MP3 files onto a corporate network share. You should implement this.






45. You need to consolidate 120 physical servers into 35 physical servers that run Windows Server 2008 R2 while meeting the following: maximize resource utilization; use existing hardware and software; support 64-bit child virtual machines; maintain sepa






46. Your company recently created a corporate web site using their own internal developers. Recently your CIO has decided that it would be best that some of the work be done by an outside contractor - and to allow that contractor to only the specific sec






47. George's user account has been deleted in Active Directory. George's user account needs to be restored by usine minimal amount of effort. What should be done?






48. PowerShell script to create user accounts with passwords from a file called password.csv






49. AD RMS is being used on the network. George is only a member of the AD RMS Enterprise Administrators group. Mitt needs to be able to change the service connection point (SCP) for the AD RMS installation. What should be done so George can accomplish t






50. For complete fault tolerance the backend SQL Server should be protected as well - by placing it in a MSCS Failover Cluster) - To allow computers that are members of the domain to receive updates from a local WSUS you can easily create a group policy