Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Striped volumes






2. All servers run 2008 R2 and all client computers run Windows 7. Provide a necessary access solution that meets: only computers that have the most up-to-date service packs can be granted general network access; all noncompliant computers must be redir






3. With AppLocker settings - which Windows PowerShell cmdlet would be used to identify whether a specific application file is allowed to run on a computer?






4. You need to rebuild a server and reinstall the operating system - and rollback all operations master roles to original state...






5. You need a strategy for backing up your 2008 R2 file servers according to these: allows for individual file restore; allows for complete server recovery; supports scheduled backups; provides decentralized control over backups and recovery; minimizes






6. All 2008 R2 servers and Windows 7 clients are connected to managed switches. The following are requirements for network access: only client computers that have up-to-date service packs installed can access the network; have up-to-date anti-malware so






7. You need an Active Directory strategy that supports the recovery of deleted objects for up to one year after the date of deletion. to accomplish this






8. You don't want users to be able to install removable devices on client computers. However - domain admins and desktop support technicians must be allowed to install removable devices on client computers






9. What Function Level (FL) needs to be in place to enable AD Recycle Bin?






10. If users complain that it is hard to find the shared folders on the network implement






11. You need to create a DNS infrastructure that must allow client computers in each office to register DNA names within their respective offices and client computuers must be able to resolve names for hosts in all offices






12. If you need to be able to create shared folders on Server 2008 R2






13. To speed up the deployment of the RODC in the new branch offices you should take advantage of this.






14. You need to plan the deployment of an application that must meet these requirements: users must have - access to the app when they are connected to the network; access the application from an icon on their desktops.






15. All servers run 2008 R2 and all client computers run XP SP1. You need to deploy Distributed File System (DFS) to meet these: minimize cost; provide redundancy in the event a single server fails; ensure client computers reconnect to their preferred se






16. To backup Virtual Machines






17. Your data provisioning solution must meet the following requirements: users must have access to their Documents folder regardless of the client computer that they use; user documents should not be stored on the local client computer; minimize the tim






18. You need to modify DNS infrastructure to support dynamic updates to ALL DNS servers; ensure DNS service available even if single server fails; encrypt the synchronization data sent between DNS servers.






19. Capture all replication errors from all your DCs to a central location...






20. If you need secure method to verify validity of individual certificates and minimize network bandwidth






21. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






22. When deploying an application using the Group Policy distribution method assign the...






23. You have a couple support technicians located in branch office on Server 2008 R2 machines with the following requirements: Install server roles; stop and start services; minimize the security privileges granted to the support technicians






24. In Active Directory Sites and Services - what should be configured to ensure domain controllers only replicate between domain controllers in adjacent sites?






25. To monitor replication of group policy template files when DFL set at Windows 2008 R2...






26. Your company recently created a corporate web site using their own internal developers. Recently your CIO has decided that it would be best that some of the work be done by an outside contractor - and to allow that contractor to only the specific sec






27. To replicate SYSVOL using Distributed File System Replication (DFSR)...






28. If you need to ensure that data is protected by BitLocker then you will...






29. Domain.com's network consists of a Single AD domain. All servers and domain controllers run Windows Server 2008 R2. You need to ensure that you can: track all changes made to AD objects by the recently hired IT consulting firm; Ensure that the audits






30. To compact AD database...






31. Currently you already have in place AD - DNS and DHCP. You need an automated deployment solution for the new servers that will boot using native VHD's. You should recommend






32. AD RMS is being used on the network. George is only a member of the AD RMS Enterprise Administrators group. Mitt needs to be able to change the service connection point (SCP) for the AD RMS installation. What should be done so George can accomplish t






33. UPN Suffix xxxx.com needs to be available for user accounts...






34. hr.domain.com domain has an OU named Sales...You need to give UserA administrative rights so that he can manage Group Policies for the Sales OU while meeting the following requirments: UserA must be able to create and configure Group Polices in hr.do






35. You need to recommend a solution for users in the branch office to access files in the main office. To minimize the amount of time it takes for users in the Branch office to access files stored on servers in the main office - and minimize the number






36. All DCs run Windows Server 2008 R2 and have the DNS Server role installed. The domain controllers for each location are stored locally. Each has its own standard primary zone to support its local domain.You need a plan that meets the following: WAN l






37. Your AD environment has an Enterprise Root CA. What 2 actions should you take to ensure that only administrators can sign code?






38. Company users IPV4 and IPV6. A PC uses IPV6 and can no longer authenticate off the DC. What can be done to ensure IPV6 computers authenticate to DCs in same site...






39. For the users that work remotely that need access to files from the corporate office you should...






40. With Group Polices having over 8 -000 different settings - the possibility of conflicting policies - and security filters you should track multiple versions and offline modifications to GPOs. You should recommend






41. GPO's can be difficult to manage; you need a solution that will include version tracking and offline modifications. You should recommend






42. To allow administrators tha trun Windows 7 ability to manage the DNS server that runs on the Server Core installation of Server 2008 R2






43. To configure AD FS so tokens contain information from Active Directory domain...






44. 4 steps to perform offline Defragmentation of AD database...






45. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails






46. To add a new UPN for all user accounts...






47. A DNS structure should be deployed acording to the following requirements: ensure resources in the root and child domains are accessible by FQDN; provide name resolution services in the event that a single server fails for a prolonged period of time;






48. What should be done first to defragment the AD database?






49. To allow a specifc user or group to manage the address information for the user accounts...






50. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to