Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You plan to upgrade your networks desktops to Windows 7 however - after testing you discover an application that will only run on Windows XP. You need to make this application available to a large number of desktops.






2. In order to ensure highly available Windows Update servers you should create this.






3. You need to design a data storage solution that meets the following: users must be able to choose the documents that will be available when they are away from the network; minimize the number of documents that are stored on users' portable computers;






4. To ensure that administrators are allowed to install USB drives on their Windows 7 computers - but NOT allow non-administrators






5. Your file server contains 2 volumes; one that contains the operating system and the other volume contains all data files. Your recovery strategy must meet these requirements: allows the operating system to be restored; allows the data files to be res






6. You have a main office that contains two domain controllers and a branch office that has an RODC. What should be done so that a user named George can install updates on the RODC while preventing George from logging on to any other domain controller?






7. Capture all replication errors from all your DCs to a central location...






8. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD






9. In AD Sites and Service - which level is Universal Group Membership caching activated / deactivated?






10. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






11. If your company has the need to create administrative templates (.admx) files for Active Directory runnin on server 2008 R2 you should recommend...






12. RDSRv1 is a Server 2008 R2 Remote Desktop Session Host. RDSrv1 has 8 custome apps installed. Each is configured as a RDP RemoteApp. You notice that when a user runs one of the apps - other users report that the server seems slow and that some apps be






13. Several employees say they can't get on domain with "password incorrect" message. What utility tool can be used to identify issue and also ensure users can log into domain?






14. Enables you to receive emails when domain users locked out of accounts...






15. So a user can install updates on an RODC while preventing them from logging on to any other domain controller...






16. You need a solution that allows your users to collaborate with each other and that must meet these: enables - full text indexing of all user content - remote access to files by using a Web browser - secure access to files by assigning permisions; sup






17. SiteA is an existing AD site. You just created a new site in AD named SiteB. AD replication needs to be configured betwen the two sites so you install a new DC and you careatd a site link between the two sites. What should be done next?






18. To ensure that a file on a file server do not leave the organization you must implement this.






19. George needs to administer a read-only domain controller named Server1 - but to do this with minimal permissions assigned to him. What tool should be used for this daunting task?






20. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log






21. What should be done to ensure changes made to AD objects can be logged?






22. You just dconfigured so that Server1 zone is stored in AD and accept secure dynamic updates. What command should be executed so that Server2 can accept secure dynamic updates?






23. Deployment solutions that will allow both the 64 bit version of Office 2010 and the 32 bit version Office 2003 to run at a same time on a Windows 7 computer - and to do that when the computer is offline - are very limited. You should recommend






24. To deploy templates across the organization






25. You have 159 server 2008 R2 servers that must meet the following: notification by e-mail to the administrator if error occurs on any server with minimum effort...






26. If subnets are connected by CISCO router that is RFC-1542 compliant






27. There are now 4 primary types of VPN solutions - PPTP - L2TP - SSTP and Direct Access. If you need to implement a VPN on Vista SP1 or higher machines you can implement SSTP.






28. When one needs to audit files - folders - printers and the registry enable






29. To allow connection to a 256 Kbps ISDN...






30. You need to recommend the minimum number of logical unit numbers (LUNs) that must be provisioned for Cluster. If the cluster has an even number of nodes ...






31. What GPO setting should be configured to prevent all users from running an application?






32. You need to plan for the delegation of administrative authority for an OU in your AD named Staff. It should: allow help desk admins to create user accounts in the Staff OU; allow helpdesk admins to change the address attributes; prevent HelpDesk admi






33. to make shares at a remote location available to users you should implement this.






34. You have a main office and a branch office. Your Active Director domain runs at functional level Windows Server 2008. You are planning to implement file servers in each office. Your file sharing implementation must meet the following requirements: us






35. 2 ways to relocate user and computer accounts to different OUs






36. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






37. If you need to implement Encrypting File System (EFS) and minimize amount of data transferred across and access EFS certs on any client computer






38. File that contains the last logon time and custom attributes values for each user in your forest.






39. You need to recommend a server configuration to support a Web-based application that must meet these requirements: the app must be available to all users if a single server fails; support the installation of .NET applications; Minimize software costs






40. Your forest containts only Windows Server 2008 domain controllers. What should be done to prepare the AD domain to install Windows Server 2008 R2 DCs?






41. To be able to remotely administer DNS servers that run on the Server Core installation of Server 2008 R2 - via MMC console






42. To backup Virtual Machines






43. SrvA has Remote Desktop Services role installed. You notice that users are consuming more than 40% of CPU resources. You want to prevent them from consuming more than 10% - however - administrators should not be limited.






44. Auditing the deletion of Registry keys on all Domain Controllers






45. To control access to resources using WSRM and to help prevent memory leaks from monopolizing your web server






46. With AppLocker settings - which Windows PowerShell cmdlet would be used to identify whether a specific application file is allowed to run on a computer?






47. You have a main office and 2 branch offices. Your OU structure mimics this. The branch office admins need to be able to apply GPOs only to their respective OUs. What 2 steps should you take to accomplish this?






48. To identify users who bypass the new corporate security policy -






49. When deploying group polices we want to configure them so that they are applied as quickly as possible. One way this can be done is if the policy only consists of computer settings. If this is the case we can do this.






50. You are upgrading only a few computers in one department to Windows 7. These computers are running a legacy XP application you should recommend...