Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If you need secure method to verify validity of individual certificates and minimize network bandwidth






2. You have 5 windows Server 2008 R2 servers that are configured with the File Server role. you need to monitor the file servers with the following requirements in mind: administrators must be able to create reports that display folder usage by differen






3. In AD Sites and Service - which level is Universal Group Membership caching activated / deactivated?






4. In order to reduce the administrative overhead typically involved with viewing event logs across multiple servers you should implement this.






5. Company users IPV4 and IPV6. A PC uses IPV6 and can no longer authenticate off the DC. What can be done to ensure IPV6 computers authenticate to DCs in same site...






6. Jack and Jill go up the hill - both with a buck and a quarter






7. You need a solution that allows a global group to perform the following: stop and start services; change registry settings; change network settings






8. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






9. You need to access some resources in another domain that is part of another forest. What type of trust should you create?






10. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






11. To join a server/PC outside of the domain to the network...






12. Requirements are: support the installation of SQL Server 2008; Provide redundancy for SQL services if a single server fails. To accomplish this






13. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






14. Deploying a web server farm can be costly. You need to minimize the amount of disk space used.






15. What document management solution allows you to keep multiple versions of documents and automatically apply access policies to these documents? You should recommend






16. To determine size of AD database file...






17. All client computers run Windows 7. You have 8 Window Server 2003 servers that run Terminal Services. There is also an ISA server that runs the firewall. You need to plan on giving remote users access to the Terminal Servers according to these requir






18. You need to recommend a solution to ensure that users in the Philadelphia corporate office can access the courseware files in the remote Fernwood office. You should deploy this.






19. You need to deploy a sales application that only the sales users must have access to






20. You need to deploy a new application according to the following requirements: must be available to remote users when they are offline; must access the application from an icon on the Start menu






21. SrvA has the AD LDS role and an instance named LDSInst1. You connect to this instance by using the ADSI Edit utility. When you execute the Create Object wizard there is no User object class. What should be done so you can create user objects in LDSIn






22. You need a solution for your Web servers that meet these requirements: ensures that the Web site is accessible even if a single server fails; supports the addition of more Web servers without interrupting client connections.






23. In order to ensure highly available Windows Update servers you should create this.






24. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD






25. Srv1 is a Server 2008 R2 file server. If you want users to be able to access shared files when they are disconnected from the network -






26. to prevent VMs from receiving updats from a group policy






27. Your AD environment has an Enterprise Root CA. What 2 actions should you take to ensure that only administrators can sign code?






28. To protect all computers on the network from unwanted access and to ensure a consistent configuration






29. What should be done to ensure changes made to AD objects can be logged?






30. To help restrict access to Windows 7 computer in the event that it gets stolen implement






31. to ensure that server backups can be performed remotely from your backup server on your company file server you should perform these two actions






32. If you need to minimize the bandwidth for installation






33. DFL is Windows Server 2003 and client computers run Vista. DCRMS is a server that holds AD RMS. What should be done to configure AD RMS so users - including Waldo - can protect their data?






34. You need to ensure that users that access your web site can use any browser; however - they must be authenticated on a membership page. In order for this authentication to be done securely in IIS implement






35. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






36. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us






37. You need to allow remote access to the servers on your network while meeting the following requirements: all remote connections to the servers must be encrypted; all remote authentication attempts to the servers must be encrypted; only inbound connec






38. DNS zone is stored in custom applicaiton directory partition. What tool is used to ensure replicaiton to new installed DC?






39. You need to manage GPO to meet the following: allow administrators to view and edit the GPO in their own language; minimize number of GPOs deployed






40. Client computers run Windows 7 and all applications on the computers are configured to save documetns to the local Documents folder. You need a backup strategy that meets these: Back up the Documents folder for all users; minimize admin effort. To ac






41. All servers run 2008 R2. All client computers run Windows 7 and Outlook 2010. The sales team needs to use Outlook 2003 to support a custom application. You need a deployment strategy that meets these requirements: provide access to Outlook 2003 and 2






42. To replicate SYSVOL using Distributed File System Replication (DFSR)...






43. To be able to manage all the corporate servers from a workstation - you must install the






44. RDSRv1 is a Server 2008 R2 Remote Desktop Session Host. RDSrv1 has 8 custome apps installed. Each is configured as a RDP RemoteApp. You notice that when a user runs one of the apps - other users report that the server seems slow and that some apps be






45. Your AD domain has an OU named Sales OU that contains the user accounts of the Sales department. A new password polity needs to be created for the Sales department that is different from the domain password policy. How is this accomplished?






46. You are about to deploy a distributed database appliation that will run on multiple 2008 R2 servers. This deployment needs to follow these requirements: uses the existing network infrastructure; uses standard Windows management tools; allocates stora






47. To allow for an application on a Remote Desktop Server to be available through document invocation - you must






48. A specific application requires registry modifications to be in place before installing; you should use






49. To ensure that the branch office with its own high speed internet connection receives the exact same updates as the corporate office you should recommend this.






50. There is a file server in each office that contains a shared folder named Data. You need to plan the data availability for the Data folder according to these requirements: if WAN link fails - the files in the Data folder must be available in all of t