Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Your AD environment has an Enterprise Root CA. What 2 actions should you take to ensure that only administrators can sign code?






2. To deploy templates across the organization






3. If you need to implement Encrypting File System (EFS) and minimize amount of data transferred across and access EFS certs on any client computer






4. Within your company you have a server that will be running 8 VMs but only 6 concurrently. Your company has already purchased an Enterprise license for the server.






5. Backup solutions for the files servers that support a robotic-based tape library must support the enterprise; you should recommend






6. If a new application needs to be deployed on the network and it comes as a .msi package and then do this.






7. You need to recommend a solution to ensure that users in the Philadelphia corporate office can access the courseware files in the remote Fernwood office. You should deploy this.






8. SrvA has the AD LDS role and an instance named LDSInst1. You connect to this instance by using the ADSI Edit utility. When you execute the Create Object wizard there is no User object class. What should be done so you can create user objects in LDSIn






9. Internet access is provided through the main office to the satellite offices. You need to design a patch management for the satellite offices that meet the following requirements: WSUS updates are approved from a central location; internet traffic is






10. Certain groups of users must be able to approve certificate requrests and revoke certificates but not be able to modify the properties of the CA. You should recommend






11. To ensure that when certain users log on to any client computers in the branch office - they automatically receive the local administrator rights to the computer - and when they log off - they must lose the administrator rights






12. You have 9 2008 R2 servers that host Web apps. You need a remote mgmt strategy to manage the Web servers according to these requirements: Web developers need to be able to configure features on the Web sites; Web developers should not have full admin






13. You need to recommend management solution that will allow users to manage only certain parts of Hyper-V






14. You need to ensure that your Windows 2008 R2 file servers meet the following: supports volumes larger than 2 terabytes - if a single disk fails - maintain data redundancy - if a single server fails - maintain access to all data - maximize disk throug






15. AD structure includes a forest with one root domain and one child domain. Child domain lists entries that start with "S-1-5-21" but no account name listed. What should be done so account names are listed?






16. If you need to delegate control of server to remote admins group






17. You have a failover cluster that has an application installed. Service level agreement requires 55 percent of processor and memory utilization to be reserved for the app. A solution to guarantee service level agreement would be






18. An AD LDS instance needs to be replicated from one server to another...






19. Domain.com's network consists of a Single AD domain. All servers and domain controllers run Windows Server 2008 R2. You need to ensure that you can: track all changes made to AD objects by the recently hired IT consulting firm; Ensure that the audits






20. What role to keep same time as an external server?






21. to ensure that server backups can be performed remotely from your backup server on your company file server you should perform these two actions






22. You just dconfigured so that Server1 zone is stored in AD and accept secure dynamic updates. What command should be executed so that Server2 can accept secure dynamic updates?






23. You have three domain controllers that perform a full back up every day. You need a recovery strategy for AD objects that meets these requirements: allows objects in a backup to be compared to objects in the live AD database; minimizes admin effort.






24. To ensure that a file on a file server do not leave the organization you must implement this.






25. Your forest containts only Windows Server 2008 domain controllers. What should be done to prepare the AD domain to install Windows Server 2008 R2 DCs?






26. To ensure that the SQL Servers can fail over autoatically and support 2 TB drives






27. Tool to montior replicaiton of group policy template files when DFL set at Windows SVR 2003






28. What should be modified so you can use the nslookup utility to list all SRV records for your domain?






29. The Authorization Manager console is a Microsoft Management Console (MMC) snap-in. You can run the Authorization Manager console as a stand-alone console - or add it to any MMC console.






30. A specific application requires registry modifications to be in place before installing; you should use






31. You need to allow remote access to the servers on your network while meeting the following requirements: all remote connections to the servers must be encrypted; all remote authentication attempts to the servers must be encrypted; only inbound connec






32. DNS zone is stored in custom applicaiton directory partition. What tool is used to ensure replicaiton to new installed DC?






33. There are now 4 primary types of VPN solutions - PPTP - L2TP - SSTP and Direct Access. If you need to implement a VPN on Vista SP1 or higher machines you can implement SSTP.






34. to protect file servers and hard disks that may be at risk of being accessed or stolen






35. To recover objects deleted from Active Directory you should recommend






36. 3 Servers are Network Policy Servers (NPS) that function as RADIUS servers. The network has 20 wireless access points that are configured as RADIUS clients. You need to plan an audit strategy with the following requirements: stores audit data in a ce






37. To modify several user accounts to a new UPN suffix






38. There's an AD domain named company.com. There are 3 DC's that also hold the DNS server role which host an ADI zone named company.com. This zone is configured to update settings to Secure only Dynamic Updates. The CIO has issued a new security policy






39. To create AD Domain Services snapshot






40. To join a server/PC outside of the domain to the network...






41. You need to ensure that the guest account on all servers is disabled to






42. Srv1 is a file server that has five internal SCSI hard drives. Your storage strategy needs to meet the following requirements: Physically separates the operating system data from the user data; maximize the disk space available for data storage; uses






43. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -






44. Need to access some resources in another domain that is part of another forest...What trust is created?






45. To be able to user an application from one AD FS with authentication server to another...






46. DFL is...






47. To help restrict access to Windows 7 computer in the event that it gets stolen implement






48. You have a 2008 R2 server configured as Remote Desktop Session host. You need to deploy a line-of-business app; however - the app requires desktop themes to be enabled. Your deployment strategy must meet these requirements: only authorized users must






49. If you need to deploy multiple servers through automation of installation and activation and minimize network traffic






50. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests