SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MSITP
Start Test
Study First
Subjects
:
certifications
,
msitp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In order to manage websites without having to logon you can use
Modify the local policy to point to the Internal WSUS server
Raise the DFL to Windows Server 2008 R2.
Implement Windows System Resource Manager (WSRM)
PowerShell 2.0
2. What shold be done to configure AD RMS so users can protect their data?
Create an e-mail account in AD DS for your RMS users
Encrypting File System (EFS). This can be enabled locally or through a GPO.
Distributed File System (DFS) Replication
Implement a domain-based DFS namespace that uses replication
3. to make shares at a remote location available to users you should implement this.
From Server A - run Create Basic Task Wizard
Domain based Distributed File System (DFS) namespace and DFS Replication.
An Active Directory subnet object needs to be created.
AD Domains and Trusts
4. In order to reduce the administrative overhead typically involved with viewing event logs across multiple servers you should implement this.
Event Log Subscriptions
Create an Active Directory-Integrated zone.
Add the new UPN Suffix to the forest
Implement a domain-based DFS namespace and add a second namespace server; Enable the "Clients fail back to preferred targets" option. Make sure all client computers have at least XP SP2.
5. Engineering department has 582 Windows Server 2008 R2 servers. You need to monitor the performance of all 582 with following requirements: Create alerts when average processor usage is higher than 85% for 15 minutes; Automatically adjust the processo
Deploy Microsoft System Center Operations Manager (SCOM)
Congifure the new Local User and Groups by using Group Policy Preferences option and link the policy to the Branch office site.
Install the File Server Resource Manager (FSRM) role service on the sales department file server. Configure hard quotas and file screening.
Implement a Remote Desktop Connection Broker (RD Connection Broker)
6. If you need to deploy a DHCP server that supports computers that start from a PXE network adapater and support Win7
Network Policy Server (NPS) and Routing and Remote Access Service (RRAS)
Then use Windows Deployment Services (WDS)
Then use Windows BitLocker Drive Encryption
Software Restriction Polices
7. An AD LDS instance needs to be replicated from one server to another...
Reinstall AD DS on DCC.company.com as a WRITABLE DC.
Deploy the application via RemoteApp as an .MSI file and enable File Extension Take over.
Install Windows Server 2008 R2 Datacenter Edition on each server. Deploy the servers in a failover cluster. Deploy an iSCSI storage area network (SAN) - You have a main office and branch office.
Service user account for AD LDS
8. There's an AD domain named company.com. There are 3 DC's that also hold the DNS server role which host an ADI zone named company.com. This zone is configured to update settings to Secure only Dynamic Updates. The CIO has issued a new security policy
1) Remove the Auth Users account from the Secutiy tab of the company.com DNS zone properties. 2) Assign the server computer accounts to the Allow on Create All Child Objects permission on the Security tab of the company.com DNS zone properties.
Add all the sales user accounts into a new global security group. Create a new Password Policy Object (PSO) and apply it to the group.
DISABLE slow link detection in the GPO
Create a Network Load Balancing cluster.
9. What should be done to ensure changes made to AD objects can be logged?
A Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID 5 array.
Dsmgmt
Logged changes must include old and new values of any attributes. - Run auditpol and then configure Security settings of Domain Controllers OU
Implement Windows System Resource Manager (WSRM) and configure a resource-allocation policy for process-based management.
10. Tool to change Directory Services Restore Mode password on Domain Controller...
ntdsutil
Add all the particular accounts into a new global security group. - Create new (PSO) and apply to group.
Then Install IIS on perimeter network and redirect request to Online Responder on internal network.
Install the full installation of Windows Server 2008 R2 Web Edition on two servers - and configure them in a Network Load Balancing cluster
11. You have a 2008 R2 server configured as Remote Desktop Session host. You need to deploy a line-of-business app; however - the app requires desktop themes to be enabled. Your deployment strategy must meet these requirements: only authorized users must
Deploy Remote Desktop Connection 7.0 on all computers; Enabled the Desktop Experience feature on the RD Session host; and install the application on the Remote Desktop Services server.
Install Windows Server 2008 R2 Datacenter Edition on each server. Deploy the servers in a failover cluster. Deploy an iSCSI storage area network (SAN) - You have a main office and branch office.
You could restore the backup to an alternate location. Then mount the database using the AD Database Mounting Tool (Dsamain.exe)
Implement Distributed File System Replication (DFSR) on both servers
12. To allow for an application on a Remote Desktop Server to be available through document invocation - you must
Deploy the application via RemoteApp as an .MSI file and enable File Extension Take over.
Administrators is the minimum group membership required to complete this procedure.
Configure a server with the Remote Desktop Services role and install Outlook 2003 on the Remote Desktop Services server. Then publish Outlook 2003 as a Remote Desktop Services RemoteApp (RD RemoteApp).
Domain based Distributed File System (DFS) will reduce network traffic
13. 4 steps to perform offline Defragmentation of AD database...
Configure caching on the shared folder and configure offline files to use encryption
Implement a domain-based DFS namespace that uses replication
Request and obtain a server authentication certificate from a trusted certification authority (CA) in your organization or from a trusted third-party CA - Authorization Manager provides a flexible framework for integratin role-based access control in
1) Stop AD services service 2) Compact ntds.dit 3) Move to %windir% ntds 4) Start AD domain services service
14. You need to design patch management for satellite offices that meet the following requirements: WSUS updates are approved independently for each satellite office; Internet traffic is minimized. To accomplish
Add the new UPN suffix to the forest.
Administrators is the minimum group membership required to complete this procedure.
1) Add the branch office admin accounts to teh Group Policy Creator Owners Group. 2) Run the Delegation of Control Wizard and delegate the right to link GPOs for their branch OUs to the branch office admins.
In each satellite office - install a WSUS server and configure the WSUS servers to use the main office WSUS server as an upstream server.
15. You have 5 windows Server 2008 R2 servers that are configured with the File Server role. you need to monitor the file servers with the following requirements in mind: administrators must be able to create reports that display folder usage by differen
Then Install IIS on perimeter network and redirect request to Online Responder on internal network.
Deploy one new server that runs Windows Server 2008 R2 Enterprise Edition and install the Hyper-V feature on the new server. Then create three child virtual machines.
WSUS server in the branch office in replica mode.
Install File Server Resource Manager (FSRM) role service - and then configure Quota Managment and Storage Reports Management
16. To backup Virtual Machines
Use the Local Roles options with dsmgmt.
Dfsrdiag
Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.
Discover the run Microsoft Baseline Security Analyzer (MBSA)
17. What should be used to montior the replication of group policy template files when your DFL is set at Windows Server 2008 R2?
Create ADMX and ADML files. Configure the GPO and link it to the domain.
SSTP is a good solution if you have Vista SP1 or higher and your security team has already opened port 443 on the firewall and the coporate security policy states that they would prefer not to open any more ports on the firewall than necessary. SSTP
Dfsrdiag
Active Directory Domains and Trusts
18. To decrease the amount of time it takes for the certain users to generate reports. You should recommend
Deploy it by using Group Policy Software Installation method
Place the operating system files on one of the RAID 1 array - place the SQL transaction logs on the other RAID 1 array - and place the SQL database files on the RAID 5 array
Windows System Resource Manager (WSRM)
Install and share a printer on a server and then enable printer pooling.
19. In order to ensure highly available Windows Update servers you should create this.
Restore-ADObject cmdlet
Network Load Balancing (NLB) Cluser for the front end WSUS servers. This will allow users to have the continued access in the event that WSUS servers become unavailable.
Ldp
Object access auditing on the server that supports the resource. Note: Enabling audit access also helps when auditing your Cert Servers
20. Currently you already have in place AD - DNS and DHCP. You need an automated deployment solution for the new servers that will boot using native VHD's. You should recommend
Windows Deployment Services (WDS)
Install the RSAT tool on their workstation to provide for more efficient network management
Dfsrdiag
Configure RODC for Administrator Role Separation
21. You have administrative templates that another company wants to use on their domain. How would you configure the other company's domain to use these administrative templates?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. To allow all users in the forest to be able to resolve the names in the Forest Root Partition
Modify the DNS zone replication properties of the root domain - and change it to the ForestDNSZones application directory partition
Apply a WMI Filter to the policy. Note: You can use a WMI filter to filter out VM from being affected by a GPO the same way you can a physcial machine.
Data Recovery Agent
Upgrade all the client computers to Windows 7 and implement a Secure Socket Tunneling Protocol (SSTP) VPN solution.
23. To defragment and AD database...
Backup operator's domain local group
net stop ntds
Enable Credential Roaming
Configure folder redirection
24. To prevent computers that do not have the Windows Firewall enabled from connecting to the wireless access point or the physical switch - you should implement this.
Jill came down with 2.50.
dnscmd dcsrv2.company.com /zoneresettype company.com /dsprimary
802.1.x NAP
Converting physical servers to VMs - implementing SANn and SAN management components such as backup and site resiliency will create additional administrative overhead.
25. What should be done to identify which LDAP computers are using the largest amount of available CPU resources on a DC?
Implement Windows System Resource Manager (WSRM)
Microsoft System Center Data Protection Manager 2010
Improve the performance of File Servers
Execute the Active Directory Diagnostics Data Collector Set and then review the report.
26. For the users that work remotely that need access to files from the corporate office you should...
One Remote Desktop connection authorization policy (RD CAP) and two Remote Desktop resource authorization polices (RD RAPs)
Install Microsoft Secure Socket Tunneling Protocol (SSTP)
Recommend Offline Files
Implement folder redirection by using GPO. Then backup the folder redirection target.
27. You need to deploy a sales application that only the sales users must have access to
Service user account for AD LDS
Disable Site Link Bridging from IP Properties
Deploy a GPO for the Sales OU
Remote Server Administrative Tools (RSAT) on your administrative workstation or laptop
28. When backing up multiple servers it is a Microsoft best practice to add the authorized user or group to the
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. What should be done so the application does not fail after 30 days while still keeping the password policy in mind?
Then use on install image file that contains a single install image.
Execute the Set-ADServiceAccount cmdlet
Authorization Manager role assignment
Offline domain join
30. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD
Then install new Server 2008 R2 Enterprise subordinate CA.
Modify the DNS zone replication properties of the root domain - and change it to the ForestDNSZones application directory partition
Domain based Distributed File System (DFS) will reduce network traffic
Implement File Server Resource Manager (FSRM) quotas on the desired servers
31. GPO setting to prevent all users from running an application
Use Windows Server Backup to back up each domain controller to a remote network share. Use Windows Deployment Services (WDS) to deploy the Windows Recovery Environment (Windows RE)
Import-Module
Software Restriction Polices
Click Start - click Run - type cmd - and then press ENTER. - At the command prompt - type dsmgmt.exe - and then press ENTER. - For a list of valid parameters - type ? - and then press ENTER. - By default - no local administrator role is defined on th
32. You need to allow a user to add a single computer to a domain - without any additional rights...
In each satellite office - install a WSUS server and configure the WSUS servers to use the main office WSUS server as an upstream server.
Prestage the computer account in AD
Deploy one new server that runs Windows Server 2008 R2 Enterprise Edition and install the Hyper-V feature on the new server. Then create three child virtual machines.
Add the new UPN Suffix to the forest
33. If users need access to files locally and must be able to access files at another site if the local copy is not available you should implement this.
Enhanced Storage Access settings in Group Policy on the local machine to require a unique vendor ID to identify the device or even require a certificate for the device to connect to your machine. This policy can even lock the device when the computer
Windows BitLocker Drive Encryption (Bit Locker)
A Distributed File System (DFS) namespace
Disable the user half of the policy. For flow reasons we can stop policies from affecting certain computers and users by placing blocks at the OU level. This will prevent the policy from parent OUs from flowing into the child OU as long as the parent
34. Recently it was decided to increase the performance of the company's Web Servers by deploying a NLB Web server farm. You need to ensure that the content is easily replicated across all the servers in the farm. You should implement this.
Then use on install image file that contains a single install image.
Passive file screens
Upgrading DFS to Windows Server 2008 R2
Distributed File System (DFS) Replication
35. If subnets are connected by CISCO router that is RFC-1542 compliant
Use CISCO IP Helper command to configure.
Publish the application as a Remote App. Enable Remote Desktop Web Access (RD Web Access).
WDS
Deploy a GPO to the WebSrvOU
36. DCA is DC and DNS server that holds ADI zone for company.com DNSB is member server that has DNS server role installed. What should be done so DNSB can get zone updates from DCA?
Logged changes must include old and new values of any attributes. - Run auditpol and then configure Security settings of Domain Controllers OU
Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.
Modify zone transfer settings for company.com zone on DCA
Install Windows Server 2008 R2 Web Edition - it will use the least amount of disk space.
37. Srv1 is a Server 2008 R2 file server. If you want users to be able to access shared files when they are disconnected from the network -
Logged changes must include old and new values of any attributes. - Run auditpol and then configure Security settings of Domain Controllers OU
Winrm quickconfig
Basic Authentication and SSL
Configure caching on the shared folder (offline files)
38. Tool to montior replicaiton of group policy template files when DFL set at Windows SVR 2003
Ntfrsutil
Configure Firewall Group Policies and link them at the Domain level
Ldp
Enhanced Storage Access settings in Group Policy on the local machine to require a unique vendor ID to identify the device or even require a certificate for the device to connect to your machine. This policy can even lock the device when the computer
39. Your data provisioning solution must meet the following requirements: users must have access to their Documents folder regardless of the client computer that they use; user documents should not be stored on the local client computer; minimize the tim
Then install new Server 2008 R2 Enterprise subordinate CA.
Subnet object needs to be created
Configure folder redirection
Administrative Role Separation
40. If you need to allow an external partner's computer to access internal network resources by using SSTP
Deploy the Root CA certificate to the external computers.
Active Directory Right Management Services (AD RMS)
Deploy two writable domain controllers in ad.company.com and recommend to configure both domain controllers as GC's.
WSUS servers running in replica mode - and configure them to download updates from the WSUS server in the main office
41. What GPO setting should be configured to prevent all users from running an application?
IPSec based enforcement. IPSec enforcement should be used when you want a stronger solution than 802.1x - DHCP or VPN based NAP. IPSec based NAP cannot be bypassed by modifying the NAP agent/client.
Registry on users computer needs to be modified
Folder redirection. Folder redirection is also useful when using roamin profiles.
Software Restriction Polices
42. AD RMS is being used on the network. George is only a member of the AD RMS Enterprise Administrators group. Mitt needs to be able to change the service connection point (SCP) for the AD RMS installation. What should be done so George can accomplish t
Add George to the Domain Admins group.
Discover the run Microsoft Baseline Security Analyzer (MBSA)
Then Install IIS on perimeter network and redirect request to Online Responder on internal network.
A Distributed File System (DFS) namespace
43. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log
Modify the GPO to include folder redirection
Win2000
Implement the Windows Search Service.
ntdsutil
44. What should be modified so you can use the nslookup utility to list all SRV records for your domain?
Attach VHD file created by Windows server backup
Zone transfer settings
Install Windows Server 2008 R2 Datacenter Edition on each server. Deploy the servers in a failover cluster. Deploy an iSCSI storage area network (SAN) - You have a main office and branch office.
Enable Credential Roaming
45. If you need to be able to create shared folders on Server 2008 R2
One virtual network...Install two network adapaters on each node. Configure the network adapters to communicate on separate subnets.
Dfsrdiag
Create a user and designate him as a recovery agent by issuing him a data recovery certificate.
Ensure your account - or the group is a member of the local Administrators group for that specific server.
46. If you need to encrypt all data on all disks
Create a GPO and link the GPO to the domain then configure the GPO to be enforced
Then configure GlobalNames zones on each domain controller.
1) Seize operations master roles from sever1 to server2 2) Rebuild Server as a replica domain controller 3) Transfer operations master roles from Server2 to Server1
Then use Windows BitLocker Drive Encryption
47. GPO's can be difficult to manage; you need a solution that will include version tracking and offline modifications. You should recommend
Configure Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.
Group Policy Preferences
Install the RSAT tool on their workstation to provide for more efficient network management
Microsoft Desktop Optimization Pack (MDOP) to your company
48. To modify several user accounts to a new UPN suffix
Deploy it by using Group Policy Software Installation method
Active Directory Users and Computers utility
1) Run net stop ADLDS command 2) Use ntdsutil tool to move db files 3) Run net start ADLDS cmd
Windows XP Mode
49. So a user can install updates on an RODC while preventing them from logging on to any other domain controller...
Utilize IFM (Install From Media)
Configure Firewall Group Policies and link them at the Domain level
WSUS server running in replica mode that is configured to download updates from Microsoft Update (a.k.a. replica split)
Use local roles options within "dsmgmt"
50. You have a couple support technicians located in branch office on Server 2008 R2 machines with the following requirements: Install server roles; stop and start services; minimize the security privileges granted to the support technicians
An Active Directory subnet object needs to be created.
Assign the support technicans to the Administrators group on the Windows Server 2008 R2 servers.
On one server - create event subscriptions for each server...on the server - attach tasks to the application error events
Windows BitLocker Drive Encryption (Bit Locker)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests