Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AD RMS is being used on the network. George is only a member of the AD RMS Enterprise Administrators group. Mitt needs to be able to change the service connection point (SCP) for the AD RMS installation. What should be done so George can accomplish t






2. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






3. To configure Administrator Role Separation for an RODC






4. In Active Directory Sites and Services - what should be configured to ensure domain controllers only replicate between domain controllers in adjacent sites?






5. If you need to encrypt all data on all disks






6. Jack and Jill go up the hill - both with a buck and a quarter






7. hr.domain.com domain has an OU named Sales...You need to give UserA administrative rights so that he can manage Group Policies for the Sales OU while meeting the following requirments: UserA must be able to create and configure Group Polices in hr.do






8. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD






9. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






10. You have a couple support technicians located in branch office on Server 2008 R2 machines with the following requirements: Install server roles; stop and start services; minimize the security privileges granted to the support technicians






11. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails






12. In order to manage websites without having to logon you can use






13. All servers run 2008 R2. All client computers run Windows 7 and Outlook 2010. The sales team needs to use Outlook 2003 to support a custom application. You need a deployment strategy that meets these requirements: provide access to Outlook 2003 and 2






14. To determine size of AD database file...






15. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






16. In order to replicate SYSVOL shares by using DFS Replicaiton (DFS-R)






17. If users complain that it is hard to find the shared folders on the network implement






18. All servers run 2008 R2 and all client computers run Windows 7. Server users have laptops and work from home. You need to plan an infrastructure to secure sensitive files according to these requirements: files must be - stored in an encrypted format;






19. In order for admins at a branch office to be able to change their passwords and logon if a single DC fails even if the WAN Link to the corporate office fails you shoud


20. When deploying an application using the Group Policy distribution method assign the...






21. To ensure that administrators are allowed to install USB drives on their Windows 7 computers - but NOT allow non-administrators






22. Requirements are: support the installation of SQL Server 2008; Provide redundancy for SQL services if a single server fails. To accomplish this






23. You need to recommend the minimum number of logical unit numbers (LUNs) that must be provisioned for Cluster. If the cluster has an even number of nodes ...






24. To backup Virtual Machines






25. An external partner plan requires the following: prevent sensitive documents from being forwarded to untrusted recipients or from being printed; allow users in the external partner organization to access the protected content to which they have been






26. You are upgrading only a few computers in one department to Windows 7. These computers are running a legacy XP application you should recommend...






27. Company.com is working on a set of corporate documents. These documents are stored in a shared folder on your corporate file server. You need to protect documents as they get created.






28. From Win7 PC - to view all account logon successes that occur on domain and consolidate to one list...






29. DCA is DC and DNS server that holds ADI zone for company.com DNSB is member server that has DNS server role installed. What should be done so DNSB can get zone updates from DCA?






30. When deploying servers one would have to include some kind of process that would ultimately join the servers to the domain - this typically would require a script and a reboot. to help eliminate some of the steps involved and automate the deployment






31. If you need a VPN soluction that stores VPN passwords as encrypted text and supports automatic enrollment of certificates






32. There are now 4 primary types of VPN solutions - PPTP - L2TP - SSTP and Direct Access. If you need to implement a VPN on Vista SP1 or higher machines you can implement SSTP.






33. If subnets are connected by CISCO router that is RFC-1542 compliant






34. When recommending the server configurations for the new failover cluster that will live in a virtual environment from Hyper-V Manager on each node - configure ...






35. to prevent VMs from receiving updats from a group policy






36. You have a main office and a branch office. Your Active Director domain runs at functional level Windows Server 2008. You are planning to implement file servers in each office. Your file sharing implementation must meet the following requirements: us






37. RDSRv1 is a Server 2008 R2 Remote Desktop Session Host. RDSrv1 has 8 custome apps installed. Each is configured as a RDP RemoteApp. You notice that when a user runs one of the apps - other users report that the server seems slow and that some apps be






38. To allow all users in the forest to be able to resolve the names in the Forest Root Partition






39. What should be used to montior the replication of group policy template files when your DFL is set at Windows Server 2008 R2?






40. To make a 64-bit application available to several 32-bit XP SP3 computers in the branch office you could use either a remote desktop session host or a remote desktop virtualization host. However - if the application requires you to be a local adminis


41. What should be done to resolve names by using GlobalNames zone?






42. To ensure IT Help Desk Users can create GPOs in the domain and give them a GPO that contains preconfigured settings that will be used to create new GPOs -






43. A script fails to create user accounts. Which cmdlet should be added to the script to create user accounts?






44. An AD LDS instance needs to be replicated from one server to another...






45. To allow administrators tha trun Windows 7 ability to manage the DNS server that runs on the Server Core installation of Server 2008 R2






46. What utility is used to see what accounts cached on RODC?






47. To replicate SYSVOL using Distributed File System Replication (DFSR)...






48. PowerShell script to create user accounts with passwords from a file called password.csv






49. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






50. You need to devise a security solution so that after 15 days the documents distributed to the members of the School Board can only be opened by the creator owners in the high school year book department. You should recommend...