Test your basic knowledge |

Microsoft Sharepoint

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 4 processor cores are required by a ______________






2. ____________ allowed by Classic Mode Authentication (CMA): Anonymous - Basic - Digest - Certificate - NTLM - Kerberos






3. ____________ fully supported in SP2010: IE9 - IE8 & IE 7 32-bit. Google Chrome - Mozilla Firefox -64-bit versions of IE are supported with limitations as is Safari






4. Which service applications have a medium CPU load?






5. What services can be deployed as cross-farm services?






6. A list with only the Title metadata column. Typically used when you want to add all metadata from scratch.






7. ______________ of the OSI model - Provides transparent transfer of data between session entities. Examples include TCP and UDP (Layer 4)






8. Planning - Development - Proof of Concept - Pilot - UAT






9. Resolves IP addresses to MAC accresses






10. Two phases the _______________ process uses - The patching phase (also known as updating) and the upgrading phase.






11. Components needed to use SSL - A certificate must be installed on _____________ - SSL must be enabled for the website in IIS - the AAM should be changed to https://






12. When Tracing is enabled - you can specify the location of the trace logs. You can also specify the number of days to store the log and the maximum storage space to use.






13. What SharePoint service application allows for access to the Line of Business data and other external data sources?






14. IIS - File you edit to receive more detailed information from a _____________ - IISSchema.xml (change the systm.webServer/httpErrors/errorMode value to Detailed vs DetailedLocalOnly) - restart IIS






15. Reduces license costs if you run a Windows Server 2008 R2 Enterprise Edition server - you are granted 4 virtual machine licenses.






16. Default setting for Kerberos - Maximum Lifetime for User Ticket Renewal






17. To allow incoming __________ to lists - in Central Admin - Enable incoming email - choose Automatic settings mode.






18. The steps to enable ___________: Site Actions - Site Settings - Site Collection Features - Activate Feature Document Sets






19. Shows recent search activity and the latency from the different segments in the query pipeline.






20. A web - based application that helps users share and collaborate on any type of data and information. Allows the ordinary user to create sites and document libraries in a secure and controlled manner.






21. Seeks within the indexes for content and then provides link to the pages containing the desired content.






22. To ______ the DNS cache - Start Menu - cmd - ipconfig /flushdns






23. Three types of Claims Based Authentication: _________________ - Forms-based authentication - SAML (Security Assertion Markup Language) token based authentication






24. One database server - at least one WFE and Application combination server (may include one or two additional WFEs)






25. Started manually - all SP Server processes are upgraded - databases are crawled and upgraded - services are restarted (a reboot may be required)






26. What security solution is supported that allows encryption of communications between WFE service application servers?






27. Minimum OS for the servers in a SP2010 farm






28. Used by the Application Registry service application for backward compatibility with the Business Data Connectivity API. Only used during an upgrade - once the upgrade is complete - it may be deleted.






29. A set of claims in a digitally signed package created by the issuing authority






30. What command queries a DNS server?






31. Change the way a table is stored - but is not a separate object from the table.






32. The authentication process that must be performed - where the use of Kerberos authentication is placed






33. Sharepoint is also an intranet portal for the organization as well as _________ portal for your customers and partners






34. New binaries are copied to CA - Services requiring updates are stopped - support files are copied to the server






35. Same as a medium farm - but includes an additional database server






36. A list that is connected to an external content type. This list supports two - way communication with the external data source. No metadata or version history is available.






37. Like Custom List but displayed as a spreadsheet - to make entering values easy. Note that this type of list requires a local ActiveX component that comes with Microsoft Office 2007 and later.






38. A point of entry to a SharePoint site






39. Shows recent crawl activity by content source






40. The steps to extend a web application: Central Admin - Application Management - Manage Web Applications - ____________ - Extend - Configure IIS - Security - and URL information - OK






41. Switch traffic that moves from one point to all other points in a broadcast domain.






42. Stores team and personal tasks that typically relate to each other. Supports version history and metadata - plus a Gantt Chart that can also be opened by Microsoft Project.






43. To install the _____________- Start-Run-Server Manager - Roles - DNS Server Role - Install - Finish






44. 2 examples of the Application layer of the OSI model: HTTP; _______






45. To ___________ unused sites are and unused sites are automatically deleted - Central Admin - Application Management - Confirm Site use and deletion - Confirmation and Automatic deletion






46. The new authentication model in SharePoint Server 2010 that allows non-Windows authentication systems to be utilized.






47. To _______ an index - Drop and re-create - rebuild the index - reorganize the index






48. Allows workloads to be distributed among multiple Windows servers.






49. Stores links to any destination. Supports HTTP - HTTPS - FTP - FILE - and MAILTO types of URL.






50. Used to provide high availability - allows services normally running on on server to failover to another server so that they continue to operate on the network.