Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. GPO setting to prevent all users from running an application






2. To allow administrators to create and store .ADMX templates in a way that allows them to have access to the template no matter what administrative computer they logon to you must






3. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






4. Engineering department has 582 Windows Server 2008 R2 servers. You need to monitor the performance of all 582 with following requirements: Create alerts when average processor usage is higher than 85% for 15 minutes; Automatically adjust the processo






5. If you need to implement Encrypting File System (EFS) and minimize amount of data transferred across and access EFS certs on any client computer






6. To identify users who bypass the new corporate security policy -






7. If users need access to files locally and must be able to access files at another site if the local copy is not available you should implement this.






8. You need to recommend a solution for users in the branch office to access files in the main office. To minimize the amount of time it takes for users in the Branch office to access files stored on servers in the main office - and minimize the number






9. To recover objects deleted from Active Directory you should recommend






10. The solution requires that teachers that have been issued district based laptops - work remotely - and teach only on-line classes - must connect to the school network using split-tunnel VPN. Need to be sure that: minimize traffic over the VPN wheneve


11. DCA is DC and DNS server that holds ADI zone for company.com DNSB is member server that has DNS server role installed. What should be done so DNSB can get zone updates from DCA?






12. You are about to deploy 1 -000 Windows 7 desktops and your company has a web based application that only runs correctly when using IE 6. You should use






13. File that contains the last logon time and custom attributes values for each user in your forest.






14. You have few Server 2003 servers that have Terminal services installed. You also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meeet the following: restricts accsss to specific Remote Desktop






15. To be able to remotely administer DNS servers that run on the Server Core installation of Server 2008 R2 - via MMC console






16. What should be modified so you can use the nslookup utility to list all SRV records for your domain?






17. Audit account management policy settings and Audit directory services access settings are enabled for the entire domain. What should be done to ensure that changes made to AD objects can be logged? The logged changes must include the old and new valu






18. Tools to view contents of an OU in an AD snapshot...






19. You need to recommend a solution to minimize the amount of time it takes for the sales department users to locate files in teh course bookings share.






20. Recently you have installed a special application on your web sites that requires using a managed service account on the Web Servers. This application runs on a web server in each of 10 separate Active Directory domains.


21. To defragment and AD database...






22. You need to create a DNS infrastructure that must allow client computers in each office to register DNA names within their respective offices and client computuers must be able to resolve names for hosts in all offices






23. To monitor replication of group policy template files when DFL set at Windows 2008 R2...






24. You need to recommend a server configuration to support a Web-based application that must meet these requirements: the app must be available to all users if a single server fails; support the installation of .NET applications; Minimize software costs






25. You are upgrading only a few computers in one department to Windows 7. These computers are running a legacy XP application you should recommend...






26. You have a couple support technicians located in branch office on Server 2008 R2 machines with the following requirements: Install server roles; stop and start services; minimize the security privileges granted to the support technicians






27. If you need to deploy a DHCP server that supports computers that start from a PXE network adapater and support Win7






28. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






29. You have three domain controllers that perform a full back up every day. You need a recovery strategy for AD objects that meets these requirements: allows objects in a backup to be compared to objects in the live AD database; minimizes admin effort.






30. If you need to ensure that data is protected by BitLocker then you will...






31. There is a file server in each office that contains a shared folder named Data. You need to plan the data availability for the Data folder according to these requirements: if WAN link fails - the files in the Data folder must be available in all of t






32. When taking files offline there is always a security risk. Corporate files now reside on a laptop that will leave the confines of the corporate office. When taking files offline it is best practice to help protect these files using






33. You need to design your WSUS infrastructure so that updates are highly available. To do so






34. Deploying a web server farm can be costly. You need to minimize the amount of disk space used.






35. All 2008 R2 servers and Windows 7 clients are connected to managed switches. The following are requirements for network access: only client computers that have up-to-date service packs installed can access the network; have up-to-date anti-malware so






36. If a file server reaches 15% free disk space - you could free up some disk space by






37. You need to devise a security solution so that after 15 days the documents distributed to the members of the School Board can only be opened by the creator owners in the high school year book department. You should recommend...






38. All servers run 2008 R2. All client computers run Windows 7 and Outlook 2010. The sales team needs to use Outlook 2003 to support a custom application. You need a deployment strategy that meets these requirements: provide access to Outlook 2003 and 2






39. Need to access some resources in another domain that is part of another forest...What trust is created?






40. To create and additional AD LDS applicaiton directory partition in existing instance...






41. Client computers run Windows 7 and all applications on the computers are configured to save documetns to the local Documents folder. You need a backup strategy that meets these: Back up the Documents folder for all users; minimize admin effort. To ac






42. Assign the application to the user if you want the icon to appear on the start menu or desktop - but to allow the user to install it. Keep in mind if you assign the application to the user ....






43. You have a 2008 R2 server configured as Remote Desktop Session host. You need to deploy a line-of-business app; however - the app requires desktop themes to be enabled. Your deployment strategy must meet these requirements: only authorized users must






44. Your file server contains 2 volumes; one that contains the operating system and the other volume contains all data files. Your recovery strategy must meet these requirements: allows the operating system to be restored; allows the data files to be res






45. When deploying group polices we want to configure them so that they are applied as quickly as possible. One way this can be done is if the policy only consists of computer settings. If this is the case we can do this.






46. 4 steps to perform authoritative restore of a deleted OU...






47. If users complain that it is hard to find the shared folders on the network implement






48. To reduce the administration involved when making configuration changes in IIS for several servers that are part of NLB Cluster you should implement this.






49. Need a solution that will ensure that the initial settings when creating new policies for both forests will become more consistent. You should...


50. to make shares at a remote location available to users you should implement this.