SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MSITP
Start Test
Study First
Subjects
:
certifications
,
msitp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You need to deploy a sales application that only the sales users must have access to
Deploy a GPO for the Sales OU
PDC emulator with w32tm.exe
Install a new server that runs a 64-bit version of Windows Server 2008 R2 Enterprise Edition. Install the Hyper-V role. Install the App1 and App2 in separate child virtual machines.
Implement Windows System Resource Manager (WSRM) and configure a resource-allocation policy for process-based management.
2. If the branch office has its own high speed WAN link and you need to minimize traffice between the corporate office and the Branch office - configure this.
Install Hyper-V role and convert physical machines into virtual machines
Loopback Processing - The purpose of the Loopback Processing policy is to prevent usesr policies that currently affect the user from following them to a publicly used or (shared remote desktop) computer. We may indeed in many cases want these policie
The WSUS client to retrieve updates from Microsoft Update (Do not Store updates locally)
WSUS server in the branch office in replica mode.
3. George's user account has been deleted in Active Directory. George's user account needs to be restored by usine minimal amount of effort. What should be done?
Configure Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.
Share and Storage Management
Perform an authoritative restore
Implement Network Access Protection (NAP)
4. Jack and Jill go up the hill - both with a buck and a quarter
Store the WSUS updates on a Distributed File System (DFS) link that uses multiple replicating targets.
Use CISCO IP Helper command to configure.
Jill came down with 2.50.
Improve the performance of File Servers
5. You have three domain controllers that perform a full back up every day. You need a recovery strategy for AD objects that meets these requirements: allows objects in a backup to be compared to objects in the live AD database; minimizes admin effort.
net stop ntds
Windows XP Mode
You could restore the backup to an alternate location. Then mount the database using the AD Database Mounting Tool (Dsamain.exe)
Publish the application as a Remote App. Enable Remote Desktop Web Access (RD Web Access).
6. In order to replicate SYSVOL shares by using DFS Replicaiton (DFS-R)
Raise the DFL to Windows Server 2008 R2.
Ntfrsutil
Install Windows Server 2008 R2 Datacenter Edition on each server. Deploy the servers in a failover cluster. Deploy an iSCSI storage area network (SAN) - You have a main office and branch office.
Install Microsoft Secure Socket Tunneling Protocol (SSTP)
7. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails
Authorization Manager role assignment
Configure Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.
Modify the DNS zone replication properties of the root domain - and change it to the ForestDNSZones application directory partition
Implement Windows System Resource Manager (WSRM)
8. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is
A Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID 5 array.
Autonomous mode...This allows the local administrator to approve their own updates.
File Server Resource Manager (FSRM) quotas and file screens
Windows Deployment Services (WDS)
9. DFL is Windows Server 2003 and client computers run Vista. DCRMS is a server that holds AD RMS. What should be done to configure AD RMS so users - including Waldo - can protect their data?
Use CISCO IP Helper command to configure.
Configure each SharePoint site to use a separate application pool - and then implement Windows System Resource Manager (WSRM)
Create an e-mail account in AD DS for your RMS users.
Use Windows Server Backup to back up each domain controller to a remote network share. Use Windows Deployment Services (WDS) to deploy the Windows Recovery Environment (Windows RE)
10. You have administrative templates that another company wants to use on their domain. How would you configure the other company's domain to use these administrative templates?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. If you need to be able to create shared folders on Server 2008 R2
Ensure your account - or the group is a member of the local Administrators group for that specific server.
Incoming external trust
Publish the application as a Remote App. Enable Remote Desktop Web Access (RD Web Access).
Jill came down with 2.50.
12. 4 steps to perform offline Defragmentation of AD database...
The Group Policy Management console
1) Stop AD services service 2) Compact ntds.dit 3) Move to %windir% ntds 4) Start AD domain services service
Group Policy Preferences
Implement Network Access Protection (NAP)
13. If you need a VPN soluction that stores VPN passwords as encrypted text and supports automatic enrollment of certificates
1) Remove the Auth Users account from the Secutiy tab of the company.com DNS zone properties. 2) Assign the server computer accounts to the Allow on Create All Child Objects permission on the Security tab of the company.com DNS zone properties.
Install File Server Resource Manager (FSRM) role service - and then configure Quota Managment and Storage Reports Management
Prestage the computer account in AD
Then Upgrade clients to Win7 - implement Enterprise CA on Win 2008 R2 and implement IPSec VPN with cert-based authentication.
14. What GPO setting should be configured to prevent all users from running an application?
Software Restriction Polices
Changed manually
Modify the schema of LDSInst1
Create a GPO and link the GPO to the domain then configure the GPO to be enforced
15. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost
A Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID 5 array.
Recommend Group Policy preferences
A relying party trust should be created.
Deploy a failover cluster that uses Node and File Share Disk Majority
16. You need to plan for the delegation of administrative authority for an OU in your AD named Staff. It should: allow help desk admins to create user accounts in the Staff OU; allow helpdesk admins to change the address attributes; prevent HelpDesk admi
Run the Delegation of Control Wizard on the Staff OU
Add the new UPN Suffix to the forest
DISABLE slow link detection in the GPO
Implement a domain-based DFS namespace and add a second namespace server; Enable the "Clients fail back to preferred targets" option. Make sure all client computers have at least XP SP2.
17. What shold be done to configure AD RMS so users can protect their data?
Create an e-mail account in AD DS for your RMS users
Configure Microsoft SQL Server 2008 failover cluster. Configure two WSUS servers in a Network Load Balancing cluster. Configure WSUS to use the remote SQL Server 2008 database instance.
Deploy Microsoft System Center Operations Manager (SCOM)
The Group Policy Management console
18. To replicate SYSVOL using Distributed File System Replication (DFSR)...
Branch Cache server that operates in Hosted Cache mode in your recommendation. This is an ideal solution if the branch office already maintains a Server 2008 R2 server solution (no additional licenses would be needed)
In each satellite office - install a WSUS server and configure the WSUS servers to use the main office WSUS server as an upstream server.
Refresh the zone on DNS2
DFL needs to be Windows Server 2008
19. DFL is...
The computer must be connected to the network when the end user clicks the icon and launches the install of the application.
Win2000 Native
Encrypting File System (EFS). This can be enabled locally or through a GPO.
Create a Central Store
20. You need a solution that allows your users to collaborate with each other and that must meet these: enables - full text indexing of all user content - remote access to files by using a Web browser - secure access to files by assigning permisions; sup
Then use on install image file that contains a single install image.
Include a server that runs Microsoft Office SharePoint Server 2010
Configure offline files and enable manual caching
The Group Policy Management Console
21. Two different solutions are available to help assign IP addresses to remote clients that need to VPN or Dial-in to the branch office.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. If you want to implement BitLocker and store recovery informaiton in a central location
Then make sure all DCs are runing Windows Server 2008 R2 - and then use a GPO to enable Trusted Platform Module backups to AD.
DSMOD
newly implemented technologies must have a minimal effect on LAN traffic - is met by using express installation files
Include an iSCSI disk storage subsystem that supports Virtual Disk Service (VDS). Configure the storage subsystem as a RAID 5 array.
23. You are about to deploy 1 -000 Windows 7 desktops and your company has a web based application that only runs correctly when using IE 6. You should use
MEDV to deploy virtual desktops
1) Add the branch office admin accounts to teh Group Policy Creator Owners Group. 2) Run the Delegation of Control Wizard and delegate the right to link GPOs for their branch OUs to the branch office admins.
Network Load Balancing (NLB)
Deploy a failover cluster that uses Node and File Share Disk Majority
24. You have few Server 2003 servers that have Terminal services installed. You also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meeet the following: restricts accsss to specific Remote Desktop
Use Netsh tool from administrator's computer.
Run auditpol and then configure the Security settings of the Domain Controllers OU.
FFL Windows Server 2008 R2
Upgrade one of the Server 2003 servers to Server 2008 R2. On this server - implement the Remote Desktop Services Gateway (RD Gateway) role and configure a Remote Desktop Services Resource authorization policy (RD RAP).
25. To backup Virtual Machines
Your machine and remote desktops
Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.
Add the new UPN Suffix to the forest
Create a Network Load Balancing cluster.
26. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions
Congifure the new Local User and Groups by using Group Policy Preferences option and link the policy to the Branch office site.
Migrate the namespace to Windows SErver 2008 mode and enable access based enumeration (ABE). NOTE: ABE is a new feature in SERVER 2008; this requires that all DFS Server be 2008 or later.
Dynamically expanding VHD's
Windows System Resource Manager (WSRM)
27. When using Remote Desktop and Remote Desktop Session hosts - to be able to control both who can gain access - and to what - on the network configure;
Use CISCO IP Helper command to configure.
Deploy a failover cluster that contains one node in each office.
Data Recovery Agent
One Remote Desktop connection authorization policy (RD CAP) and two Remote Desktop resource authorization polices (RD RAPs)
28. You need to deploy 15 Server Core installations that are only accessible by HTTP and HTTPS. Administration of these must be able to enable administrators to install and administer server roles remotely and fully manage servers remotely
Enable Windows Remote Management (WinRM) on each server.
Use local roles options within "dsmgmt"
Microsoft System Center Data Protection Manager
Windows Deployment Services (WDS)
29. 4 steps to perform authoritative restore of a deleted OU...
Event Viewer
1) Restart dc in DirectoryServiceRestoreMode - 2) Restory system state data to date before organizational unit was deleted - 3) Use ntdsutil utility to mark organizational unit as authoritative 4) Restart Domain Controller
Configure authorization rules for Web developers on each web server
Administrators is the minimum group membership required to complete this procedure.
30. You have a failover cluster that has an application installed. Service level agreement requires 55 percent of processor and memory utilization to be reserved for the app. A solution to guarantee service level agreement would be
Use Windows Server Backup to perform a daily backup to an external disk. Enable shadow copies for the volumes that contain shared user data. Store the shadow copies on a separate physical disk.
One virtual network...Install two network adapaters on each node. Configure the network adapters to communicate on separate subnets.
Improve the performance of File Servers
Implement Windows System Resource Manager (WSRM) and configure a resource-allocation policy for process-based management.
31. Tool to montior replicaiton of group policy template files when DFL set at Windows SVR 2003
1) Seize operations master roles from sever1 to server2 2) Rebuild Server as a replica domain controller 3) Transfer operations master roles from Server2 to Server1
Implement Windows System Resource Manager (WSRM) and configure a resource-allocation policy for process-based management.
Loopback Processing - The purpose of the Loopback Processing policy is to prevent usesr policies that currently affect the user from following them to a publicly used or (shared remote desktop) computer. We may indeed in many cases want these policie
Ntfrsutil
32. RDSrv1 is a Server 2008 R2 server with Remote Desktop Services installed. You are planning to establish a Terminal Server Farm that must meet these requirements: New users automatically connect to the terminal server that has the fewest active sessio
Install the full installation of Windows Server 2008 R2 Web Edition on two servers - and configure them in a Network Load Balancing cluster
Then use Windows BitLocker Drive Encryption
Implement a Remote Desktop Connection Broker (RD Connection Broker)
IIS Manager user account
33. To improve performance and provide redundancy if a single server fails - the intranet web site should be in this.
Upgrade one of the Server 2003 servers to Server 2008 R2. On this server - implement the Remote Desktop Services Gateway (RD Gateway) role and configure a Remote Desktop Services Resource authorization policy (RD RAP).
You can apply IE Group Policies only to the OU's that contain clients that must be restricted based on your corporate policies.
Share and Storage Management
Network Load Balancing (NLB) cluster
34. To restore previous version of script without taking up too much of time...
Attach VHD file created by Windows server backup
Run the Delegation of Control Wizard on the Staff OU
Event Log Subscriptions
Install the Remote Server Administration Tools (RSAT) on the Windows 7 computers.
35. Policy states that users are to log into AD by usine a new User Principal Name (UPN). What tool should be used to modify the UPN suffix for all user accounts?
Subnet object needs to be created
Assign the support technicans to the Administrators group on the Windows Server 2008 R2 servers.
DSMOD
Group Policy Preferences
36. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD
Recommend one AD based service account for each web site in each domain - that would mean 10 total. NOTE: Because you're using AD accounts that there is one web site in each domain the number of service accounts will match the number of domains.
Implement folder redirection by using GPO. Then backup the folder redirection target.
Install Windows Server 2008 R2 Web Edition - it will use the least amount of disk space.
Then install new Server 2008 R2 Enterprise subordinate CA.
37. Client computers run Windows 7 and all applications on the computers are configured to save documetns to the local Documents folder. You need a backup strategy that meets these: Back up the Documents folder for all users; minimize admin effort. To ac
Domain based Distributed File System (DFS) namespace and DFS Replication.
Raise the DFL to Windows Server 2008 R2.
Include an iSCSI disk storage subsystem that supports Virtual Disk Service (VDS). Configure the storage subsystem as a RAID 5 array.
Implement folder redirection by using GPO. Then backup the folder redirection target.
38. You need to allow a user to add a single computer to a domain - without any additional rights...
Store all sensitive files in EFS encrypted folders and require home users to access the files by using SSTP
Upgrading DFS to Windows Server 2008 R2
Prestage the computer account in AD
Implement Shadow Copies
39. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users
WSUS server in the branch office in replica mode.
Upgrade all the client computers to Windows 7 and implement a Secure Socket Tunneling Protocol (SSTP) VPN solution.
Modify Object Access Settings AND Global Object Access Auditing settings FROM Advanced Audit Policy configurations
Run the Delegation of Control Wizard on Sales OU. In Group Policy Management Console - modify the permissions of the Group Policy Objects container in the hr.domain.com domain.
40. Help desk staff must be able to update drivers on the domain controllers at the branch office and assign them the proper
Network Load Balancing (NLB) Cluser for the front end WSUS servers. This will allow users to have the continued access in the event that WSUS servers become unavailable.
Then Upgrade clients to Win7 - implement Enterprise CA on Win 2008 R2 and implement IPSec VPN with cert-based authentication.
Deploy it by using Group Policy Software Installation method
Administrative Role Separation
41. Domain.com's network has a single forest and single domain. Users currently share files using the corporate FTP server and DropBox. You need a better solution for managing document and allowing access. The solution must meet the following: allow for
Upgrade all the client computers to Windows 7 and implement a Secure Socket Tunneling Protocol (SSTP) VPN solution.
Microsoft SharePoint Foundation 2010
Test-AppLockerPolicy
Configure caching on the shared folder and configure offline files to use encryption
42. In order for admins at a branch office to be able to change their passwords and logon if a single DC fails even if the WAN Link to the corporate office fails you shoud
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. To be able to user an application from one AD FS with authentication server to another...
Raise the DFL to Windows Server 2008 R2.
Authorization Manager role assignment
A relying party trust should be created.
Implement Shadow Copies
44. In Active Directory Sites and Services - what should be configured to ensure domain controllers only replicate between domain controllers in adjacent sites?
A Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID 5 array.
Distributed File System (DFS) Replication
Deploy one new server that runs Windows Server 2008 R2 Enterprise Edition and install the Hyper-V feature on the new server. Then create three child virtual machines.
Disable Site Link Bridging from the IP properties
45. What should be done so the application does not fail after 30 days while still keeping the password policy in mind?
Establish a Federated Trust between your company and the external partner. Deploy a 2008 R2 server that runs MIcrosoft SharePoint 2010 and that has the Active Directory Rights Management Services (AD MS) role installed.
Execute the Set-ADServiceAccount cmdlet
Enable - ADoptionalFeature cmdlet
Deploy WSUS server on secure network. From an online WSUS server - copy the update metadata and the WSUS content to the WSUS server on the secure network.
46. New Password Policy needs to be created for OU different from domain password policy
1) Seize operations master roles from sever1 to server2 2) Rebuild Server as a replica domain controller 3) Transfer operations master roles from Server2 to Server1
Add the IT Help Desk Users to the Group Policy Creator Owners group and then create a new Starter GPO.
Add all the particular accounts into a new global security group. - Create new (PSO) and apply to group.
Create an Active Directory-Integrated zone.
47. If a file server reaches 15% free disk space - you could free up some disk space by
Run the Delegation of Control Wizard on the Staff OU
Creating a data collector set that kick off a scritp that either move or delete files.
Microsoft Desktop Optimization Pack (MDOP) to your company
WSUS server in the branch office in replica mode.
48. To defragment and AD database...
net stop ntds
Domain based Distributed File System (DFS) namespace and DFS Replication.
Share and Storage Management
Run adprep /forestprep and adprep /domainprep
49. To recover objects deleted from Active Directory you should recommend
Active Directory snapshots and Tombstone reanimation
Recommend Active Directory delegation
Then use on install image file that contains a single install image.
The applications within the VM by using RemoteApp. Create a RemoteApp and Desktop Connection for each VM.
50. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -
Group Policy Preferences
Deploy an additional WSUS server for the remote teachers. Configure the remote teacher's laptops to use the additional WSUS server. Configure the addtional WSUS server to leave the updates on the Microsoft Update Web Site.
Install Hyper-V role and convert physical machines into virtual machines
Attach VHD file created by Windows server backup