Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Need to access some resources in another domain that is part of another forest...What trust is created?






2. There's an AD domain named company.com. There are 3 DC's that also hold the DNS server role which host an ADI zone named company.com. This zone is configured to update settings to Secure only Dynamic Updates. The CIO has issued a new security policy






3. You need to consolidate 120 physical servers into 35 physical servers that run Windows Server 2008 R2 while meeting the following: maximize resource utilization; use existing hardware and software; support 64-bit child virtual machines; maintain sepa






4. You don't want users to be able to install removable devices on client computers. However - domain admins and desktop support technicians must be allowed to install removable devices on client computers






5. You have 2 Server Core servers that are part of a Network Load Balance that host a web site. To be able to allow administrators - on their Windows 7 computers - remotely manage the NLB with automation






6. You are upgrading only a few computers in one department to Windows 7. These computers are running a legacy XP application you should recommend...






7. 4 steps to perform offline Defragmentation of AD database...






8. File that contains the last logon time and custom attributes values for each user in your forest.






9. Currently you already have in place AD - DNS and DHCP. You need an automated deployment solution for the new servers that will boot using native VHD's. You should recommend






10. Deploying a web server farm can be costly. You need to minimize the amount of disk space used.






11. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






12. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






13. Help desk staff must be able to update drivers on the domain controllers at the branch office and assign them the proper






14. Deployment solutions that will allow both the 64 bit version of Office 2010 and the 32 bit version Office 2003 to run at a same time on a Windows 7 computer - and to do that when the computer is offline - are very limited. You should recommend






15. AD CS is configured on Server1 as a standalone CA. What two actions should you do to audit changes to the CA configuration settings and the CA security settings?






16. To build a highly secure server cluster with a reduced attack surface area






17. You need to rebuild a server and reinstall the operating system - and rollback all operations master roles to original state...






18. You need to implement read only copies of files at several locations. You currently have DFS for 2008 deployed. You should recommend this.






19. With Group Polices having over 8 -000 different settings - the possibility of conflicting policies - and security filters you should track multiple versions and offline modifications to GPOs. You should recommend






20. What should be done to ensure changes made to AD objects can be logged?






21. You have 159 server 2008 R2 servers that must meet the following: notification by e-mail to the administrator if error occurs on any server with minimum effort...






22. to prevent VMs from receiving updats from a group policy






23. Several employees say they can't get on domain with "password incorrect" message. What utility tool can be used to identify issue and also ensure users can log into domain?






24. to make shares at a remote location available to users you should implement this.






25. Your DFS deployment needs to meet these requirements: minimize the bandwidth required to replicate data; ensure users see only folders to which they have access; ensure users can access the data locally.






26. Your file server contains 2 volumes; one that contains the operating system and the other volume contains all data files. Your recovery strategy must meet these requirements: allows the operating system to be restored; allows the data files to be res






27. IE can be a security concern - however you can take advantage of Group policies to lock down IE as much as possible

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


28. Need a solution that will ensure that the initial settings when creating new policies for both forests will become more consistent. You should...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us






30. To speed up the deployment of the RODC in the new branch offices you should take advantage of this.






31. You plan to deploy 12 file servers. All computers and servers connect to Ethernet switches. Your data storage solution must meet these: maximizes performance and fault tolerance; allocates storage to the servers as needed; utilizes the existing netwo






32. To add a server with AD FS 2.0 role to an existing AD FS farm...






33. You have a single AD domain named ad.company.com. The FFL is windows 2000 and the DFL is Windows 2000 Native. The UPN suffix company.com needs to be available for user accounts. What should be done first?






34. Your AD environment has an Enterprise Root CA. What 2 actions should you take to ensure that only administrators can sign code?






35. To back up your Hyper-VMs and the Hyper-V host; for each VM -






36. WSUS infrastructure must meet the following: distributed from a central location - all computers must continue to receive updates in the event that a server fails






37. To be able to manage all the corporate servers from a workstation - you must install the






38. What document management solution allows you to keep multiple versions of documents and automatically apply access policies to these documents? You should recommend






39. You need to create a DNS infrastructure that must allow client computers in each office to register DNA names within their respective offices and client computuers must be able to resolve names for hosts in all offices






40. RDSrv1 is a Server 2008 R2 server with Remote Desktop Services installed. You are planning to establish a Terminal Server Farm that must meet these requirements: New users automatically connect to the terminal server that has the fewest active sessio






41. Ensure password length for a group set to 12 characters long while others keep password policy






42. Tools to view contents of an OU in an AD snapshot...






43. From Win7 PC - to view all account logon successes that occur on domain and consolidate to one list...






44. You need to ensure that the guest account on all servers is disabled to






45. GPO setting to prevent all users from running an application






46. SrvA has Remote Desktop Services role installed. You notice that users are consuming more than 40% of CPU resources. You want to prevent them from consuming more than 10% - however - administrators should not be limited.






47. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -






48. To identify users who bypass the new corporate security policy -






49. Your office has no Internet connection. Your data provisioning solution must meet these requirements: users that are not connected to the network must be able to access files and folders on the network; unauthorized users must not have access to the






50. To minimize the amount of storage required you should recommend