Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With Group Polices having over 8 -000 different settings - the possibility of conflicting policies - and security filters you should track multiple versions and offline modifications to GPOs. You should recommend






2. You need a solution that allows your users to collaborate with each other and that must meet these: enables - full text indexing of all user content - remote access to files by using a Web browser - secure access to files by assigning permisions; sup






3. You need to access some resources in another domain that is part of another forest. What type of trust should you create?






4. If you need to deploy multiple servers through automation of installation and activation and minimize network traffic






5. What utility is used to see what accounts cached on RODC?






6. You need to recommend a server configuration to support a Web-based application that must meet these requirements: the app must be available to all users if a single server fails; support the installation of .NET applications; Minimize software costs






7. Need to ensure users receive updated template within five days...






8. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






9. You need a solution that replaces servers that host 2 applications. This solution must use Windows Server 2008 R2 and minimize cost.






10. UPN Suffix xxxx.com needs to be available for user accounts...






11. Srv1 - Srv2 - Srv 3 are Network Policy Servers (NPS) that function as RADIUS Servers. Srv1 is also Microsoft SQL Server 2008 server. The network has 20 wireless access points that are configured as RADIUS clients. You need an audit strategy with the






12. What should be used to montior the replication of group policy template files when your DFL is set at Windows Server 2008 R2?






13. Srv1 is a Server 2008 R2 file server. If you want users to be able to access shared files when they are disconnected from the network -






14. Backup solutions for the files servers that support a robotic-based tape library must support the enterprise; you should recommend






15. To help restrict access to Windows 7 computer in the event that it gets stolen implement






16. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






17. You need to allow remote access to the servers on your network while meeting the following requirements: all remote connections to the servers must be encrypted; all remote authentication attempts to the servers must be encrypted; only inbound connec






18. Your AD domain has an OU named Sales OU that contains the user accounts of the Sales department. A new password polity needs to be created for the Sales department that is different from the domain password policy. How is this accomplished?






19. You need a solution that allows a global group to perform the following: stop and start services; change registry settings; change network settings






20. to ensure that server backups can be performed remotely from your backup server on your company file server you should perform these two actions






21. You need to create a DNS infrastructure that must allow client computers in each office to register DNA names within their respective offices and client computuers must be able to resolve names for hosts in all offices






22. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD






23. To make a 64-bit application available to several 32-bit XP SP3 computers in the branch office you could use either a remote desktop session host or a remote desktop virtualization host. However - if the application requires you to be a local adminis

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


24. If you need to minimize the number of install images and support Win Server 2008 R2 deployment






25. You need to deploy a new application according to the following requirements: must be available to remote users when they are offline; must access the application from an icon on the Start menu






26. When recommending the server configurations for the new failover cluster that will live in a virtual environment from Hyper-V Manager on each node - configure ...






27. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






28. The strongest form of NAP is






29. GPO's can be difficult to manage; you need a solution that will include version tracking and offline modifications. You should recommend






30. If a file server reaches 15% free disk space - you could free up some disk space by






31. All computers are running either Windows SP2 or Windows 7. You want to audit users that are accessing the administrative shares on all the computers...






32. Server1 collects all events that occur on your domain controllers. Using the minimal effort - from Event Viewer - what should be done to ensure you are notified when a specific event has occurred on any of your domain controllers?






33. SiteA is an existing AD site. You just created a new site in AD named SiteB. AD replication needs to be configured betwen the two sites so you install a new DC and you careatd a site link between the two sites. What should be done next?






34. You need to modify DNS infrastructure to support dynamic updates to ALL DNS servers; ensure DNS service available even if single server fails; encrypt the synchronization data sent between DNS servers.






35. If the companies support staff is currently using Remote Desktop to connect to the servers in the data center to perform all management tasks - it would be wise to have them instead






36. To configure AD FS so tokens contain information from Active Directory domain...






37. You have 9 2008 R2 servers that host Web apps. You need a remote mgmt strategy to manage the Web servers according to these requirements: Web developers need to be able to configure features on the Web sites; Web developers should not have full admin






38. You have two identical print devices. You must plan a print services infrastructure where: the print services must be available - even if one print device fails and have the ability to manage the print queue from a central location






39. To allow administrators to create and store .ADMX templates in a way that allows them to have access to the template no matter what administrative computer they logon to you must






40. Company users IPV4 and IPV6. A PC uses IPV6 and can no longer authenticate off the DC. What can be done to ensure IPV6 computers authenticate to DCs in same site...






41. When taking files offline there is always a security risk. Corporate files now reside on a laptop that will leave the confines of the corporate office. When taking files offline it is best practice to help protect these files using






42. PowerShell script to create user accounts with passwords from a file called password.csv






43. An AD LDS instance needs to be replicated from one server to another...






44. The servers in each office run Server 2008 R2 Enterprise Edition. You need to plan a failover cluster solution to service users in both offices that meet these: maintain the availability of services if a single server fails; minimize the number of se






45. If you need to implement a Cert Services solution that automates distribution of certificates - ensures security and gives external users acess to resources that use cert-based authentication






46. To determine size of AD database file...






47. Tools to view contents of an OU in an AD snapshot...






48. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -






49. When deploying an application using the Group Policy distribution method assign the...






50. you have fewer Server 2003 servers that have Terminal Services installed. you also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meet the following: encrypts all remote connections to the ter