Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DCA is DC and DNS server that holds ADI zone for company.com DNSB is member server that has DNS server role installed. What should be done so DNSB can get zone updates from DCA?






2. GPO's can be difficult to manage; you need a solution that will include version tracking and offline modifications. You should recommend






3. To create and additional AD LDS applicaiton directory partition in existing instance...






4. To make sure that all current certificate holders automatically enroll for the new template - use what utility?






5. Srv1 is a Server 2008 R2 file server. If you want users to be able to access shared files when they are disconnected from the network -






6. To replicate SYSVOL using Distributed File System Replication (DFSR)...






7. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






8. IE can be a security concern - however you can take advantage of Group policies to lock down IE as much as possible


9. To monitor replication of group policy template files when DFL set at Windows 2008 R2...






10. If the companies support staff is currently using Remote Desktop to connect to the servers in the data center to perform all management tasks - it would be wise to have them instead






11. What role to keep same time as an external server?






12. You need to design your WSUS infrastructure so that updates are highly available. To do so






13. Certain groups of users must be able to approve certificate requrests and revoke certificates but not be able to modify the properties of the CA. You should recommend






14. You need to design patch management for satellite offices that meet the following requirements: WSUS updates are approved independently for each satellite office; Internet traffic is minimized. To accomplish






15. You have 9 2008 R2 servers that host Web apps. You need a remote mgmt strategy to manage the Web servers according to these requirements: Web developers need to be able to configure features on the Web sites; Web developers should not have full admin






16. To reduce the administration involved when making configuration changes in IIS for several servers that are part of NLB Cluster you should implement this.






17. Your DFS deployment needs to meet these requirements: minimize the bandwidth required to replicate data; ensure users see only folders to which they have access; ensure users can access the data locally.






18. An AD LDS instance needs to be replicated from one server to another...






19. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






20. To backup to tape/robotic tape and to backup VMs you must use...






21. If you want to implement BitLocker and store recovery informaiton in a central location






22. To create AD Domain Services snapshot






23. If you want to allow the administrator in each office to manage DHCP scope for their own office - and prevent the administror of one office from managing DHCP scopes on the DHCP server in another office with mimimal admin effort






24. To help restrict access to Windows 7 computer in the event that it gets stolen implement






25. To delegate authority to users to manage only certain areas in Hyper-V use the






26. You need to recommend the minimum number of logical unit numbers (LUNs) that must be provisioned for Cluster. If the cluster has an even number of nodes ...






27. when deploying Virtual Machines in a Remote Desktop pool you can minimize the amount of disk space used by the VM and reduced the admin effort by deploying this.






28. You have a failover cluster that has an application installed. Service level agreement requires 55 percent of processor and memory utilization to be reserved for the app. A solution to guarantee service level agreement would be






29. You need to devise a security solution so that after 15 days the documents distributed to the members of the School Board can only be opened by the creator owners in the high school year book department. You should recommend...






30. To update ADRMS password...






31. Assign the application to the user if you want the icon to appear on the start menu or desktop - but to allow the user to install it. Keep in mind if you assign the application to the user ....






32. Your file server contains 2 volumes; one that contains the operating system and the other volume contains all data files. Your recovery strategy must meet these requirements: allows the operating system to be restored; allows the data files to be res






33. Server1 collects all events that occur on your domain controllers. Using the minimal effort - from Event Viewer - what should be done to ensure you are notified when a specific event has occurred on any of your domain controllers?






34. Requirements are: support the installation of SQL Server 2008; Provide redundancy for SQL services if a single server fails. To accomplish this






35. You have two offices that are connected via a WAN link. Each office has a 2008 R2 file server. Users store their data on their local file server - but they can also acces data from the other office. You must implement a data solution according to the






36. A script fails to create user accounts. Which cmdlet should be added to the script to create user accounts?






37. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us






38. If you need to implement Encrypting File System (EFS) and minimize amount of data transferred across and access EFS certs on any client computer






39. You have 5 windows Server 2008 R2 servers that are configured with the File Server role. you need to monitor the file servers with the following requirements in mind: administrators must be able to create reports that display folder usage by differen






40. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






41. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






42. All servers run 2008 R2 and all client computers run Windows 7. Server users have laptops and work from home. You need to plan an infrastructure to secure sensitive files according to these requirements: files must be - stored in an encrypted format;






43. In order to ensure highly available Windows Update servers you should create this.






44. Domain.com's network has a single forest and single domain. Users currently share files using the corporate FTP server and DropBox. You need a better solution for managing document and allowing access. The solution must meet the following: allow for






45. What GPO setting should be configured to prevent all users from running an application?






46. Deploying a web server farm can be costly. You need to minimize the amount of disk space used.






47. If you need a VPN soluction that stores VPN passwords as encrypted text and supports automatic enrollment of certificates






48. The Authorization Manager console is a Microsoft Management Console (MMC) snap-in. You can run the Authorization Manager console as a stand-alone console - or add it to any MMC console.






49. To identify users who bypass the new corporate security policy -






50. What utility is used to see what accounts cached on RODC?