Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To ensure that the branch office with its own high speed internet connection receives the exact same updates as the corporate office you should recommend this.






2. To allow a user to administer Active Directory






3. To compact AD database...






4. You have two offices that are connected via a WAN link. Each office has a 2008 R2 file server. Users store their data on their local file server - but they can also acces data from the other office. You must implement a data solution according to the






5. Your DFS deployment needs to meet these requirements: minimize the bandwidth required to replicate data; ensure users see only folders to which they have access; ensure users can access the data locally.






6. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






7. 4 steps to perform authoritative restore of a deleted OU...






8. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






9. What should be done to identify which LDAP computers are using the largest amount of available CPU resources on a DC?






10. You need to design a data storage solution that meets the following: users must be able to choose the documents that will be available when they are away from the network; minimize the number of documents that are stored on users' portable computers;






11. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






12. To ensure IT Help Desk Users can create GPOs in the domain and give them a GPO that contains preconfigured settings that will be used to create new GPOs -






13. If CA PKI needs to support Suite B hashing and encryption algorithms and store keys in AD






14. You have a main office that contains two domain controllers and a branch office that has an RODC. What should be done so that a user named George can install updates on the RODC while preventing George from logging on to any other domain controller?






15. A specific application requires registry modifications to be in place before installing; you should use






16. All 2008 R2 servers and Windows 7 clients are connected to managed switches. The following are requirements for network access: only client computers that have up-to-date service packs installed can access the network; have up-to-date anti-malware so






17. SrvA has the AD LDS role and an instance named LDSInst1. You connect to this instance by using the ADSI Edit utility. When you execute the Create Object wizard there is no User object class. What should be done so you can create user objects in LDSIn






18. What should be modified so you can use the nslookup utility to list all SRV records for your domain?






19. Recently it was decided to increase the performance of the company's Web Servers by deploying a NLB Web server farm. You need to ensure that the content is easily replicated across all the servers in the farm. You should implement this.






20. AD CS is configured on Server1 as a standalone CA. What two actions should you do to audit changes to the CA configuration settings and the CA security settings?






21. Your company recently created a corporate web site using their own internal developers. Recently your CIO has decided that it would be best that some of the work be done by an outside contractor - and to allow that contractor to only the specific sec






22. New Password Policy needs to be created for OU different from domain password policy






23. For complete fault tolerance the backend SQL Server should be protected as well - by placing it in a MSCS Failover Cluster) - To allow computers that are members of the domain to receive updates from a local WSUS you can easily create a group policy






24. To monitor replication of group policy template files when DFL set at Windows 2008 R2...






25. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






26. What should be done to resolve names by using GlobalNames zone?






27. You need to recommend the minimum number of logical unit numbers (LUNs) that must be provisioned for Cluster. If the cluster has an even number of nodes ...






28. When configuring delegation of administration for Domain Controllers at a remote location you must Add the users or groups as members of the Domain Admins Group. However - be careful to allow just a certain user or group of users to manage the Domain






29. IF you need to automate deployment of 32 and 64 bit 2008 R2 servers






30. To improve performance and provide redundancy if a single server fails - the intranet web site should be in this.






31. To add a new UPN for all user accounts...






32. Within your company you have a server that will be running 8 VMs but only 6 concurrently. Your company has already purchased an Enterprise license for the server.






33. DNS zone is stored in custom applicaiton directory partition. What tool is used to ensure replicaiton to new installed DC?






34. In order to ensure highly available Windows Update servers you should create this.






35. Capture all replication errors from all your DCs to a central location...






36. You need a patch management strategy to deploy updates to the computers on the secure network. To accomplish






37. You have a root domain and four child domains. Policy requirements state that all local guest accounts must be renamed and disabled - and all local administrator accounts must be renamed






38. You need to recommend a server configuration to support a Web-based application that must meet these requirements: the app must be available to all users if a single server fails; support the installation of .NET applications; Minimize software costs






39. Minimal FFL needed to deploy an RODC that runs Windows Server 2008 R2...






40. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log






41. Audit account management policy settings and Audit directory services access settings are enabled for the entire domain. What should be done to ensure that changes made to AD objects can be logged? The logged changes must include the old and new valu






42. To know if a new applicaiton is going to run on your network computers via AppLocker in GPO






43. You have three domain controllers that perform a full back up every day. You need a recovery strategy for AD objects that meets these requirements: allows objects in a backup to be compared to objects in the live AD database; minimizes admin effort.






44. To create AD Domain Services snapshot






45. Client computers run Windows 7 and all applications on the computers are configured to save documetns to the local Documents folder. You need a backup strategy that meets these: Back up the Documents folder for all users; minimize admin effort. To ac






46. All computers are running either Windows SP2 or Windows 7. You want to audit users that are accessing the administrative shares on all the computers...






47. To allow connection to a 256 Kbps ISDN...






48. You need to recommend a BitLocker recovery method you should recommend this.






49. You need to rebuild a server and reinstall the operating system - and rollback all operations master roles to original state...






50. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us