Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Need a solution that will ensure that the initial settings when creating new policies for both forests will become more consistent. You should...

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. If you need secure method to verify validity of individual certificates and minimize network bandwidth






3. If you want to allow single-label name resolution






4. Striped volumes






5. If you need to ensure that data is protected by BitLocker then you will...






6. To modify several user accounts to a new UPN suffix






7. You need to manage GPO to meet the following: allow administrators to view and edit the GPO in their own language; minimize number of GPOs deployed






8. You have 9 2008 R2 servers that host Web apps. You need a remote mgmt strategy to manage the Web servers according to these requirements: Web developers need to be able to configure features on the Web sites; Web developers should not have full admin






9. BLANK BLANK is a computer Group Policy setting that can be for example; Linked at an OU where public kiosks/remote desktop session host computers reside.






10. Need to access some resources in another domain that is part of another forest...What trust is created?






11. You have a 2008 R2 server configured as Remote Desktop Session host. You need to deploy a line-of-business app; however - the app requires desktop themes to be enabled. Your deployment strategy must meet these requirements: only authorized users must






12. An external partner plan requires the following: prevent sensitive documents from being forwarded to untrusted recipients or from being printed; allow users in the external partner organization to access the protected content to which they have been






13. To ensure that when certain users log on to any client computers in the branch office - they automatically receive the local administrator rights to the computer - and when they log off - they must lose the administrator rights






14. You need an Active Directory strategy that supports the recovery of deleted objects for up to one year after the date of deletion. to accomplish this






15. What should be done to resolve names by using GlobalNames zone?






16. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log






17. To configure Administrator Role Separation for an RODC






18. All 2008 R2 servers and Windows 7 clients are connected to managed switches. The following are requirements for network access: only client computers that have up-to-date service packs installed can access the network; have up-to-date anti-malware so






19. Domain.com's network consists of a single forest and a single domain - all Domain Controllers - Servers and Remote Desktop Services servers are now 2008 R2. All clients are Windows 7. You need to deploy a new CRM Applicaiton to the sales team. You mu






20. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






21. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






22. If you need to encrypt all data on all disks






23. To control access to resources using WSRM and to help prevent memory leaks from monopolizing your web server






24. If you want to implement BitLocker and store recovery informaiton in a central location






25. What GPO setting should be configured to prevent all users from running an application?






26. To prevent account password from being cached on RODC server...






27. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






28. You need to plan for the delegation of administrative authority for an OU in your AD named Staff. It should: allow help desk admins to create user accounts in the Staff OU; allow helpdesk admins to change the address attributes; prevent HelpDesk admi






29. To backup Virtual Machines






30. For the users that work remotely that need access to files from the corporate office you should...






31. You plan to upgrade your networks desktops to Windows 7 however - after testing you discover an application that will only run on Windows XP. You need to make this application available to a large number of desktops.






32. To compact AD database...






33. AD RMS is being used on the network. George is only a member of the AD RMS Enterprise Administrators group. Mitt needs to be able to change the service connection point (SCP) for the AD RMS installation. What should be done so George can accomplish t






34. Your data provisioning solution must meet the following requirements: users must have access to their Documents folder regardless of the client computer that they use; user documents should not be stored on the local client computer; minimize the tim






35. IF you need to automate deployment of 32 and 64 bit 2008 R2 servers






36. You have 5 windows Server 2008 R2 servers that are configured with the File Server role. you need to monitor the file servers with the following requirements in mind: administrators must be able to create reports that display folder usage by differen






37. To back up your Hyper-VMs and the Hyper-V host; for each VM -






38. Srv1 is a file server that has five internal SCSI hard drives. Your storage strategy needs to meet the following requirements: Physically separates the operating system data from the user data; maximize the disk space available for data storage; uses






39. Srv1 - Srv2 - Srv 3 are Network Policy Servers (NPS) that function as RADIUS Servers. Srv1 is also Microsoft SQL Server 2008 server. The network has 20 wireless access points that are configured as RADIUS clients. You need an audit strategy with the






40. To configure AD FS so tokens contain information from Active Directory domain...






41. to protect file servers and hard disks that may be at risk of being accessed or stolen






42. To create AD Domain Services snapshot






43. The strongest form of NAP is






44. You have a 2008 R2 serever that has SQL Server 2008 installed. The server has one RAID 5 array and two RAID 1 arrays. You need to allocate hard disck space on the server according to the followign requirements: prevent data los if a single hard disk






45. To backup to tape/robotic tape and to backup VMs you must use...






46. You have two offices that are connected via a WAN link. Each office has a 2008 R2 file server. Users store their data on their local file server - but they can also acces data from the other office. You must implement a data solution according to the






47. When configuring delegation of administration for Domain Controllers at a remote location you must Add the users or groups as members of the Domain Admins Group. However - be careful to allow just a certain user or group of users to manage the Domain






48. There is a file server in each office that contains a shared folder named Data. You need to plan the data availability for the Data folder according to these requirements: if WAN link fails - the files in the Data folder must be available in all of t






49. In order to reduce the administrative overhead typically involved with viewing event logs across multiple servers you should implement this.






50. A DNS structure should be deployed acording to the following requirements: ensure resources in the root and child domains are accessible by FQDN; provide name resolution services in the event that a single server fails for a prolonged period of time;