Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What should be done to identify which LDAP computers are using the largest amount of available CPU resources on a DC?






2. To allow a specifc user or group to manage the address information for the user accounts...






3. You have a main office and a branch office. Your Active Director domain runs at functional level Windows Server 2008. You are planning to implement file servers in each office. Your file sharing implementation must meet the following requirements: us






4. Company.com is working on a set of corporate documents. These documents are stored in a shared folder on your corporate file server. You need to protect documents as they get created.






5. Auditing the deletion of Registry keys on all Domain Controllers






6. You are evaluating whether to use express installation files as an update distribution mechanism. The technical requirement that






7. So a user can install updates on an RODC while preventing them from logging on to any other domain controller...






8. Requirements are: support the installation of SQL Server 2008; Provide redundancy for SQL services if a single server fails. To accomplish this






9. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us






10. Two different solutions are available to help assign IP addresses to remote clients that need to VPN or Dial-in to the branch office.

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


11. If you need secure method to verify validity of individual certificates and minimize network bandwidth






12. To allow a user to administer Active Directory






13. There's an AD domain named company.com. There are 3 DC's that also hold the DNS server role which host an ADI zone named company.com. This zone is configured to update settings to Secure only Dynamic Updates. The CIO has issued a new security policy






14. When one needs to audit files - folders - printers and the registry enable






15. File that contains the last logon time and custom attributes values for each user in your forest.






16. You have a main office that contains two domain controllers and a branch office that has an RODC. What should be done so that a user named George can install updates on the RODC while preventing George from logging on to any other domain controller?






17. Tool to change Directory Services Restore Mode password on Domain Controller...






18. To ensure that administrators are allowed to install USB drives on their Windows 7 computers - but NOT allow non-administrators






19. If you need to delegate control of server to remote admins group






20. ServerA collects all events that occur on domain controllers with minimum effort from Event Viewer - what should be done to ensure notified when specific event occurs on any domain controllers...






21. To ensure that recovery is possible if a file on a file server is deleted accidentally






22. The Authorization Manager console is a Microsoft Management Console (MMC) snap-in. You can run the Authorization Manager console as a stand-alone console - or add it to any MMC console.






23. Srv1 - Srv2 - Srv 3 are Network Policy Servers (NPS) that function as RADIUS Servers. Srv1 is also Microsoft SQL Server 2008 server. The network has 20 wireless access points that are configured as RADIUS clients. You need an audit strategy with the






24. To limit each user's storage space and to prevent users from storing audio and video files on the servers you should recommend






25. To back up your Hyper-VMs and the Hyper-V host; for each VM -






26. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log






27. You need to design your WSUS infrastructure so that updates are highly available. To do so






28. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






29. Internet access is provided through the main office to the satellite offices. You need to design a patch management for the satellite offices that meet the following requirements: WSUS updates are approved from a central location; internet traffic is






30. If you need to minimize the number of install images and support Win Server 2008 R2 deployment






31. To build a highly secure server cluster with a reduced attack surface area






32. To restore previous version of script without taking up too much of time...






33. You need a strategy for backing up your 2008 R2 file servers according to these: allows for individual file restore; allows for complete server recovery; supports scheduled backups; provides decentralized control over backups and recovery; minimizes






34. SrvA has the AD LDS role and an instance named LDSInst1. You connect to this instance by using the ADSI Edit utility. When you execute the Create Object wizard there is no User object class. What should be done so you can create user objects in LDSIn






35. From Win7 PC - to view all account logon successes that occur on domain and consolidate to one list...






36. You need to recommend a solution for users in the branch office to access files in the main office. To minimize the amount of time it takes for users in the Branch office to access files stored on servers in the main office - and minimize the number






37. You need to allow a user to add a single computer to a domain - without any additional rights...






38. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






39. Deployment solutions that will allow both the 64 bit version of Office 2010 and the 32 bit version Office 2003 to run at a same time on a Windows 7 computer - and to do that when the computer is offline - are very limited. You should recommend






40. Striped volumes






41. You have few Server 2003 servers that have Terminal services installed. You also have a firewall that runs ISA Server 2006. Your remote access strategy for the terminal servers needs to meeet the following: restricts accsss to specific Remote Desktop






42. You need a solution that allows your users to collaborate with each other and that must meet these: enables - full text indexing of all user content - remote access to files by using a Web browser - secure access to files by assigning permisions; sup






43. To ensure that a group in not giving too many permissions when delegating be sure to delagate permissions at the lower level OUs vs. at the domain level for example






44. To minimize the amount of storage required you should recommend






45. To determine size of AD database file...






46. All computers are running either Windows SP2 or Windows 7. You want to audit users that are accessing the administrative shares on all the computers...






47. There is a file server in each office that contains a shared folder named Data. You need to plan the data availability for the Data folder according to these requirements: if WAN link fails - the files in the Data folder must be available in all of t






48. To ensure IT Help Desk Users can create GPOs in the domain and give them a GPO that contains preconfigured settings that will be used to create new GPOs -






49. In order to reduce the administrative overhead typically involved with viewing event logs across multiple servers you should implement this.






50. If you need to encrypt all data on all disks







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests