Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Computer Management snap-in allows you to create shares both on...






2. The ability to set quotas at the volume level has been around for many years - however if you have have servers that need quotas - but instead of placing the quota at the volume level you need to place the quota on an individual folder -






3. All servers run 2008 R2. All client computers run Windows 7 and Outlook 2010. The sales team needs to use Outlook 2003 to support a custom application. You need a deployment strategy that meets these requirements: provide access to Outlook 2003 and 2






4. DCDNS1 is a DC and DNS server that host and ADI zone for company.com and is located in the main office. DNS2 is a DNS server that hosts a secondary zone for company.com and is located in the branch office. FSrv1 is a new file server that is located i






5. Certain groups of users must be able to approve certificate requrests and revoke certificates but not be able to modify the properties of the CA. You should recommend






6. When one needs to audit files - folders - printers and the registry enable






7. to protect file servers and hard disks that may be at risk of being accessed or stolen






8. You need to deploy a new application according to the following requirements: must be available to remote users when they are offline; must access the application from an icon on the Start menu






9. If you need to implement a Cert Services solution that automates distribution of certificates - ensures security and gives external users acess to resources that use cert-based authentication






10. To allow all users in the forest to be able to resolve the names in the Forest Root Partition






11. Client computers run Windows 7 and all applications on the computers are configured to save documetns to the local Documents folder. You need a backup strategy that meets these: Back up the Documents folder for all users; minimize admin effort. To ac






12. BLANK BLANK is a computer Group Policy setting that can be for example; Linked at an OU where public kiosks/remote desktop session host computers reside.






13. If you need to encrypt all data on all disks






14. Help desk staff must be able to update drivers on the domain controllers at the branch office and assign them the proper






15. You need to recommend a server configuration to support a Web-based application that must meet these requirements: the app must be available to all users if a single server fails; support the installation of .NET applications; Minimize software costs






16. Certain apps may require that the end user have the ability to make changes to the application - however some applications may allow these changes to be made in the registry. To give you as the administrator the ability to make changes as necessary -






17. 3 servers are configured as DNS servers and are ADI for the company.com zone. DNS only allows for secure updates - but you need to enable dynamic DNS updates on DCC.company.com...What do you do?






18. What should be done to identify which LDAP computers are using the largest amount of available CPU resources on a DC?






19. All servers run 2008 R2 and all client computers run Windows 7. Server users have laptops and work from home. You need to plan an infrastructure to secure sensitive files according to these requirements: files must be - stored in an encrypted format;






20. If a file server reaches 15% free disk space - you could free up some disk space by






21. An external partner plan requires the following: prevent sensitive documents from being forwarded to untrusted recipients or from being printed; allow users in the external partner organization to access the protected content to which they have been






22. What should be done to ensure changes made to AD objects can be logged?






23. To prevent account password from being cached on RODC server...






24. What utility is used to see what accounts cached on RODC?






25. What should be done so application does not fail after 30 days while still keeping password policy in mind?






26. You have a root domain and four child domains. Policy requirements state that all local guest accounts must be renamed and disabled - and all local administrator accounts must be renamed






27. Your data recovery strategy for your Server 2008 R2 file server must meet the followign requirements: All data volumes on the server must be backed up daily; backups must have a minimal impact on performance; if a disk fails - the recovery strategy m






28. What should be used to montior the replication of group policy template files when your DFL is set at Windows Server 2008 R2?






29. to make shares at a remote location available to users you should implement this.






30. All servers are 2008 R2. All client computers are Vista and have Outlook 2007 installed. Following resources are being accessed: exchange 2010 by using Outlook 2007 - database server on TCP port 38968 - 2008 R2 file servers. You need to provide users






31. When implementing WSUS servers at branch offices or remote campuses you can configure the WSUS server a the remote location to be in






32. IE can be a security concern - however you can take advantage of Group policies to lock down IE as much as possible

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. Minimal FFL needed to deploy an RODC that runs Windows Server 2008 R2...






34. With AppLocker settings - which Windows PowerShell cmdlet would be used to identify whether a specific application file is allowed to run on a computer?






35. If the companies support staff is currently using Remote Desktop to connect to the servers in the data center to perform all management tasks - it would be wise to have them instead






36. If you need to deploy a DHCP server that supports computers that start from a PXE network adapater and support Win7






37. To create AD Domain Services snapshot






38. If you want to implement BitLocker and store recovery informaiton in a central location






39. To back up your Hyper-VMs and the Hyper-V host; for each VM -






40. To delegate authority to users to manage only certain areas in Hyper-V use the






41. What tool would you use to add a new User Principal Name (UPN) for all user accounts?






42. You need to design patch management for satellite offices that meet the following requirements: WSUS updates are approved independently for each satellite office; Internet traffic is minimized. To accomplish






43. To minimize the amount of storage used for virtual machines in a Virtual desktop pool the VHD's should be

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. What role to keep same time as an external server?






45. To backup to tape/robotic tape and to backup VMs you must use...






46. If your company has the need to create administrative templates (.admx) files for Active Directory runnin on server 2008 R2 you should recommend...






47. You need to modify DNS infrastructure to support dynamic updates to ALL DNS servers; ensure DNS service available even if single server fails; encrypt the synchronization data sent between DNS servers.






48. To control access to resources using WSRM and to help prevent memory leaks from monopolizing your web server






49. To defragment and AD database...






50. You need to recommend management solution that will allow users to manage only certain parts of Hyper-V