Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. All computers are running either Windows SP2 or Windows 7. You want to audit users that are accessing the administrative shares on all the computers...






2. When using Remote Desktop and Remote Desktop Session hosts - to be able to control both who can gain access - and to what - on the network configure;






3. Engineering department has 582 Windows Server 2008 R2 servers. You need to monitor the performance of all 582 with following requirements: Create alerts when average processor usage is higher than 85% for 15 minutes; Automatically adjust the processo






4. to protect file servers and hard disks that may be at risk of being accessed or stolen






5. You need to allow remote access to the servers on your network while meeting the following requirements: all remote connections to the servers must be encrypted; all remote authentication attempts to the servers must be encrypted; only inbound connec






6. The Authorization Manager console is a Microsoft Management Console (MMC) snap-in. You can run the Authorization Manager console as a stand-alone console - or add it to any MMC console.






7. To replicate SYSVOL using Distributed File System Replication (DFSR)...






8. To build a highly secure server cluster with a reduced attack surface area






9. To backup GPO's in domain and minimize bakcup...






10. To make deploying the custom Word dictionary easy






11. You have 159 server 2008 R2 servers that must meet the following: notification by e-mail to the administrator if error occurs on any server with minimum effort...






12. To minimize the amount of storage required you should recommend






13. to prevent VMs from receiving updats from a group policy






14. What should be done to resolve names by using GlobalNames zone?






15. Your office has no Internet connection. Your data provisioning solution must meet these requirements: users that are not connected to the network must be able to access files and folders on the network; unauthorized users must not have access to the






16. When recommending a monitoring solution for an application so that it's events can be stored in a central






17. What should be used to montior the replication of group policy template files when your DFL is set at Windows Server 2008 R2?






18. to ensure that users can ONLY view the list of DFS Targets to which they are assigned permissions






19. When service account passwords need to be changed for SQL they should be...






20. to increase the reliability of the print server - configure...






21. All users store their files in their Documents folder. Some of these are very large. You are going to implement roaming profiles for all your users. You will configure this by using a GPO. To minimize the amount of time it takes for your users to log






22. If you want to implement BitLocker and store recovery informaiton in a central location






23. when deploying Virtual Machines in a Remote Desktop pool you can minimize the amount of disk space used by the VM and reduced the admin effort by deploying this.






24. You don't want users to be able to install removable devices on client computers. However - domain admins and desktop support technicians must be allowed to install removable devices on client computers






25. To speed up the deployment of the RODC in the new branch offices you should take advantage of this.






26. What shold be done to configure AD RMS so users can protect their data?






27. If you want to allow the administrator in each office to manage DHCP scope for their own office - and prevent the administror of one office from managing DHCP scopes on the DHCP server in another office with mimimal admin effort






28. You need to access some resources in another domain that is part of another forest. What type of trust should you create?






29. Requirements are: support the installation of SQL Server 2008; Provide redundancy for SQL services if a single server fails. To accomplish this






30. You need to plan the deployment of an application that must meet these requirements: users must have - access to the app when they are connected to the network; access the application from an icon on their desktops.






31. To ensure that administrators are allowed to install USB drives on their Windows 7 computers - but NOT allow non-administrators






32. Auditing the deletion of Registry keys on all Domain Controllers






33. You have a failover cluster that has an application installed. Service level agreement requires 55 percent of processor and memory utilization to be reserved for the app. A solution to guarantee service level agreement would be






34. Need to access some resources in another domain that is part of another forest...What trust is created?






35. In order to manage websites without having to logon you can use






36. The servers in each office run Server 2008 R2 Enterprise Edition. You need to plan a failover cluster solution to service users in both offices that meet these: maintain the availability of services if a single server fails; minimize the number of se






37. DFL is...






38. If you need to allow an external partner's computer to access internal network resources by using SSTP






39. Company.com is working on a set of corporate documents. These documents are stored in a shared folder on your corporate file server. You need to protect documents as they get created.






40. With AppLocker settings - which Windows PowerShell cmdlet would be used to identify whether a specific application file is allowed to run on a computer?






41. To allow for an application on a Remote Desktop Server to be available through document invocation - you must






42. For the users that work remotely that need access to files from the corporate office you should...






43. You need a tool that will help you manage LUN's for both iSCSI and Fibre Channel to support the provision of Virtual disks. You should recommend this.






44. All servers run 2008 R2 and all client computers run Windows 7. Server users have laptops and work from home. You need to plan an infrastructure to secure sensitive files according to these requirements: files must be - stored in an encrypted format;






45. To ensure that a file on a file server do not leave the organization you must implement this.






46. To allow administrators to create and store .ADMX templates in a way that allows them to have access to the template no matter what administrative computer they logon to you must






47. Your company recently created a corporate web site using their own internal developers. Recently your CIO has decided that it would be best that some of the work be done by an outside contractor - and to allow that contractor to only the specific sec






48. Domain.com's network consists of a single forest and a single domain - all Domain Controllers - Servers and Remote Desktop Services servers are now 2008 R2. All clients are Windows 7. You need to deploy a new CRM Applicaiton to the sales team. You mu






49. 4 steps to perform offline Defragmentation of AD database...






50. What should be modified so you can use the nslookup utility to list all SRV records for your domain?