Test your basic knowledge |

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In order to manage websites without having to logon you can use






2. When one needs to audit files - folders - printers and the registry enable






3. You need to access some resources in another domain that is part of another forest. What type of trust should you create?






4. To deploy templates across the organization






5. Assign the application to the user if you want the icon to appear on the start menu or desktop - but to allow the user to install it. Keep in mind if you assign the application to the user ....






6. To be able to remotely administer DNS servers that run on the Server Core installation of Server 2008 R2 - via MMC console






7. If your company has the need to create administrative templates (.admx) files for Active Directory runnin on server 2008 R2 you should recommend...






8. The company requires that only users that have a certificate can recover BitLocker keys. To support this requirement you will need to






9. All servers use internal storage only. Srv1 is a Server 2008 R2 file server. you need to deploy a client/server application so that it is available if a single server fails. To achieve this while minimizing cost






10. To configure Administrator Role Separation for an RODC






11. Deploying a web server farm can be costly. You need to minimize the amount of disk space used.






12. You have 5 windows Server 2008 R2 servers that are configured with the File Server role. you need to monitor the file servers with the following requirements in mind: administrators must be able to create reports that display folder usage by differen






13. You need to recommend a BitLocker recovery method you should recommend this.






14. The strongest form of NAP is






15. A DNS structure should be deployed acording to the following requirements: ensure resources in the root and child domains are accessible by FQDN; provide name resolution services in the event that a single server fails for a prolonged period of time;






16. You need to ensure that the guest account on all servers is disabled to






17. You need to deploy 15 Server Core installations that are only accessible by HTTP and HTTPS. Administration of these must be able to enable administrators to install and administer server roles remotely and fully manage servers remotely






18. You have 159 server 2008 R2 servers that must meet the following: notification by e-mail to the administrator if error occurs on any server with minimum effort...






19. To determine size of AD database file...






20. Domain.com recently deployed several Windows Server 2008 R2 file servers. You recently have had a problem with the file server in the sales department. On a regular basis the hard drive on the file server reaches capcity. You have to routinely perfor






21. To create and additional AD LDS applicaiton directory partition in existing instance...






22. To know if a new applicaiton is going to run on your network computers via AppLocker in GPO






23. All servers run 2008 R2 and all client computers run Windows 7. Server users have laptops and work from home. You need to plan an infrastructure to secure sensitive files according to these requirements: files must be - stored in an encrypted format;






24. DFL is Windows Server 2003 and client computers run Vista. DCRMS is a server that holds AD RMS. What should be done to configure AD RMS so users - including Waldo - can protect their data?






25. With Group Polices having over 8 -000 different settings - the possibility of conflicting policies - and security filters you should track multiple versions and offline modifications to GPOs. You should recommend






26. You have 9 2008 R2 servers that host Web apps. You need a remote mgmt strategy to manage the Web servers according to these requirements: Web developers need to be able to configure features on the Web sites; Web developers should not have full admin






27. When deploying software across a large distributed enterprise you can reduce the need for clients to obtain the necessary .msi file needed for installation from over the network. Placing applications .msi file in a shared folder that is replicated us






28. To be able to user an application from one AD FS with authentication server to another...






29. In order for admins at a branch office to be able to change their passwords and logon if a single DC fails even if the WAN Link to the corporate office fails you shoud

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


30. If you need a VPN soluction that stores VPN passwords as encrypted text and supports automatic enrollment of certificates






31. To control access to resources using WSRM and to help prevent memory leaks from monopolizing your web server






32. To enforce corporate policy on ALL computers in the domain to show a legal notice when a user logs on to the domain






33. Your data recovery strategy for your Server 2008 R2 file server must meet the followign requirements: All data volumes on the server must be backed up daily; backups must have a minimal impact on performance; if a disk fails - the recovery strategy m






34. When taking files offline there is always a security risk. Corporate files now reside on a laptop that will leave the confines of the corporate office. When taking files offline it is best practice to help protect these files using






35. If you need to implement a Cert Services solution that automates distribution of certificates - ensures security and gives external users acess to resources that use cert-based authentication






36. When service account passwords need to be changed for SQL they should be...






37. If subnets are connected by CISCO router that is RFC-1542 compliant






38. DCDNS1 is a DC and DNS server that host and ADI zone for company.com and is located in the main office. DNS2 is a DNS server that hosts a secondary zone for company.com and is located in the branch office. FSrv1 is a new file server that is located i






39. You have a root domain and four child domains. Policy requirements state that all local guest accounts must be renamed and disabled - and all local administrator accounts must be renamed






40. hr.domain.com domain has an OU named Sales...You need to give UserA administrative rights so that he can manage Group Policies for the Sales OU while meeting the following requirments: UserA must be able to create and configure Group Polices in hr.do






41. You need a solution that meets policy while minimizing hardware and software costs






42. Jack and Jill go up the hill - both with a buck and a quarter






43. The ability to set quotas at the volume level has been around for many years - however if you have have servers that need quotas - but instead of placing the quota at the volume level you need to place the quota on an individual folder -






44. For complete fault tolerance the backend SQL Server should be protected as well - by placing it in a MSCS Failover Cluster) - To allow computers that are members of the domain to receive updates from a local WSUS you can easily create a group policy






45. George needs to administer a read-only domain controller named Server1 - but to do this with minimal permissions assigned to him. What tool should be used for this daunting task?






46. If users complain that it is hard to find the shared folders on the network implement






47. If you need secure method to verify validity of individual certificates and minimize network bandwidth






48. You need to deploy a distributed database application that meets the following: allocates storage to servers as required; isolates storage traffic from the exisiting network; ensures that data is available if a single disk fails; ensures that data is






49. If you need to minimize amount of time and impact of 50 simultaneous Win7 installations






50. To identify users who bypass the new corporate security policy -