This is a timed quiz.
You have 1 hour to complete the 70 questions in this quiz.
What technology provided by Microsoft is used to perform a network-based installation of Windows operating systems including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008?
IAS
Server Core
SIM
WDS
What does the name of the answer file on a USB drive have to be to perform an automatic installation?
autounattend.xml
auto.xml
auto.txt
automatic.xml
What is the program you should use to create or validate an answer file used to install Windows?
What is the maximum amount of memory that Windows Server 2008 R2 Standard Edition requires?
2 GB
4 GB
32 GB
64 GB
How many grace period days do you have in which to activate Windows Server 2008 R2?
3 days
10 days
15 days
30 days
Which of the following is not a primary subsystem found in a server?
Processor
Memory
Sound
Storage
What type of installation do you use that starts from scratch?
A clean upgrade
A clean installation
A formatting installation
A backup installation
What command would you use to prepare a Windows installation for imaging that will remove the SID and computer name?
Sys
Sysprep
SIDPrep
WDSPrep
What does Microsoft use to fight pirated copies of Windows?
Activation
Which edition of Windows Server 2008 R2 gives you the most access to processors and memory?
Foundation
Standard
Enterprise
Datacenter
Which tool allows support personnel to interact with your session to help troubleshoot problems?
Remote Desktop
Remote Assistance
Credential Manager
Control Panel
If you connected to your internal network, what should you check if you cannot connect to web servers on the Internet?
UAC
Administrative rights
Proxy settings
NTFS permissions
What technology automatically configures IRQs, DMA channels, I/O port addresses, and memory address ranges for an expansion card?
Signed drivers
Services Manager
Plug and Play
Which built-in account gives full access to the computer system?
Local System
Local Service
Network Service
Local User
What is a central secure database that stores all hardware configuration information, software configuration information, and system security configuration policies?
The Registry
Server Manager
Computer Management
When installing drivers on a 64-bit version of Windows Server 2008 R2, you must ____________.
Install only signed drivers
Install the driver with Device Manager
First disable UAC
Enable the Windows Installer service
To install a network role, you would use the ____________.
Computer Management console
Server Manager console
Device Manager
Services console
What program would you use to assign IRQ for a device?
Registry Editor
Which of the following is not a start-up type for a service?
Automatic
Manual
Disable
Self-configuring
Which registry key holds the specific settings of a local computer?
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
Which type of drives offer faster performance and are usually found on servers?
SCSI
IDE
RLL
MFM
Which common form of RAID uses three or more disks to provide fault tolerance?
RAID 0
RAID 1
RAID 3
RAID 5
How much disk space would you have if you use four 2TB drives in a RAID 5 configuration?
2 TB
4 TB
6 TB
8 TB
Which type of RAID uses a striped dataset that is mirrored with RAID 1?
RAID 4
RAID 1+0
RAID 0+1
Which device is a file-level data storage drive that provides access to shared files and folders?
SAN
NAS
RAID
Hot spare
What is the default port used by iSCSI?
3000
8080
3260
443
Windows Server 2008 uses an _________________ to communicate to a SAN based on iSCSI.
iSCSI connector
iSCSI initiator
iSCSI plug-in
iSCSI snap-in
Which Fibre Channel topology provides optimized connection when isolating failed ports?
FC-P2P
FC-AL
FC-SW
FC-SNP
What units used in a SAN can be assigned to a server?
HBAs
snapshots
LUNs
ANSIs
Which type of volume do dynamic disks not support?
Simple volume
Striped volume
Stripped mirror volume
RAID-5 volume
What publications include a set of concepts and practices for managing IT services, development, and operations?
Red book
IT Development Guide
ITIL core books
IT Transition Guidebook
What tool is used to view the hardware and software loaded on a Windows server?
System Information
System Configuration
KB tool
POST
Where would you find NTLDR or BOOTMGR on a hard drive?
MBR
VBR
boot.ini
WINNT folder
What determines which operating system should be loaded when running Windows Vista, Windows 7, or Windows Server 2008?
GUID
BCD
You loaded a program and rebooted Windows. Unfortunately, Windows no longer boots. What should you try first?
Enable boot logging.
Load last known good configuration.
Disable the boot.ini file
Reinstall Windows.
What program gives you a quick look at system performance and the processes that are running?
Task Manager
Performance Monitor
Resource Monitor
SystemInformation
________________ is multiple computers configured as one virtual server to share the workload.
Network load balancing
Active-passive cluster
SAN cluster
Terminal server
________________ is making copies of data so that these additional copies may be used to restore the original after a data-loss event.
DFS
Backup
EMS
Which type of backup backs up all designated files and turns off the archive attribute?
Full
Differential
Incremental
Copy
Which type of backup takes the longest to restore?
The primary naming service used in Windows is _______________.
AD
WINS
DNS
DHCP
What is the resource record that translates from hostname to IP address in DNS?
PTR
H
IP
A
_______________is a legacy naming system used to translate Computer Names/NetBIOS names to IP addresses.
What is the master time server?
Schema Master
Domain Naming Master
PDC Emulator
RID Master
What holds replica information of every object in a tree and forest?
Infrastructure Master
Global Catalog
Which group scope is meant to be used to assign permissions to a local resource?
Distribution group
Domain local
Global
Captured
Which group scope can contain global groups from multiple domains?
Emulation
Universal
What can be used to specify how many times a user can enter a login with an incorrect password before the account is disabled?
User profile
Group policy
Software policy
User account collection
To which of the following can a group policy not be directly applied?
Group
Site
Domain
OU
What authorizes a user to perform certain actions on a computer?
Permission
UNC
Right
Task
What is the standard NTFS permission needed to change attributes of a NTFS folder?
Write
Read
Modify
Full Control
Which permission takes precedence?
Explicit Deny
Explicit Allow
Inherited Deny
Inherited Allow
Which of the following is NOT a share permission?
Change
TCP/IP printers use port ________.
23
9100
What is a single virtual printer with a single print queue that consist of two or more printers?
Print collection
Direct printers
Printer group
Printer pool
What symbol makes an administrative share not seen when browsed?
#
*
!
$
When enabling Internet Printing, you need to install ______________________.
IIS
GPO Manager
What is the minimum share permission that allows you to change file and folder permissions?
Manage
When you copy files from one folder to another folder within the same volume, you get the _________________________.
Same permissions as the source
Same permissions as the target
No permissions are set
Everyone has full permission
You are an administrator on a computer. Unfortunately, there is a folder that you cannot access because you have do not have permissions to the folder. What can you do?
Take ownership of the folder
Delete the folder and recreate it.
Turn off the deny attribute.
Grant the allow everyone full permission
Which protocol is used to transfer files between computers?
HTTP
FTP
Telnet
Which port does SMTP use?
21
25
80
Which port does HTTP use?
A(n) ____________________ defines a set of resources used by a Web site or application that defines the memory boundaries of a Web site.
Virtual directory
Root directory
Application pool
Port forwarder
Which authentication sends username and password that is not encrypted?
Anonymous
Basic authentication
Digest authentication
Windows authentication
When configuring VPN, L2TP uses _____________________ for encryption.
SSTP
PPTP
MPE
IPSec
Which authentication method used with VPN clients can be used with retinal scan and fingerprint identifications?
PAP
CHAP
MS-CHAPv2
EAP-MS-CHAPv2
By using ________________ technology, you can run multiple operating systems concurrently on one machine.
Virtual machine
Remote access
After you create a virtual server in Hyper-V and install the operating system, you then need to install __________________ so that the virtual server can run more efficiently.
VMWare client tools
Remote Desktop tools
Integration Services Setup
P2V Disk tools
Which protocol is used to send out email?
POP2
IMAP
SMTP