Question 1
Question
What technology provided by Microsoft is used to perform a network-based installation
of Windows operating systems including Windows XP, Windows Vista, Windows Server
2003, and Windows Server 2008?
Question 2
Question
What does the name of the answer file on a USB drive have to be to perform an automatic
installation?
Answer
-
autounattend.xml
-
auto.xml
-
auto.txt
-
automatic.xml
Question 3
Question
What is the program you should use to create or validate an answer file used to install
Windows?
Question 4
Question
What is the maximum amount of memory that Windows Server 2008 R2 Standard
Edition requires?
Question 5
Question
How many grace period days do you have in which to activate Windows Server 2008 R2?
Answer
-
3 days
-
10 days
-
15 days
-
30 days
Question 6
Question
Which of the following is not a primary subsystem found in a server?
Answer
-
Processor
-
Memory
-
Sound
-
Storage
Question 7
Question
What type of installation do you use that starts from scratch?
Question 8
Question
What command would you use to prepare a Windows installation for imaging that will
remove the SID and computer name?
Answer
-
Sys
-
Sysprep
-
SIDPrep
-
WDSPrep
Question 9
Question
What does Microsoft use to fight pirated copies of Windows?
Answer
-
WDS
-
IAS
-
Sysprep
-
Activation
Question 10
Question
Which edition of Windows Server 2008 R2 gives you the most access to processors and
memory?
Answer
-
Foundation
-
Standard
-
Enterprise
-
Datacenter
Question 11
Question
Which tool allows support personnel to interact with your session to help troubleshoot
problems?
Answer
-
Remote Desktop
-
Remote Assistance
-
Credential Manager
-
Control Panel
Question 12
Question
If you connected to your internal network, what should you check if you cannot connect
to web servers on the Internet?
Answer
-
UAC
-
Administrative rights
-
Proxy settings
-
NTFS permissions
Question 13
Question
What technology automatically configures IRQs, DMA channels, I/O port addresses, and
memory address ranges for an expansion card?
Answer
-
Credential Manager
-
Signed drivers
-
Services Manager
-
Plug and Play
Question 14
Question
Which built-in account gives full access to the computer system?
Answer
-
Local System
-
Local Service
-
Network Service
-
Local User
Question 15
Question
What is a central secure database that stores all hardware configuration information,
software configuration information, and system security configuration policies?
Answer
-
Credential Manager
-
The Registry
-
Server Manager
-
Computer Management
Question 16
Question
When installing drivers on a 64-bit version of Windows Server 2008 R2, you must
____________.
Answer
-
Install only signed drivers
-
Install the driver with Device Manager
-
First disable UAC
-
Enable the Windows Installer service
Question 17
Question
To install a network role, you would use the ____________.
Question 18
Question
What program would you use to assign IRQ for a device?
Answer
-
Credential Manager
-
Device Manager
-
Registry Editor
-
UAC
Question 19
Question
Which of the following is not a start-up type for a service?
Answer
-
Automatic
-
Manual
-
Disable
-
Self-configuring
Question 20
Question
Which registry key holds the specific settings of a local computer?
Answer
-
HKEY_CLASSES_ROOT
-
HKEY_CURRENT_USER
-
HKEY_LOCAL_MACHINE
-
HKEY_USERS
Question 21
Question
Which type of drives offer faster performance and are usually found on servers?
Question 22
Question
Which common form of RAID uses three or more disks to provide fault tolerance?
Answer
-
RAID 0
-
RAID 1
-
RAID 3
-
RAID 5
Question 23
Question
How much disk space would you have if you use four 2TB drives in a RAID 5 configuration?
Question 24
Question
Which type of RAID uses a striped dataset that is mirrored with RAID 1?
Answer
-
RAID 4
-
RAID 5
-
RAID 1+0
-
RAID 0+1
Question 25
Question
Which device is a file-level data storage drive that provides access to shared files and folders?
Question 26
Question
What is the default port used by iSCSI?
Question 27
Question
Windows Server 2008 uses an _________________ to communicate to a SAN based on iSCSI.
Answer
-
iSCSI connector
-
iSCSI initiator
-
iSCSI plug-in
-
iSCSI snap-in
Question 28
Question
Which Fibre Channel topology provides optimized connection when isolating failed ports?
Answer
-
FC-P2P
-
FC-AL
-
FC-SW
-
FC-SNP
Question 29
Question
What units used in a SAN can be assigned to a server?
Answer
-
HBAs
-
snapshots
-
LUNs
-
ANSIs
Question 30
Question
Which type of volume do dynamic disks not support?
Answer
-
Simple volume
-
Striped volume
-
Stripped mirror volume
-
RAID-5 volume
Question 31
Question
What publications include a set of concepts and practices for managing IT services,
development, and operations?
Answer
-
Red book
-
IT Development Guide
-
ITIL core books
-
IT Transition Guidebook
Question 32
Question
What tool is used to view the hardware and software loaded on a Windows server?
Answer
-
System Information
-
System Configuration
-
KB tool
-
POST
Question 33
Question
Where would you find NTLDR or BOOTMGR on a hard drive?
Answer
-
MBR
-
VBR
-
boot.ini
-
WINNT folder
Question 34
Question
What determines which operating system should be loaded when running Windows
Vista, Windows 7, or Windows Server 2008?
Question 35
Question
You loaded a program and rebooted Windows. Unfortunately, Windows no longer boots.
What should you try first?
Question 36
Question
What program gives you a quick look at system performance and the processes that are
running?
Answer
-
Task Manager
-
Performance Monitor
-
Resource Monitor
-
SystemInformation
Question 37
Question
________________ is multiple computers configured as one virtual server to share the
workload.
Answer
-
Network load balancing
-
Active-passive cluster
-
SAN cluster
-
Terminal server
Question 38
Question
________________ is making copies of data so that these additional copies may be used to
restore the original after a data-loss event.
Question 39
Question
Which type of backup backs up all designated files and turns off the archive
attribute?
Answer
-
Full
-
Differential
-
Incremental
-
Copy
Question 40
Question
Which type of backup takes the longest to restore?
Answer
-
Full
-
Differential
-
Incremental
-
Copy
Question 41
Question
The primary naming service used in Windows is _______________.
Question 42
Question
What is the resource record that translates from hostname to IP address in DNS?
Question 43
Question
_______________is a legacy naming system used to translate Computer Names/NetBIOS
names to IP addresses.
Question 44
Question
What is the master time server?
Answer
-
Schema Master
-
Domain Naming Master
-
PDC Emulator
-
RID Master
Question 45
Question
What holds replica information of every object in a tree and forest?
Answer
-
Infrastructure Master
-
Schema Master
-
Global Catalog
-
PDC Emulator
Question 46
Question
Which group scope is meant to be used to assign permissions to a local resource?
Answer
-
Distribution group
-
Domain local
-
Global
-
Captured
Question 47
Question
Which group scope can contain global groups from multiple domains?
Answer
-
Emulation
-
Domain local
-
Global
-
Universal
Question 48
Question
What can be used to specify how many times a user can enter a login with an incorrect
password before the account is disabled?
Answer
-
User profile
-
Group policy
-
Software policy
-
User account collection
Question 49
Question
To which of the following can a group policy not be directly applied?
Question 50
Question
What authorizes a user to perform certain actions on a computer?
Answer
-
Permission
-
UNC
-
Right
-
Task
Question 51
Question
What is the standard NTFS permission needed to change attributes of a NTFS folder?
Answer
-
Write
-
Read
-
Modify
-
Full Control
Question 52
Question
Which permission takes precedence?
Answer
-
Explicit Deny
-
Explicit Allow
-
Inherited Deny
-
Inherited Allow
Question 53
Question
Which of the following is NOT a share permission?
Answer
-
Full Control
-
Write
-
Change
-
Read
Question 54
Question
TCP/IP printers use port ________.
Question 55
Question
What is a single virtual printer with a single print queue that consist of two or more printers?
Answer
-
Print collection
-
Direct printers
-
Printer group
-
Printer pool
Question 56
Question
What symbol makes an administrative share not seen when browsed?
Question 57
Question
When enabling Internet Printing, you need to install ______________________.
Answer
-
DFS
-
IIS
-
GPO Manager
-
Task Manager
Question 58
Question
What is the minimum share permission that allows you to change file and folder permissions?
Answer
-
Full Control
-
Change
-
Read
-
Manage
Question 59
Question
When you copy files from one folder to another folder within the same volume, you get the _________________________.
Answer
-
Same permissions as the source
-
Same permissions as the target
-
No permissions are set
-
Everyone has full permission
Question 60
Question
You are an administrator on a computer. Unfortunately, there is a folder that you cannot access because you have do not have permissions to the folder. What can you do?
Answer
-
Take ownership of the folder
-
Delete the folder and recreate it.
-
Turn off the deny attribute.
-
Grant the allow everyone full permission
Question 61
Question
Which protocol is used to transfer files between computers?
Question 62
Question
Which port does SMTP use?
Question 63
Question
Which port does HTTP use?
Question 64
Question
A(n) ____________________ defines a set of resources used by a Web site or application that defines the memory boundaries of a Web site.
Answer
-
Virtual directory
-
Root directory
-
Application pool
-
Port forwarder
Question 65
Question
Which authentication sends username and password that is not encrypted?
Answer
-
Anonymous
-
Basic authentication
-
Digest authentication
-
Windows authentication
Question 66
Question
When configuring VPN, L2TP uses _____________________ for encryption.
Question 67
Question
Which authentication method used with VPN clients can be used with retinal scan and fingerprint identifications?
Answer
-
PAP
-
CHAP
-
MS-CHAPv2
-
EAP-MS-CHAPv2
Question 68
Question
By using ________________ technology, you can run multiple operating systems concurrently on one machine.
Answer
-
Virtual machine
-
Virtual directory
-
Terminal server
-
Remote access
Question 69
Question
After you create a virtual server in Hyper-V and install the operating system, you then need to install __________________ so that the virtual server can run more efficiently.
Question 70
Question
Which protocol is used to send out email?