Pregunta 1
Pregunta
Why would you use multicasting for WDS?
Respuesta
-
It requires less space on the client system
-
It decreases deployment time
-
It supports IPv6 and DHCPv6
-
It minimizes network traffic
Pregunta 2
Pregunta
What two things should you check if a particular client is having problems downloading and installing software?
Respuesta
-
local policy and the update schedule
-
group policy and the update schedule
-
local policy and the Windows Update log
-
group policy and the Windows Update log
Pregunta 3
Pregunta
What single performance indicator can tell you if your CPU is over capacity and needs to be replaced?
Respuesta
-
Disk Queue Length
-
Paging File % Usage
-
Physical Disk Time
-
Processor Time
Pregunta 4
Pregunta
What is the primary difference between domain-based namespace and stand-alone namespace?
Respuesta
-
Where the namespaces are stored
-
The names given to namespaces
-
The number of servers participating in the namespace
-
The requirement for at least one Windows Server 2008 system
Pregunta 5
Pregunta
By default, where are storage reports saved?
Pregunta 6
Pregunta
If you’re a command-line user, what command will encrypt files and folders?
Respuesta
-
encrypt.exe
-
compress.exe
-
cipher.exe
-
efs.exe
Pregunta 7
Pregunta
Which utility do you use to access advanced audit policy settings?
Respuesta
-
Local Policy Editor
-
Group Policy Editor
-
Domain Policy Editor
-
Schema Policy Editor
Pregunta 8
Pregunta
What is the major reason behind using a forwarder?
Respuesta
-
To decrease client DNS lookups outside your network
-
To improve the efficiency of name resolution for your computers
-
So that your servers only perform recursive queries
-
To justify the use of multiple DNS server layers
Pregunta 9
Pregunta
Before creating PTR records, what DNS objects should you create?
Respuesta
-
reverse lookup zones
-
CNAME records
-
SOA records
-
NS records
Pregunta 10
Pregunta
Which Windows Server 2012 R2 server role is useful to install the Web Application proxy for AD FS?
Respuesta
-
AD FS
-
Remote Access
-
Remote Desktop
-
Web Services
Pregunta 11
Pregunta
What does the netsh namespace show policy command do?
Respuesta
-
Shows the DNS search order
-
Displays the static routing table for a namespace
-
Shows the NRPT rules are configured on the policy
-
Displays local direct access security policy
Pregunta 12
Pregunta
What process determines what a user is permitted to do on a computer or on a network?
Respuesta
-
access
-
authorization
-
authentication
-
permission
Pregunta 13
Pregunta
Identify the correct NPS templates. Select all that apply.
Respuesta
-
Shared Secrets
-
NPS Filters
-
Health Policies
-
RADIUS Clients
Pregunta 14
Pregunta
Which computers are not affected by VPN enforcement?
Pregunta 15
Pregunta
Identify another utility that you can use to add SPNs to an account.
Respuesta
-
setspn
-
spnedit
-
dnscmd
-
netsh
Pregunta 16
Pregunta
The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.
Pregunta 17
Pregunta
Which of the following ntdsutil commands cleans up metadata?
Respuesta
-
metadata defrag
-
metadata cleanup
-
metadata restore
-
metadata repair
Pregunta 18
Pregunta
Which of the following ntdsutil commands cleans up metadata?
Respuesta
-
metadata defrag
-
metadata cleanup
-
metadata restore
-
metadata repair
Pregunta 19
Pregunta
What is the secpol.msc utility used for?
Respuesta
-
editing group policies
-
editing local security policies
-
editing global security policies
-
editing domain-level policies
Pregunta 20
Pregunta
If a site, domain or OU has multiple GPOs, how are the group policies processed?
Pregunta 21
Pregunta
What are MST files used for?
Respuesta
-
They deploy customized software installation files
-
They are template files for software packages
-
They are custom patch files
-
They specialize in software installation test files
Pregunta 22
Pregunta
GPP can be configured on domain controllers running which version of Windows Server? Select all that apply.
Pregunta 23
Pregunta
What is a collection of files store in the SYSVOL (%SystemRood%\SYSVOL\<Domain>\Policies\<GPOCUID>) of each domain controller?
Pregunta 24
Pregunta
To give someone permission to manage a particular GPO, you use the [blank_start]Delegate[blank_end] tab of the individual GPO.
Respuesta
-
Delegate
-
Permissions
-
Security
-
Settings
Pregunta 25
Pregunta
Which domain users are automatically granted permissions to perform Group Policy Management tasks?
Respuesta
-
local administrators
-
power users
-
domain administrators
-
domain users
Pregunta 26
Pregunta
Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files?
Respuesta
-
.ini
-
files
-
folders
-
environment
Pregunta 27
Pregunta
Which items can you configure shortcuts to in performing GPP deployments? Select all that apply.
Respuesta
-
Windows Firewall applet
-
Documents folder
-
Microsoft Excel
-
Printer
Pregunta 28
Pregunta
Which utility do you use to create GPO preferences?
Pregunta 29
Pregunta
Which component allows you to create multiple Registry preference items based on registry settings that you select?
Pregunta 30
Pregunta
When working with Network Drive Mapping Preferences, which preference behaviours delete drive mappings? Select all that apply.
Respuesta
-
Create
-
Replace
-
Update
-
Delete
Pregunta 31
Pregunta
To copy, replace, update, or delete files, you can use wildcard characters. Which wildcard characters can you use? Select all that apply.
Pregunta 32
Pregunta
Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply.
Respuesta
-
If they've become corrupted
-
If someone deleted one of the policies
-
To refresh policy settings
-
As a regular part of domain maintenance and housekeeping
Pregunta 33
Pregunta
If you don't want a GPO to apply, which group policy permission do you apply to a user or group?
Respuesta
-
Disallow Apply
-
Disallow Read
-
Disallow Write
-
Disallow Modify
Pregunta 34
Pregunta
Which of the following is the most efficient method of using WDS on a very large network?
Respuesta
-
Unattended installation using bootable media
-
Bootable media using discover images
-
Unattended installation using PXE boot
-
Installation using PXE boot
Pregunta 35
Pregunta
What two things should you check if a particular client is having problems downloading and installing updates?
Respuesta
-
Local policy and update schedule
-
Group policy and update schedule
-
Local policy and the windows update log
-
Group policy and the windows update log
Pregunta 36
Pregunta
The event viewer is essentially what kind of tool?
Respuesta
-
Registry cleanup
-
Conflict resolver
-
Log viewer
-
Performance monitor
Pregunta 37
Pregunta
When should you increase the default quota size for the staging folder?
Respuesta
-
When the staging folder approaches 90% capacity
-
When bandwidth is available
-
When you have multiple large files that change frequently
-
When replication queues back up for more than two hours
Pregunta 38
Pregunta
What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files?
Respuesta
-
Storage reports
-
Storage Exceptions
-
Storage Quotas
-
Storage Assessment
Pregunta 39
Pregunta
Public-key cryptography uses how many keys?
Pregunta 40
Pregunta
Why are success audits as important as failure audits?
Respuesta
-
Successes are important to troubleshooting for establishing baselines of normal behaviour
-
Successes are included by default and can be filtered out
-
Successes can point to security breaches as well as normal behaviour
-
Successes allows you to track activity such as a new account creation
Pregunta 41
Pregunta
Why would you implement a caching-only DNS server on your network?
Respuesta
-
To speed DNS queries and decrease networking traffic
-
To avoid installing and configuring a full-blown DNS server
-
To reduce the amount of maintenance for administrators
-
To reduce complexity in a network environment
Pregunta 42
Pregunta
If you issue the command nslookup 192.168.1.50 and got no response, but then issue nslookup server1 and receive 192.168.1.50 ?
Respuesta
-
The CNAME record is incorrect
-
The PTR record doesn’t exist
-
The A record doesn’t exits
-
The SOA for the zone is malformed
Pregunta 43
Pregunta
What is the first thing to check when troubleshooting VPN problems?
Respuesta
-
Network connectivity
-
Usernames and passwords
-
DNS lookups
-
Firewall settings
Pregunta 44
Pregunta
Which one of the Remote Access Management interfaces gives you the most control?
Respuesta
-
The Run the Remote Access Setup Wizard
-
The Run the Getting Started Wizard
-
The Remote Access Management Console
-
The command line dnsmcd.exe command
Pregunta 45
Pregunta
What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?
Respuesta
-
A RADIUS proxy server
-
A RADIUS engine server
-
A ARDIUS client server
-
A RADIUS relay server
Pregunta 46
Pregunta
RADIUS Access-Request message are processed and forwarded by NPS only if the settings of the incoming message match what on the NPS server?
Respuesta
-
One of the connection request policies
-
The time zone of the requestor
-
The client type of the requestor
-
The TCP/IP port of the requestor
Pregunta 47
Pregunta
Health policies are connected to what two policies?
Pregunta 48
Pregunta
What type of account is an account under which operating system, process, and service runs?
Respuesta
-
User
-
System
-
Service
-
Network
Pregunta 49
Pregunta
What two things must you do to a Windows Server to convert it to a domain controller?
Pregunta 50
Pregunta
Why can you not modify snapshots?
Pregunta 51
Pregunta
By default, who has read/write capability to the Default Domain Policy?
Respuesta
-
Local administrators
-
Power users
-
Domain users
-
Domain administrators
Pregunta 52
Pregunta
GPO are processed on computer start up and after logon. Why is the user never aware of the processing?
Respuesta
-
Processing is hidden from the users
-
The user is too busy to be aware of to the processing
-
The processing occurs when the system is not being used
-
The user is aware of the only startup delays
Pregunta 53
Pregunta
What is the central Store?
Respuesta
-
An App store from which you can deploy GPO
-
A public share that allows users to place GPO request into a queue
-
A repository for Administrative Templates
-
An online App Store for Administrative Templates
Pregunta 54
Pregunta
Where do you place a discover image to ensure proper deployment?
Pregunta 55
Pregunta
What two ways can you assign computers to groups in WSUS?
Respuesta
-
Client-side and Server-side targeting
-
Upstream and Downstream targeting
-
Client-side and Upstream targeting
-
Downstream and Distributed targeting
Pregunta 56
Pregunta
You have a centralized file server and a remote file server. You want to configure DFS replication between the two servers so that you can perform backups with the centralized file server. You started to perform DFS replication but determine that it will take weeks for the initial replication to occur. How can you speed up the initial replication?
Respuesta
-
Configure the replication to use full speed
-
Assign two NICs to the site server
-
Ship a disk with the files, preseed the files, clone the database from the remote file server, and import the database into the centralized file server
-
Copy the files manually from the site server to the centralized file server
Pregunta 57
Pregunta
Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of many audit subsettings?
Pregunta 58
Pregunta
Which one of the following is an example of an FQDN?
Pregunta 59
Pregunta
A Start of Authority record specifies what kind of information about a zone?
Pregunta 60
Pregunta
Why are phone lines and ISDN not used today for remote access services (RAS)?
Respuesta
-
They no longer supply acceptable bandwidth
-
They create dedicated access
-
They’re not secure enough
-
They’re too expensive
Pregunta 61
Pregunta
Which one of the following operating systems may not act as a DirectAccess client?
Respuesta
-
Windows 7 Enterprise
-
Windows Server 2008
-
Windows Server 2008 R2
-
Windows 8
Pregunta 62
Pregunta
Using what feature can streamline the creation and setup of RADIUS servers?
Respuesta
-
build guidelines
-
documentation
-
templates
-
wizards
Pregunta 63
Pregunta
The default connection request policy uses NPS as what kind of server?
Respuesta
-
DNS
-
Active Domain controller
-
RADIUS
-
RRAS
Pregunta 64
Pregunta
What is the purpose of the System Health Agent (SHA)?
Respuesta
-
To provide feedback to the system for CPU, memory, and disk health
-
To provide feedback to the Security Health Validator (SHV)
-
To provide feedback on the status of system protection and updates
-
To provide feedback on overall critical performance to a central collector
Pregunta 65
Pregunta
NTLM uses a challenge-response mechanism for authentication without doing what?
Respuesta
-
Revealing the client’s operating system to the server
-
Revealing the protocol to the server
-
Sending a password to the server
-
Sending an encrypt/decrypt message to the server
Pregunta 66
Pregunta
When you add attributes to an Active Directory object, what part of the domain database are you actually changing?
Respuesta
-
FSMO
-
Schema
-
Directory Structure
-
Organizational Units
Pregunta 67
Pregunta
If a single domain controller’s AD database becomes corrupt, which types of restore should you perform on it?
Respuesta
-
authoritative
-
nonauthoritative
-
explicit
-
full
Pregunta 68
Pregunta
The default maximum password age is how long?
Respuesta
-
12 days
-
36 days
-
42 days
-
86 days
Pregunta 69
Pregunta
Which utility do you use to set up loopback policies?
Pregunta 70
Pregunta
What is an Active Directory object stored in the Group Policy Objects container with the domain naming content of the directory that defines basic attributes of the GPO but does not contain any of the settings?
Pregunta 71
Pregunta
What object can you create to organize Registry preference items?
Respuesta
-
A Collection
-
A file system folder
-
A Control Panel applet
-
An OU
Pregunta 72
Pregunta
To convert a discover image to a bootable ISO image, what non-included component do you need to download and install?
Respuesta
-
Windows Assessment and Deployment Kit (ADK)
-
Windows Application Programming Interface (API)
-
Windows Public Key Infrastructure(PKI)
-
Windows Software Development Kit(SDK)
Pregunta 73
Pregunta
You work for an organization that has a mix of Windows 7,Windows 8, and Windows 8.1 computers. You will be using WSUS to deploy Microsoft updates to those computers. What is the number of computer groups required for the updates?
Pregunta 74
Pregunta
What can Task Manager tell you about performance?
Respuesta
-
That you might have a bottleneck
-
That you need to reboot the system
-
That you need a larger hard drive
-
That your system needs to be replaced
Pregunta 75
Pregunta
If you want to save on CPU and disk I/0 but consume more network bandwidth for replication, which DFS feature can you disable?
Respuesta
-
Remote differential compression (RDC)
-
Collective compression technology (CCT)
-
Shortest path replication (SPR)
-
Server-to-server replication compression (S2SRC)
Pregunta 76
Pregunta
What effect does using quotas in File Server Resource Manager have?
Respuesta
-
It limits the number of files allocated to a user
-
It limits the number of access licenses allotted to a server
-
It limits the number of drive mappings to a shared resource
-
It limits the number of gigabytes allocated to a volume or folder
Pregunta 77
Pregunta
An encrypted file can be converted back to its original format by a process known as what?
Respuesta
-
Encryption
-
Digitization
-
Decryption
-
Encapsulation
Pregunta 78
Pregunta
What command do you use to manage auditing at the command prompt?
Respuesta
-
Auditpol.exe
-
Adpolicy.exe
-
Audit.exe
-
Policy.exe
Pregunta 79
Pregunta
What is the first and most important step in installing and deploying DNS in your network?
Respuesta
-
Planning the infrastructure and service requirements
-
Setting up an AD so that DNS can be integrated into it
-
Configuring the forward and reverse lookup zones correctly
-
Splitting the network into subdomains
Pregunta 80
Pregunta
If you have a server named server1.blah.com, want to use it as your web server, and have requests point to www.blah.com, what kind of DNS record would you create?
Respuesta
-
A CNAME record
-
An A record
-
A PTR record
-
An NS record
Pregunta 81
Pregunta
Why would you set verify Caller ID on a remote dial-up connection for a user?
Respuesta
-
For enhanced security
-
Because you don’t trust the user
-
Because you want users to call in only from specific numbers
-
Because it’s the default setting
Pregunta 82
Pregunta
What is the best reason for deploying DirectAccess connectivity for remote users?
Respuesta
-
Remote users computers can be easily managed and kept up to date
-
Remote users computers connect automatically
-
Remote computers connect via encrypted links over the internet
-
Remote users can access corporate resources
Pregunta 83
Pregunta
What is the final step in the authentication, authorization and accounting scenario between an access client and the RADIUS server?
Respuesta
-
An accounting-response to the access server
-
A log entry that the connection is established
-
An access-reject message to the access server
-
A final credential check with the domain controller
Pregunta 84
Pregunta
To what type of file do you export an NPS configuration?
Pregunta 85
Pregunta
What happens to a computer that isn’t running Windows Firewall?
Pregunta 86
Pregunta
What are the two restrictions for adding SPNs to an account?
Respuesta
-
Domain Administrators privileges
-
Full control permissions for the folder
-
Local administrator privileges
-
The editor runs from the domain controller
Pregunta 87
Pregunta
Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?
Respuesta
-
ADPrep /RODCPrep
-
Netdom /RODCPrep
-
Netsh /RODCPrep
-
Ntdsutil /RODCPrep
Pregunta 88
Pregunta
What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory controllers and objects?
Respuesta
-
The Active Directory Recycling Bin
-
The Active Directory Lost and Found Folder
-
The Active Directory Undelete utility
-
Active Directory Snapshots
Pregunta 89
Pregunta
How should you assign Password Settings Object(PSOs) to users?
Respuesta
-
Assign the PSOs to a global security group and add users to the group
-
Assign the PSOs to a new group and add the users to the new group
-
Assign the PSOs directly to individual users
-
Assign the PSOs to various Active Directory groups as needed
Pregunta 90
Pregunta
What is the default timeout value for GPOs to process on system startup?
Respuesta
-
600 seconds
-
300 seconds
-
120 seconds
-
60 seconds
Pregunta 91
Pregunta
Which of the following are legitimate Administrative Template Property Filters? Select all that apply?
Respuesta
-
Keyword Filters
-
Requirements Filters
-
Security Filters
-
Operating System Filters
Pregunta 92
Pregunta
21. To give someone permission to manage to particular GPO, you use the [blank_start]Delegation[blank_end] tab of the individual GPO?
Respuesta
-
Delegation
-
Security
-
Settings
-
Permissions
Pregunta 93
Pregunta
To copy, replace, upload, or delete files, you can use wildcard characters. Which wildcard characters can you use?
Pregunta 94
Pregunta
Which feature allows you to add driver packages to WDS and then deploy them?
Respuesta
-
dynamic driver provisioning
-
dynamic image provisioning
-
dynamic package provisioning
-
dynamic service provisioning
Pregunta 95
Pregunta
Other than the default computer group, how many other groups may a computer be assigned to in WSUS?
Pregunta 96
Pregunta
Resource Monitor is a powerful tool for understanding how your system resources are used by what two system consumers?
Respuesta
-
services and processes
-
handles and services
-
files and processes
-
processes and handles
Pregunta 97
Pregunta
Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration?
Respuesta
-
meshless
-
hub/spoke
-
token ring
-
collective mesh
Pregunta 98
Pregunta
When using File System Resource Manager, which group must you be a member of to enable SMTP?
Respuesta
-
Administrators
-
Domain Users
-
Schema Admins
-
Power Users
Pregunta 99
Pregunta
Where can you view audit events?
Respuesta
-
In security logs in Event Viewer
-
In the C:\Temp\Logs folder as text file
-
In System logs in Event Viewer
-
By using audit /logs at the command line
Pregunta 100
Pregunta
What is one of the primary advantages to using Active Directory to store DNS information?
Respuesta
-
Fault tolerance
-
Zero configuration
-
Low maintenance
-
Reverse zone lookups
Pregunta 101
Pregunta
Which command do you use to verify local DNS settings?
Pregunta 102
Pregunta
Of the four VPN tunneling protocols, which has the weakest encryption?
Pregunta 103
Pregunta
What does the acronym ISATAP stand for?
Respuesta
-
Intra-Site Automatic Tunneling Address Protocol
-
Industry Standard Architecture Tunnel Access Protocol
-
Industry Standard Architecture Tunnel Addressing Protocol
-
Inter-Site Automated Tunnel Addressing Protocol
Pregunta 104
Pregunta
Which system is the destination for Accounting-Start messages?
Pregunta 105
Pregunta
Which two of the following are Routing and Remote Access IP settings?
Respuesta
-
Client May Request an IP Address
-
Server Must Supply an IP Address
-
Server Must Request an IP address
-
Client Must Supply an IP address
Pregunta 106
Pregunta
Which of the following is the format for a virtual account used with Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?
Respuesta
-
NT Service\servicename
-
Domainname\servicename
-
Computername\servicename
-
NT Servie\servicename$
Pregunta 107
Pregunta
What utility must you run on a cloned system to ensure that the clone receives its own SID?
Respuesta
-
sysprep
-
adprep /renew
-
dcpromo
-
ntconfig
Pregunta 108
Respuesta
-
A unique identifier for a snapshot
-
A special file permission
-
An Active Directory object ID
-
A group-user ID in Active Directory
Pregunta 109
Pregunta
By default, who has read/write capability to the Default Domain Policy?
Respuesta
-
Domain administrators
-
Domain users
-
Power users
-
Local administrators
Pregunta 110
Pregunta
The downward flow of group policies is known as what feature of GPOs?
Respuesta
-
Cumulative processing
-
Inherent processing
-
Inheritance
-
Control
Pregunta 111
Pregunta
Where is the default location for ADMX files?
Pregunta 112
Pregunta
How do you stop processing a preference if an error occurs?
Respuesta
-
Select the Stop processing items option on the Common tab
-
Select the Remove this item option on the Common tab
-
Select the Stop on any error option in the CPP Wizard
-
Select the Stop on all errors option in the GPP Wizard
Pregunta 113
Pregunta
Where in a system do you configure PXE?
Respuesta
-
BIOS
-
Windows PE
-
Dism
-
Sysprep
Pregunta 114
Pregunta
What critical steps you should perform before applying patches or updates?
Pregunta 115
Pregunta
If you install SQL Server and third-party backup service on the same system, what rule should you follow when creating service accounts?
Respuesta
-
Use separate accounts for both services
-
create difficult-to-guess usernames and passwords
-
add the service accounts to the local administrator groups
-
Use a single account for both services
Pregunta 116
Pregunta
What type of special cache folder does each replication folder use to hold files ready to be replicated?
Respuesta
-
Staging folder
-
Replication folder
-
Upload folder
-
Cache folder
Pregunta 117
Pregunta
What is the purpose of setting soft quotas?
Respuesta
-
To notify users when they have reached the quota limits
-
To list files that need to be deleted
-
To identify users who violate quotas
-
To determine where hard quotas need to be set
Pregunta 118
Pregunta
Encryption is the process of converting data into what kind of format?
Respuesta
-
Unreadable
-
Compiled
-
Hidden
-
Non-functional
Pregunta 119
Pregunta
Why should you avoid using basic audit policy settings and advanced audit policy settings together?
Respuesta
-
Audit policies might cause conflicts or erratic behaviour
-
Setting too many policies can put your system in an “out of compliance” state
-
The two audit settings ranges have too much redundancy or overlap between them
-
The amount of auditing will fill up event logs to quickly
Pregunta 120
Pregunta
A specific, individual computer or other network device in a domain is known as what?
Respuesta
-
Host
-
Top-level system
-
Entity
-
Server
Pregunta 121
Pregunta
You can use the dnscmd command to create zones. What other tasks can you perform with it?
Pregunta 122
Pregunta
You would create a RADIUS template so that you can do what with it?
Respuesta
-
Easily create multiple RADIUS servers from it
-
Consistently create multiple RADIUS servers from it
-
Create RADIUS servers without affecting the functionality of NPS
-
Apply it to the select servers
Pregunta 123
Pregunta
What is the last setting in the Routing and Remote Access IP Settings?
Respuesta
-
How IP addresses are assigned
-
The number of assigned IP Addresses
-
Which DHCP server will supply the requests
-
Which NPS server to connect to
Pregunta 124
Pregunta
What type of protocol is Kerberos?
Respuesta
-
A secure network authentication protocol
-
A simple Microsoft-only protocol
-
A uni-directional authentication protocol
-
A certification-based authentication protocol
Pregunta 125
Pregunta
What version of Windows Server introduced incremental universal group membership replication?
Pregunta 126
Pregunta
What is the purpose procedure for removing a domain controller from active directory?
Respuesta
-
Shut down the domain controller and manually remove it from AD
-
Uninstall Active Directory Domain Services
-
Use dcpromo to demote the domain controller
-
Enter the DSRM and delete Active Directory
Pregunta 127
Pregunta
Account Policies contain various subnets. Which one of the following are legitimate subnet of account policies. Choose all that apply?
Respuesta
-
Password Policy
-
Account Lockout Policy
-
Kerberos Policy
-
Username Policy
Pregunta 128
Pregunta
What is the best method of dealing with slow-link processing?
Respuesta
-
Changing the slow-link policy processing behaviour
-
Placing a read-only domain controller at the slow-link site
-
Disabling GPO processing for slow-link systems
-
Increasing the link bandwidth above 5000 kbps
Pregunta 129
Pregunta
The security template allows you to configure which of the following settings? Choose all that apply
Respuesta
-
System Services
-
Registry Permissions
-
File System Permissions
-
Registry Entries
Pregunta 130
Pregunta
If you don’t want a GPO to apply, which group policy permission do you apply to a group or user?
Respuesta
-
Disallow Apply
-
Disallow Modify
-
Disallow Write
-
Disallow Read
Pregunta 131
Pregunta
Windows Settings has multiple preference extensions. Identify all that apply.
Respuesta
-
Registry
-
Shortcuts
-
Folders
-
Storage
Pregunta 132
Pregunta
What Microsoft tool do you use to create and manage Windows setup answer files?
Respuesta
-
System Image Manager (SIM)
-
Deployment Image Servicing and Managing (Dism.exe)
-
System Preparation utility (Sysprep.exe)
-
Windows Preinstallation Environment (Windows PE)
Pregunta 133
Pregunta
Which of the following is the proper method of starting the Windows Update service?
Respuesta
-
net start wuauserv
-
net start wsusrv
-
service start suauserv
-
service start wsusrv
Pregunta 134
Pregunta
When you set a service to start automatically with delayed start, how long is the delay?
Pregunta 135
Pregunta
What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?
Respuesta
-
File Screening
-
Windows Defender
-
Quotas
-
Windows Firewall
Pregunta 136
Pregunta
From a security standpoint, which BitLocker operational mode is most secure?
Respuesta
-
TPM + startup key
-
TPM + startup PIN
-
Startup key only
-
TPM only
Pregunta 137
Pregunta
Auditing is used for what purpose?
Pregunta 138
Pregunta
What type of structure does DNS have?
Respuesta
-
Hierarchical distributed
-
Flat distributed
-
Top-down distributed
-
Wheel-spoke distributed
Pregunta 139
Pregunta
What does Time to Live (TTL) mean in DNS parlance?
Respuesta
-
The length of time a record remains in DNS cache
-
The length of time it takes a DNS query to process
-
The length of time required to process an iterative query
-
The length of time between zone updates
Pregunta 140
Pregunta
DirectAccess was introduced with which workstation/server pair?
Respuesta
-
Windows 7/Windows Server 2008 R2
-
Windows XP/Windows Server 2003
-
Windows Vista/Windows Server 2008
-
Windows 8/Windows Server 2012
Pregunta 141
Pregunta
Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?
Respuesta
-
Priority
-
Relay link number
-
Weight
-
Precedence
Pregunta 142
Pregunta
To which type of file do you export an NPS configuration?
Pregunta 143
Pregunta
Which two components must a NAP client have enabled in order to use NAP?
Respuesta
-
Security Centre
-
NAP Agent
-
Windows Update
-
DHCP client
Pregunta 144
Pregunta
What is the name by which a client uniquely identifies an instance of a service?
Respuesta
-
service principal name
-
service instance name
-
service account name
-
service provider name
Pregunta 145
Pregunta
Where are you most likely to see a Read-Only Domain Controller (RODC)?
Pregunta 146
Pregunta
By default, how often does Active Directory “garbage collection” occur?
Respuesta
-
Every 12 hours
-
Every 45 mins
-
Every 2 hours
-
Every 6 hours
Pregunta 147
Pregunta
What is an easy method of creating a strong password?
Respuesta
-
Start with a sentence and then add numbers and special characters
-
As a friend for some ideas for good passwords and then add your own number and characters
-
Use your favorite football team name with numbers and special characters
-
Use your username and add numbers and special characters.
Pregunta 148
Pregunta
What is the primary purpose of running the Group Policy Results Wizard? Select all that apply.
Respuesta
-
To analyze the cumulative effect of GPOs
-
For GPO troubleshooting
-
To guarantee that GPOs are enforced in full
-
To ensure that you have administrative rights to the client computer
Pregunta 149
Pregunta
Which of the following are legitimate Administrative Template Property Filters? Select all that apply.
Respuesta
-
Keyword Filters
-
Requirements Filters
-
Security Filters
-
Operating System Files
Pregunta 150
Pregunta
GPPs are divided into which two sections?
Respuesta
-
Windows and Control Panel
-
Applications and Control Panel
-
Applications and Registry
-
Windows and Registry
Pregunta 151
Pregunta
Why would you use multicasting for WDS?
Respuesta
-
It minimizes network traffic
-
It requires less space on the client system
-
It decrease deployment time
-
It supports IPV6 and DHCPv6
Pregunta 152
Pregunta
WSUS can retrieve updates directly from Microsoft or from what other sources?
Respuesta
-
Another WSUS server on your network
-
a secondary Microsoft Windows Update location
-
the original Windows installation media
-
a public FTP site
Pregunta 153
Pregunta
When troubleshooting services on your system, why might you want you want to start up in Safe mode?
Respuesta
-
Because the system starts only the core services
-
Because the system gives you limited rights
-
Because the system loads a minimal set of drivers
-
Because the system boots with a lower screen resolution
Pregunta 154
Pregunta
What is the default quota size of the conflict and deleted folder?
Respuesta
-
660 MB
-
500 MB
-
800 MB
-
1250(1.25 GB)
Pregunta 155
Pregunta
When storage space is at a premium, what should you do to ensure that everyone has enough space?
Respuesta
-
Set up hard quota limits with email notification
-
Set up very restricted soft quota for users with email notification
-
Set up file groups so that users can’t save very large files
-
Set up a soft quota limits with no notification
Pregunta 156
Pregunta
What key length is considered to be minimally strong for encryption algorithms?
Pregunta 157
Pregunta
By using what type of policy can you track, limit or deny a user’s ability to use removable storage devices such as a USB in Windows 2012?
Respuesta
-
Removable Device Access
-
Storage Device Audit
-
Removable Storage Access
-
USB Storage Access
Pregunta 158
Pregunta
Which TCP/UPD port does the DNS Server use to communicate?
Pregunta 159
Pregunta
What term is defined as private data placed in a packet with a header containing routing information that allows the data to traverse a transit network, such as the Internet?
Respuesta
-
Encapsulation
-
Routing
-
VPN
-
Tunneling
Pregunta 160
Pregunta
What utility do you use to configure DirectAccess?
Pregunta 161
Pregunta
What information does the Accounting-Start message contain?
Respuesta
-
The type of service and the users it is delivered to
-
The RADIUS server name and IP address
-
The list of permissions granted to the user
-
The list of service provided to RADIUS access servers
Pregunta 162
Pregunta
What command-line utility is used to import and export NPS templates?
Respuesta
-
Netsh
-
Dnscmd
-
Msconfig
-
Net
Pregunta 163
Pregunta
Why do you need a web server as part of your NAP remediation infrastructure?
Respuesta
-
To provide internet access to users who fail compliance
-
To provide user information in case of a compliance failure
-
To redirect user request for restored network access
-
To further access how far out of compliance a user system is
Pregunta 164
Pregunta
When creating accounts for operating systems, processes, and services, you should always configure them with?
Pregunta 165
Pregunta
How many global catalogs are recommended for every organization?
Respuesta
-
At least two
-
At least one
-
At least three
-
No fewer than four
Pregunta 166
Pregunta
Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature?
Pregunta 167
Pregunta
Which aspect of passwords is a key component of their strength?
Respuesta
-
Number of characters
-
Easy to remember
-
Dictionary basis
-
Keyboard complexity
Pregunta 168
Pregunta
What is an ADMX file?
Pregunta 169
Pregunta
When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the chance?
Respuesta
-
That all User Rights Assignments will be replaced
-
That you’re about to reset policies to their defaults
-
That all security for all the domain will be overwritten
-
That you’re about to restore all security to the default
Pregunta 170
Pregunta
Which Windows extension allows you to copy registry settings and apply them to other computers create, replace, or delete registry settings?
Respuesta
-
Registry
-
Applications
-
Environment
-
Files