Windows L1
Windows L1
1. What is the GUI tool used to build the UNATTEND.TXT file included with the
Windows 2000 Resource Kit?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE
Answer: A
Answer: C
Answer: D
Answer: B
Answer: B
Answer: A
Answer: E
8. Which of the following categories for UTP has the least expensive cable?
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: C
Answer: A
Answer: D
Which of the following operating systems is designed for servers used in a large
enterprise network?
11.
A. Windows 2000 Client
B. Windows 2000 Workstation
C. Windows 2000 Server
D. Windows 2000 Advanced Server
E. Windows 2000 Enterprise Server
Answer: D
Answer: A
Answer: C
14.Which of the following IRQs are used for the CMOS/real-time clock?
A. 0
B. 2
C. 4
D. 6
E. 8
Answer: E
Answer: B
16.Which of the following IRQs are used for the CMOS/real-time clock?
A. 0
B. 2
C. 4
D. 6
E. 8
Answer: E
Answer: B
Answer: A
Answer: D
Answer: E
Answer: B
22. Which of the following companies developt ODI (there are two)?
A. Apple
B. Intel
C. Microsoft
D. Novell
E. 3Com
Answer: A and D
23. Which standard divides the data link layer into the LLC and the MAC
sublayers?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
E. 802.5
Answer: B
Answer: E
Answer: A
Answer: B
27. Which of the following IRQs are used for the secondary IDE controller?
A. 11
B. 13
C. 15
D. 17
E. 19
Answer: C
28. Both Windows 2000 and Windows NT support file system encryption.
A. TRUE
B. FALSE
Answer: b
Answer: E
Answer: B
Answer: A
Answer: D
33. Which of the following network devices sends packets from a central point
based upon MAC addresses?
A. Repeater
B. Switch
C. Bridge
D. Router
E. Gateway
Answer: B
Answer: A
Answer: A and B
Answer: D
37. What is the minimum hard disk space required for Windows NT Workstation
4?
A. 90MB
B. 110MB
C. 250MB
D. 300MB
E. 643MB
Answer: B
Answer: B
39. Which of the following media has the highest EMI?
A. UTP
B. STP
C. Coaxial cable (thin)
D. Radio
E. Microwave
Answer: D
40. Windows 2000 can act as a RADIUS client, a RADIUS server, or both.
A. TRUE
B. FALSE
Answer: A
Answer: C
Answer: C
43. You want to provide search capabilities to the browsers of your Web
site.Which IIS service provides this feature?
A. NNTP
B. Mail Server
C. Index Server
D. Transaction Server
Answer: C
Answer: C
Answer: A
46. Which are the IIS services that can use SSL communication?(Choose 3).
A. News
B. Mail
C. WWW
D. FTP
Answer: A, B and C
47. You want to see if any broken links are there in your Web site.Which tool do
you use?
A. NT Explorer
B. Site Server Express
C. User Manager
D. Performance Monitor
Answer: B
48. You have a Corpus of 100 MB.What would be the approximate disk space
required to index these documents?
A. The disk space required to index the documents is roughly 22% of the
Corpus.
B. The disk The disk space required to index the documents is roughly 40% of
the Corpus.
C. The disk space required to index the documents is roughly 60% of the
Corpus.
D. The disk space required to index the documents is roughly 80% of the
Corpus.
Answer: B
49. You are hosting a Web Site which contain some Web pages using Perl
Script.You find that none of the users are able to see Web pages which
contain Perl script.What is the likely cause?
A. Perl interpreter which gets installed as part of IIS4.0, needs to be pointed by
modifying the Properties of Scripts folder.
B. You can not use Perl Scripts on Microsoft Web Server.Microsoft Web server
doesn't support it.
C. You need to install Perl interpreter on the Web Server.
D. Perl interpreter needs to be installed as plug-in on all client machines.
Answer: C
50. When connecting IIS to an external data source through ODBC (Open Data
Base Connector), which type of ODBC DSN must be specified?
A. System
B. File
C. Server
D. User
Answer: A
Answer: A and B
Answer: B
Answer: B
Answer: D
Answer: E
Answer: D
58.Write the name of layer of the OSI model that maintains a connection
between nodes?
A. Transport Layer
B. Session Layer
C. Physical Layer
D. Network Layer
E. Data Link Layer
Answer: B
Answer: C
Answer: A
Answer: C
Answer: A
63.What is the another name for Raid 1?
A. Stripping
B. Mirroring
C. Hot swappable
D. Warm swappable
E. Redudant disks
Answer: B
Answer: C
65.If you are planning a dual boot system which will boot either Windows
95 or Windows 2000 Professional, which operating system should be
loaded first?
A. Windows 95
B. Windows 2000
C. They may be loaded in any order
D. Dual booting is not supported for Windows 95 and Windows 2000
E. Dual booting is not supported for Windows 2000
Answer: A
66.To specify a batch file to be run after the GUI part of the installation
using WINNT, use the (?) parameter.
A. /B
B. /C
C. /E
D. /P
E. None of the above
Answer: C
Answer: D
Answer: C
Answer: C
ans: E
Answer: A
Answer: D
Answer: C
Answer: B
Answer: B
77.In an OEM directory structure, the equivalent to the root drive on which
Windows 2000 will be installed is called-
A. \$root$
B. \$$
C. \$1
D. \$winnt$
E. \$winnt32$
Answer: B
Answer: B
Answer: A and B
Answer: B
Answer: E
82. When WINNT is invoked with the /s: parameter, and alternate path for
Windows 2000 (?) is defined.
A. Distribution files
B. Temporary files
C. Answer files
D. Post installation batch files
E. None of the above
Answer: A
83. Which IEEE standard defines internetworking and the OSI model?
A. 802.1
B. 802.2
C. 802.3
D. 802.4
E. 802.5
Answer: A
Answer: B
85. A network where each workstation can make resources available (ie files
and printers) to any other workstation is called as?
A. LAN
B. Star
C. peer-to-peer
D. client/server
E. WAN
Answer: C
86. What is the minimum hard disk space required for Windows NT Server 4?
A. 110MB
B. 124MB
C. 250MB
D. 500MB
E. 700MB
Answer: B
Answer: C
Answer: E
Answer: A
Answer: B
91. When using WINNT32, to define an alternative path to the Windows 2000
distribution files, which parameter is used?
A. /A
B. /M
C. /P
D. /S
E. None of the above
Answer: B
Answer: B
93. he acronym UDF, when used with an unattended installation, stands for?
A. Unattended Database File
B. Unique Default File
C. Uniform Database Format
D. Unified Definition File
E. Uniqueness Database File
Answer: E
94. The Network Connection Wizard allows you to set up virtual private
networks.
A. TRUE
B. FALSE
Answer: A
Answer: C
Answer: B
Answer: A
Answer: E
99. To configure RIS, the RIS host must also be a domain controller.
A. TRUE
B. FALSE
Answer: B
Answer: A or B
101.
A. NetBEUI
B. NetBIOS
C. NDOS
D. PPP
E. SLIP
Answer: A
Answer: A
Answer: E
Answer: d
105. When using SYSPREP, the base computer must not be a member
of a domain.
A. TRUE
B. FALSE
Answer: A
Answer: E
107. he GUI tool used to build the UNATTEND.TXT file included with the
Windows 2000 Resource Kit is?
A. SETUPMGR.EXE
B. UNATTEND.EXE
C. PREBUILD.EXE
D. SYSLOAD.SYS
E. SETUP.EXE
Answer: A
Answer: A
Answer: D
Answer: A
Answer: C
Answer: E
113. SYSDIFF can be used even if the base and target computers are not
on the same version of Windows 2000 (or Windows NT).
A. TRUE
B. FALSE
Answer: B
Answer: C
Answer: D
116.
A.
Answer:
117. Select the proper Windows 2000 Server for the following configuration:
118. 12 CPUs
119. 32 GB RAM
120. to be used as a large-scale web site host
A. Windows 2000 Server
B. Windows 2000 Professional
C. Windows 2000 Advanced Server
D. Windows 2000 Datacenter Server
E. Windows 2000 NetManager
Answer: D
Answer: D
Answer: D
Answer: E
121. When WINNT32 is invoked with the /m: parameter, and alternate
path for Windows 2000 (?) is defined.
A. Distribution files
B. Temporary files
C. Answer files
D. Post installation batch files
E. None of the above
Answer: A
Answer: E
Answer: A
Answer: A
Answer: B
Answer: E
127. What should be download and run to check a system for Windows
2000 compatibilty?
A. Windows 2000 System Analysis Tool (SAT)
B. Windows 2000 Installation Preview
C. Windows 2000 Readiness Analyzer
D. Windows 2000 System Integrity Checker
E. None of the above
Answer: C
Answer: A
Answer: D
130. When using WINNT32, the file WINNT32.LOG is the default file name
for the parameter.
A. /DEBUG
B. /LOG
C. /RECORD
D. /RESPONSE
E. None of the above
Answer: A
131. What command displays messages, or turns command echoing on or
off.
Answer: ECHO
131. Which DOS command will display or modifies file types used in file
extension associations?
Answer: FTYPE
132. Which DOS command will display the name of or changes the current
directory?
Answer: CHDIR
Answer: ASSOC
Answer: PRINT
Answer: CONVERT
Answer: REM
Answer: MODE
138. Which DOS command will call one batch program from another?
Answer: CALL
Answer: CLS
141. What command moves one or more files from one directory to
another directory
Answer: MOVE
141. Which DOS command will create, change, or delete the volume
label of a disk?
Answer: LABEL
142. Which DOS command will compare two files or sets of files, and
displays the differences between them?
Answer: FC
Answer: IF
Answer: RD
145. Which DOS command will display or set the system time?
Answer: TIME
Answer: AT
Answer: DIR
Answer: GRAFTABL
149. Which DOS command will edit command lines, recalls Windows NT
commands, and creates macros?
Answer: DOSKEY
Answer: BREAK
Answer: ASSOC
152. Which DOS command will display the contents of a text file?
Answer: TYPE
153. Which DOS command will copy files and directory trees?
Answer: XCOPY
154. Which DOS command will shift the position of replaceable parameters
in batch files?
Answer: SHIFT
155. Which DOS command will search for a text string in a file or files?
Answer: FIND
156. Which DOS command will compare the contents of two files or sets of
files?
Answer: COMP
Answer: GOTO
158. Which DOS command will display output one screen at a time?
Answer: MORE
159. What command begins localization of environment changes in a batch
file.
Answer: SETLOCA
Set 2:
A)Compressed
B)Archived
C)Encapsulated
D)EncryptedYour selected option : D)Encrypted
Link: undefined
References: undefined
Question 2: What is the middle layer of the OSI reference model?
Option Available
A)Application
B)Session
C)Transport
D)Data LinkYour selected option : B)Session
Link: undefined
References: undefined
Question 3: Which IEEE standard defines internetworking and the OSI model?
Option Available
A)802.1
B)802.2
C)802.3
D)802.4Your selected option : B)802.2
Link: undefined
References: undefined
Question 4: Which ONE of the following is a transport-layer protocol?
Option Available
A)NetBEUI
B)NetBIOS
C)NDOS
D)PPPYour selected option : A)NetBEUI
Link: undefined
References: undefined
Question 5: What network evolved from the Defense Department's ARPANET?
Option Available
A)MILNET
B)ARP/RARP
C)TCP/IP
D)InternetYour selected option : A)MILNET
Link: undefined
References: undefined
Question 6: Which ONE of the following network device send packets from a central point based upon
MAC addresses?
Option Available
A)Repeater
B)Switch
C)Bridge
D)RouterYour selected option : B)Switch
Link: undefined
References: undefined
Question 7: Which IRQ has a standard function as the math coprocessor?
Option Available
A)10
B)11
C)12
D)13Your selected option : D)13
Link: undefined
References: undefined
Question 8: Which of the following media has the highest EMI?
Option Available
A)UTP
B)STP
C)Coaxial cable (thin)
D)RadioYour selected option : D)Radio
Link: undefined
References: undefined
Question 9: What is a MAC address in an Ethernet network?
Option Available
A)The address assigned by DHCP
B)A TCP/IP address
C)The physical address assigned by the NIC manufacturer
D)A logical address created by the network administratorYour selected option : C)The
physical address assigned by the NIC manufacturer
Link: undefined
References: undefined
Question 10: Which ONE of the following network device translates between data formats?
Option Available
A)Repeater
B)Switch
C)Bridge
D)GatewayYour selected option : D)Gateway
Link: undefined
References: undefined
Question 11: You are the administrator of a Windows 2003 network. Your network includes 75 Windows
XP Workstation computers. You are adding 50 new PXE-compliant computers to the network. The
hardware on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?
Option Available
A) Configure the network adapters of the portable computers to enable Internet Connection
Sharing (ICS).
B) Configure the network adapters of the portable computers to enable Automatic Private IP
Addressing (APIPA).
C) Add a script to the users desktops that changes the IP configuration between dynamic
and manual.
D) Configure the IP properties of the portable computers so that they have an alternate
configuration.Your selected option : D) Configure the IP properties of the portable computers
so that they have an alternate configuration.
Link: undefined
References: undefined
Question 15: You are the administrator of your company's network, which includes an Active Directory
domain. Your company hires Julie to help deploy Windows XP Professional to 200 new computers. You
create a new domain user account for Julie and add it to the Domain Users group. Julie is able to
perform the Windows XP Professional installation on the new computers, but she is unable to add the
computers to the Active Directory domain. She verifies that the computers are connected to the
network and that they are receiving IP configuration information from your company's DHCP server. You
need to ensure that Julie can add the new computers to the Active Directory domain. You also need to
ensure that Julie does not have any unnecessary security privileges on the network. What should you
do?
Option Available
A) Add Julies domain use account to the Server Operators domain user group.
B) Use the Delegation of Control Wizard to grant Julies domain user account the right to
create new objects in the computers container.
C) On a domain controller, use the Local Computer Policy MMC to add Julies domain user
account to the add workstations to domain user right policy.
D) Install the Active Directory users and computers MMC on Julies Windows XP Professional
computer. Add Julies domain user account top the domain Administrators domain user
group.Your selected option : A) Add Julies domain use account to the Server Operators domain
user group.
Link: undefined
References: undefined
Question 16: You are the network administrator for TestKing. The network consists of a single Active
Directory domain testking.com. All network servers run Windows Server 2003, and all client computers
run Windows XP Professional. TestKing includes a main office and several branch offices. You work in the
main office. A DNS server named TESTKING1 is located in one of the branch office. You need to perform
DNS management on TESTKING1. First, you log on to a client computer. However, the computer does
not have the DNS snap-in installed. What should you do next?
Option Available
A) Configure the new zone on DNS servers in the root domain. Configure stub zones that
refer to DNS servers in another two domains
B) Configure the new zone as a primary zone on one DNS server. Configure other DNS
servers in the three domains as secondary servers for this zone. Enable the DNS Security
Extensions (DNSSEC) protocol
C) Configure the new zone as an Active Directory-integrated zone on DNS servers in the
three domains. Store the zone data in the DNS directory partition named DomainDNSZones
D) Configure the new zone as an Active Directory-integrated zone on DNS servers in the
three domains. Store the zone data in the DNS directory partition named ForestDNSZonesYour
selected option : D) Configure the new zone as an Active Directory-integrated zone on DNS
servers in the three domains.
Store the zone data in the DNS directory partition named ForestDNSZones
Link: undefined
References: undefined
Question 18: You are the network administrator for TestKing. You need to provide Internet name
resolution services for the company. You set up a Windows Server 2003 computer running the DNS
Server service to provide this network service. During testing, you notice the following intermittent
problems: Name resolution queries sometimes take longer than one minute to resolve. Some valid
name resolution queries receive the following error message in the Nslookup command line tool: Non-
existent domain. You suspect that there is a problem with name resolution. You need to review the
individual queries that the server handles. You want to configure monitoring on the DNS server to
troubleshoot the problem. What should you do?
Option Available
A) In the DNS server properties, on the Debug Logging tab, select the Log packets for
debugging option
B) In the DNS server properties, on the Event Logging tab, select the Errors and warnings
option
C) In the System Monitor, monitor the Recursive Query Failure counter in the DNS object
D) In the DNS server properties, on the Monitoring tab, select the monitoring optionsYour
selected option : A) In the DNS server properties, on the Debug Logging tab, select the Log
packets for debugging option
Link: undefined
References: undefined
Question 19: You are a network administrator for TestKing. TestKing has a main office and two branch
offices. The branch offices are connected to the main office by T1 lines. The network consists of three
Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or
Windows XP Professional. Each office has a small data center that contains domain controllers, WINS,
DNS, and DHCP servers, all running Windows Server 2003. Users in all offices connect to a file server in
the main office to retrieve critical files. The network team reports that the WAN connections are
severely congested during peak business hours. Users report poor file server performance during peak
business hours. The design team is concerned that the file server is a single point of failure. The design
team requests a plan to alleviate the WAN congestion during business hours and to provide high
availability for the file server. You need to provide a solution that will improve file server performance
during peak hours and that provides high availability for file services. You need to minimize bandwidth
utilization. What should you do?
Option Available
A) Purchase two high-end servers and a shared fiber-attached disk array. Implement a file
server cluster in the main office by using both new servers and the shared fiber attached disk
array
B) Implement Offline Files on the client computers in the branch offices by using
Synchronization Manager. Schedule synchronization to occur during off-peak hours
C) Implement a stand-alone Distributed File System (DFS) root in the main office. Implement
copies of shared folders for the branch offices. Schedule replication of shared folders to occur
during off-peak hours by using scheduled tasks
D) Implement a domain Distributed File System (DFS) root in the main office. Implement DFS
replicas for the branch offices. Schedule replication to occur during off-peak hoursYour selected
option : C) Implement a stand-alone Distributed File System (DFS) root in the main office.
Implement copies of shared folders for the branch offices.
Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks
Link: undefined
References: undefined
Question 20: You are the network administrator for Testking.com. The network consists of a single
Active Directory domain TestKing.com. All network servers run Windows Server 2003. Terminal Services
is installed on three servers running Windows 2000 Server. Remote users use the terminal servers to
access the company intranet so they can read e-mail and submit time sheets. To make a connection,
users choose a terminal server from a list. This process generates help desk requests. Over time, the
remote user load increases. The existing terminal server cannot support the number of concurrent
connections. You need to create a new terminal server to assist in handling the load. However, you must
not add any new server names to the list of terminal servers. First, you upgrade all three servers to
Windows Server 2003 with Terminal Server installed. What should you do next?
Option Available
A) Stop and then start the TCP/IP NetBIOS helper service on your computer.
B) Stop and then start the DNS client service on your computer.
C) Add a HOSTS entry for server1 to your computer.
D) No need to do anythingYour selected option : C) Add a HOSTS entry for server1 to your
computer.
Link: undefined
References: undefined
Question 22: You want to write a script that encrypts each user's My Documents folder using EFS. It has
to be scheduled to run only once. Which tool should you use in the script?
Option Available
A) Windows Explorer
B) Efsinfo
C) Syskey
D) CipherYour selected option : C) Syskey
Link: undefined
References: undefined
Question 23: You are the network administrator for TestKing.com. The network consists of a single
Active Directory domain named testking.com. All network servers run Windows Server 2003, and all
client computers run Windows XP Professional. XML Web services for the internal network run on a
member server named TK1, which is configured with default settings. You are a member of the local
Administrators group on TK1. You need the ability to remotely manage TK1. You have no budget to
purchase any additional licensing for your network until the next fiscal year. How should you reconfigure
TK1?
Option Available
A)NT Explorer
B)Site Server Express
C)User Manager
D)Performance MonitorYour selected option : B)Site Server Express
Link: undefined
References: undefined
Question 27: When connecting IIS to an external data source through ODBC (Open Data Base
Connector), which type of ODBC DSN must be specified?
Option Available
A)System
B)File
C)Server
D)UserYour selected option : A)System
Link: undefined
References: undefined
Question 28: Identify the operating system that is ideal for Web servers?
Option Available
A)0
B)1
C)3
D)5Your selected option : B)1
Link: undefined
References: undefined
Question 32: WDM is an acronym for
Option Available
A)Stripping
B)Mirroring
C)Hot swappable
D)Warm swappableYour selected option : B)Mirroring
Link: undefined
References: undefined
Question 35: Which component of the Windows 2003 Executive is responsible for linking virtual address
space to actual memory storage?
Option Available
A)The Memory Manager
B)The Cache Manager
C)The Installation Manager
D)IPC ManagerYour selected option : A)The Memory Manager
Link: undefined
References: undefined
Question 36: Which ONE of the following, can you use to generate a list of signed drivers on your
Windows XP Professional system?
Option Available
A) Set the task scheduler service to log on using the local system account.
B) Set the task scheduler service to allow the service to interact with the desktop.
C) Restart the remote producer call (RPC) service.
D) Log off and then log on to an account in the Power Users group.Your selected option : A)
Set the task scheduler service to log on using the local system account.
Link: undefined
References: undefined
Question 39: You are the administrator of your company's network. You purchase 75 new Windows
2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the
computers are configured identically. You want the users to be able to maintain their individual desktop
settings regardless of which computer they use. You want to accomplish this with the least amount of
administrative effort. What should you do?
Option Available
A) Configure each computer to join a workgroup. Create a user account and a local profile
for each user.
B) Configure each computer to join a workgroup. Create a domain user account that uses
roaming user profiles.
C) Configure each computer to join the domain. Create a user account for each user on a
domain controller.
D) Configure each computer to join the domain. Create domain user accounts that use
roaming user profiles.Your selected option : D) Configure each computer to join the domain.
Create domain user accounts that use roaming user profiles.
Link: undefined
References: undefined
Question 40: You are the network administrator for TestKing. All network servers run Windows Server
2003. One of your servers, TestKingSrv1, contains a RAID-5 volume. Routine monitoring reveals a failed
disk in the set. TestKingSrv1 is running and users are connecting to shared folders on the RAID-5 volume.
You shut down the server and replace the failed disk. Now you need to ensure that the RAID-5 volume is
redundant. What should you do?
Option Available
A) Initialize the new disk. Select the failed region and then select the Repair Volume option
B) Import the foreign disk. Select the failed region and then select the Repair Volume option
C) Initialize the new disk. Select the failed region and then select the Reactive Disk option
D) Import the foreign disk. Select the failed region and then select the Reactive Disk
optionYour selected option : D) Import the foreign disk. Select the failed region and then select
the Reactive Disk option
Link: undefined
References: undefined
Question 41: You are a network administrator for TestKing. Your network consists of a single Active
Directory domain named testking.com. All servers run Windows Server 2003. A help desk user reports
that a user object was accidentally deleted and the user can no longer log on to the domain and access
resources. You confirm that the user object was included in the most recent backup. You need to enable
the user to log on to the domain. You must ensure that the user retains access to resources. What
should you do?
Option Available
A) Install a new domain controller. Install Active Directory from media by using the most
recent backup. Manually initiate replication
B) Decrease the garbage collection interval. Perform a nonauthorative restoration of Active
Directory by using the most recent backup
C) Perform a nonauthorative restoration of Active Directory by using the most recent
backup. Authoritatively restore the user object that was deleted
D) Re-create a user object that has the same user principal name (UPN) as the user object
that was deleted. Authoritatively restore this user objectYour selected option : A) Install a new
domain controller. Install Active Directory from media by using the most recent backup.
Manually initiate replication
Link: undefined
References: undefined
Question 42: You are the network administrator for TestKing. The network consists of a single Active
Directory domain named testking.com. You are testing Group Policy object (GPOs) on an organizational
unit (OU) named Test. The Test OU contains a Windows XP Professional client computer that you use as
a test computer. The domain contains a group named Security. You create a new GPO and configure the
Computer Configuration section to grant the Security group to Change the system time user right. You
log on to the test computer and discover that the setting you set through the GPO is not in effect. You
need to apply the GPO settings immediately. What should you do?
Option Available
A)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Alt key to
prevent all Startup programs from running
B)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Shift key to
prevent all Startup programs from running.
C)Press Ctrl+Alt+Del and log on. When the logon process begins, hold down the Break key to
prevent all Startup programs from running.
D) Do NothingYour selected option : A)Press Ctrl+Alt+Del and log on. When the logon
process begins, hold down the Alt key to prevent all Startup programs from running
Link: undefined
References: undefined
Question 44: You are the desktop administrator for Wingtip Toys. Management requires that a standard
user profile be created for all domain user accounts. Additionally, the standard profile must be
protected so that domain users cannot make permanent changes to the standard profile. You create a
company standard user profile. You require all domain user accounts to use this profile. Later, users
report that the changes they make to their desktop are overwriting the standard profile settings. What
should you do to ensure permanent changes cannot be made to the standard user profile?
Option Available
A) In the Languages options, configure the Language bar to show additional Language bar
icons.
B) In the Languages options, select the Install files for complex script and right-to-left
languages (including Thai) check box.
C)In the Languages options, select the Install Files for East Asian languages check box. Add
Japanese as an input language.
D) In the Advanced options, select Japanese as the Language for non-Unicode programs. In
the Language options, add the Japanese keyboard/ME layout.Your selected option : C)In the
Languages options, select the Install Files for East Asian languages check box. Add Japanese as
an input language.
Link: undefined
References: undefined
Question 46: You are the desktop administrator for your company. All users in the network have
Windows XP Professional computers. Users in the research department have dual-processor computers.
Users in the research department report that when they run 16-bit Windows programs, their computer
performance becomes very slow. You use system monitor to monitor the users' computers. You discover
that when the users are running their 16-bit applications, one processor shows a sustained utilization of
more than 90 percent while the other processor only shows utilization of less than 10 percent. You need
to improve application performance for the users in the research department. What should you do?
Option Available
A) Repackage and redeploy the application's .msi file to the Sales OU.
B) Repackage and redeploy the application's.mst file to the Sales OU.
C) Redeploy the application by using the Group Policy object (GPO) for the Sales OU.
D) Restart Windows Installer on all computers in the Sales OU. Then redeploy the
application's .zap file to the Sales OU.Your selected option : C) Redeploy the application by
using the Group Policy object (GPO) for the Sales OU.
Link: undefined
References: undefined
Question 1: A senior manager has asked you to help her disable a particularly annoying application that
runs every time she logs on. Unfortunately the application is corrupt and locks up the system so the
manager can t delete the application by removing it from the Startup folder. When you arrive at her
office the boot process has progressed to the point where the logon banner appears. You want to deal
with this problem as expeditiously as possible which means that you don t want to reboot back into Safe
mode. Which of the following steps should you take?
Option Available
A)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Alt key to
prevent all Startup programs from running
B)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Shift key to
prevent all Startup programs from running.
C)Press Ctrl+Alt+Del and log on. When the logon process begins hold down the Break key to
prevent all Startup programs from running.
D) Do NothingYour selected option : Not Answered
Link: undefined
References: undefined
Question 2: You are the desktop administrator for your company. All employees have Windows XP
Professional computers. All employees are members of the local Users group on their own computers. A
user in the graphics department has a removable disk cartridge drive on his computer. The disk cartridge
contains an unsupported third party file system. When he tries to save data to the disk cartridge the
user is prompted to reformat the disk cartridge. However he receives an Access denied error message
when attempting to reformat. You need to enable the user to save data to the disk cartridge. What
should you do?
Option Available
A)In the Encrypted data Recovery Agents policy for the local computer import a certificate.
Compress the contents of volume
B)Instruct Irene to modify the properties of each file in the Private folder by selecting the
option to encrypt the contents of the files.
C)Instruct Irene to modify the properties of the Private folder by selecting the option to
encrypt the contents of the folder. Then instruct Irene to accept the default setting on the
Confirm Attributes Changes dialog box.
D)Ensure that Irene has Allow Full Control permission on the Private folder. Instruct Irene to
modify the properties of the Private folder and then select the option to compress the contents
of the folder.Your selected option : Not Answered
Link: undefined
References: undefined
Question 6: You are a help desk technician for your company. All employees use Windows XP
Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from
his supervisor. Philippe now reports that he cannot edit files on the cartridge he receives an access
denied error message. Philippe s supervisor is currently out of the office. You place the cartridge in the
removable drive on your computer. You receive the same access denied error message when you try to
access the files and folders. You call Philippe s supervisor. She asks you to grant permission to access the
contents of the cartridge only to Philippe. However she also wants to prevent Philippe from changing
permissions on the contents of the cartridge.Which action should you take?
Option Available
A) In the Languages options configure the Language bar to show additional Language bar
icons.
B) In the Languages options select the Install files for complex script and right to left
languages (including Thai) check box.
C)In the Languages options select the Install Files for East Asian languages check box. Add
Japanese as an input language.
D) In the Advanced options select Japanese as the Language for non Unicode programs. In
the Language options add the Japanese keyboard/ME layout.Your selected option : Not
Answered
Link: undefined
References: undefined
Question 8: If a network has a Windows NT domain controller what kind of network is it?
Option Available
A)WAN
B)High speed
C)Peer to peer
D)Server basedYour selected option : Not Answered
Link: undefined
References: undefined
Question 9: In an OEM directory structure the equivalent to the root drive on which Windows 2000 will
be installed is called
Option Available
A)\$root$
B)\$$
C)\$1
D)\$winnt$Your selected option : Not Answered
Link: undefined
References: undefined
Question 10: Windows 2000 Server simplifies management of the network with?
Option Available
A)high availability
B)network load balancing
C)component load balancing
D)all of the aboveYour selected option : Not Answered
Link: undefined
References: undefined
Question 12: You are a help desk technician for your company. Your company s network includes an
Active Directory domain and Windows XP Professional computers that are configured as members of the
domain. Company policy prohibits users from accessing their computers unless they are authenticated
by a domain controller. However users report that they can log on to their computers even though a
network administrator has told them that a domain controller is not available. As a test you log off of
your computer and disconnect it from the network. You discover that you can log on by using your
domain user account. You need to ensure that users cannot access their computers unless they are
authenticated by a domain controller. How should you configure the local computer policy on these
computers?
Option Available
A) Add Julie s domain use account to the Server Operators domain user group.
B) Use the Delegation of Control Wizard to grant Julie s domain user account the right to
create new objects in the computers container.
C)On a domain controller use the Local Computer Policy MMC to add Julie s domain user
account to the add workstations to domain user right policy.
D) Install the Active Directory users and computers MMC on Julie s Windows XP Professional
computer. Add Julie s domain user account top the domain Administrators domain user
group.Your selected option : Not Answered
Link: undefined
References: undefined
Question 14: Miracleinfocom.com wants to enforce a strong password policy throughout its entire
organization. At which level of the Active Directory hierarchy should this security policy be enforced?
Option Available
A) Site
B) Domain
C) Local Computer
D) Organization UnitYour selected option : Not Answered
Link: undefined
References: undefined
Question 15: During a RIS installation after the client system boots it initiates a
Option Available
A)TFTP download
B)DHCP request
C)Telnet Session
D)ROSI protocolYour selected option : Not Answered
Link: undefined
References: undefined
Question 16: Which network service must be present to use RIS?
Option Available
A)Telnet
B)DHCP
C)BOOTP
D)RASYour selected option : Not Answered
Link: undefined
References: undefined
Question 17: The interface which guides a user through a RIS installation is called?
Option Available
A)Ask a network administrator to modify the network DHCP server to include a DHCP
reservation for the computer.
B)Ask a network administrator to modify the RIS server permissions to grant your domain
user account Allow Read permission on the RIS images.
C)Modify the computer s BIOS settings and ensure that the computer is configured to boot
from the network.
D)Modify the computer s BIOS settings and ensure that the computer s boot password is the
same as the RIS server s Administrator passwordYour selected option : Not Answered
Link: undefined
References: undefined
Question 19: You want to install Windows 2000 Professional on 45 new computers on your company s
network. You first install Windows 2000 Professional on one of the new computers. You log on to the
computer by using the local Administrator account. You install Microsoft Office 97 a virus scanner and
other company standard applications. You then create a RIS image of the computer you configured. You
want to configure the RIS image so that the standard applications will be accessible to the user when the
user first logs on to the network. What should you do?
Option Available
A)host.primary.mycomp.com
B)primary.mycomp.com
C)mycomp.com
D)None of the aboveYour selected option : Not Answered
Link: undefined
References: undefined
Question 21: You are the systems engineer for TestKing. The network consists of a single Active
Directory domain named testking.com. All servers run Windows Server 2003. A Windows Server 2003
computer named TESTKINGDNS1 functions as the internal DNS server and has zones configured as
shown in the exhibit. The network is not currently connected to the Internet. TestKing maintains a
separate network that contains publicly accessible Web and mail servers. These Web and mail servers
are members of a DNS domain named testking.com. The testking.com zone is hosted by a UNIX based
DNS server named UNIXDNS which is running the latest version of BIND. The company plans to allow
users of the internal network to access Internet based resources. The company s written security policy
states that resources located on the internal network must never be exposed to the Internet. The
written security policy states that the internal network s DNS namespace must never be exposed to the
Internet. To meet these requirements the design specifies that all name resolution requests for Internet
based resources from computers on the internal network must be sent from TESTKINGDNS1. The
current design also specifies that UNIXDNS must attempt to resolve any name resolution requests
before sending them to name servers on the Internet. You need to plan a name resolution strategy for
Internet access. You need to configure TESTKINGDNS1 so that it complies with company requirements
and restrictions. What should you do?
Option Available
A) Delete the root zone form TESTKINGDNS1. Configure TESTKINGDNS1 to forward requests
to UNIXDNS
B) Copy the Cache.dns file from the Windows Server 2003 installation CD ROM to the C:\
Windows\System32\Dns folder on TESTKINGDNS1
C) Add a name server (NS) resource record for UNIXDNS to your zone. Configure UNIXDNS
with current root hints
D) On TESTKINGDNS1 configure a secondary zone named testking.com that uses UNIXDNS as
the master server. Configure UNIXDNS to forward requests to your ISP s DNS serversYour
selected option : Not Answered
Link: undefined
References: undefined
Question 22: You are a help desk technician for your company. The network consists of a single Active
Directory domain. The network includes Windows 2000 Advanced Server computers and Windows 2000
Professional and Windows XP Professional client computers. Except for the domain controllers all
computers on the network use DHCP for their TCP/IP configuration. During the business day the
network administrators perform emergency maintenance on a file server named Filesrv1. Filesrv1 is
then restarted and experiences no further problems. Users begin reporting that when they try to access
resources on Filesrv1 they receive the following error message: Network path not found. You verify that
Filesrv1 is functional. You need to ensure that all users can access Filesrv1. What command should you
instruct users to run?
Option Available
A) Nbstat R
B) Nbstat RR
C)IPconfig/flushdns
D) IPconfig/registerdnsYour selected option : Not Answered
Link: undefined
References: undefined
Question 23: Bill is a local Admin of his XP connect to office by dialup from several branchs in different
dialup connection. He can t enable the ICF for the new connection but he did it for the previous
connections. How to enable that ICF?
Option Available
A)News
B)Mail
C)Gopher
D)WWWYour selected option : Not Answered
Link: undefined
References: undefined
Question 26: You want to provide search capabilities to the browsers of your Web site.Which IIS service
provides this feature?
Option Available
A)NNTP
B)Mail Server
C)Index Server
D)Transaction ServerYour selected option : Not Answered
Link: undefined
References: undefined
Question 27: Which are the IIS services that can use SSL communication?
Option Available
A)News
B)Mail
C)WWW
D)FTPYour selected option : Not Answered
Link: undefined
References: undefined
Question 28: You want to see if any broken links are there in your Web site.Which tool do you use?
Option Available
A)NT Explorer
B)Site Server Express
C)User Manager
D)Performance MonitorYour selected option : Not Answered
Link: undefined
References: undefined
Question 29: You are hosting a Web Site which contain some Web pages using Perl Script.You find that
none of the users are able to see Web pages which contain Perl script.What is the likely cause?
Option Available
A)Perl interpreter which gets installed as part of IIS4.0 needs to be pointed by modifying the
Properties of Scripts folder.
B)You can not use Perl Scripts on Microsoft Web Server.Microsoft Web server doesn t
support it.
C)You need to install Perl interpreter on the Web Server.
D)Perl interpreter needs to be installed as plug in on all client machines.Your selected option
: Not Answered
Link: undefined
References: undefined
Question 30: What is another name for 10BaseT?
Option Available
A)Baseband
B)Broadband
C)Thicknet
D)Twisted PairYour selected option : Not Answered
Link: undefined
References: undefined
Question 31: Which of the following categories for UTP has the least expensive cable?
Option Available
A)1
B)2
C)3
D)4Your selected option : Not Answered
Link: undefined
References: undefined
Question 32: You have been asked to install a network of nine Windows NT workstations in a single
department. Low cost is a goal. What kind of network should you install?
Option Available
A)LAN
B)WAN
C)Peer to peer
D)Sever basedYour selected option : Not Answered
Link: undefined
References: undefined
Question 33: Which of the following IRQs are used for the CMOS/real time clock?
Option Available
A)0
B)2
C)4
D)8Your selected option : Not Answered
Link: undefined
References: undefined
Question 34: Which of the following IRQs are used for LPT1?
Option Available
A)1
B)3
C)5
D)7Your selected option : Not Answered
Link: undefined
References: undefined
Question 35: Which layer(s) of the OSI model is/are included in the NDIS specification?
Option Available
A)1
B)2
C)3
D)4Your selected option : Not Answered
Link: undefined
References: undefined
Question 36: Which of the following modules manages bindings in NDIS?
Option Available
A)Protocol manager
B)Binding manager
C)Redirector
D)The registryYour selected option : Not Answered
Link: undefined
References: undefined
Question 37: What is a set of rules for communication between computers called?
Option Available
A)NOS
B)protocol
C)standards
D)serviceYour selected option : Not Answered
Link: undefined
References: undefined
Question 38: Which standard divides the data link layer into the LLC and the MAC sublayers?
Option Available
A)802.1
B)802.2
C)802.3
D)802.4Your selected option : Not Answered
Link: undefined
References: undefined
Question 39: Write the name of layer of the OSI model that maintains a connection between nodes?
Option Available
A)Transport Layer
B)Session Layer
C)Physical Layer
D)Network LayerYour selected option : Not Answered
Link: undefined
References: undefined
Question 40: You are a help desk technician for your Litware In Litware In maintains a secure intranet
web site at intranet litwareincom. All employees use Windows XP Professional computers. A user named
Katherine reports that she cannot access the secure web site by using internet explorer. When she types
http://intranet.litware.com into the internet explorer address bar an error message reports that the
digital certificate is not from a trusted source. You confirm that the intranet web server is using a digital
certificate issued by your company s Enterprise Certificate Authority. The Enterprise Certificate
Authority is located on a server named certificates.litwareincom You need to ensure that Katherine can
access the secure intranet web site without receiving an error message. What should you do?
Option Available
A)Ask a network administrator to modify the properties for IIS on intranet.litwareincom and
set the SSL port number to 443.
B)Ask your network administrator to create a Certificate Trust List (CTL) that includes your
Enterprise Certificate Authority. On Katherine s computer open the Certificates settings for
internet explorer and import the CTL.
C)On Katherine s computer open the security properties for Internet Explorer. Add
intranet.litwareincom to the Trusted Sites list.
D)On Katherine s computer open Internet Explorer s list of certificates. Import a copy of the
certificate used by the intranet.litwareincom server into Katherine s Trusted Publishers
certificates storeYour selected option : Not Answered
Link: undefined
References: undefined
Question 41: You visit a regional office in New York to install and upgrade that office s Windows 2000
Server cluster. You also install Windows XP Professional on a secretary s workstation. You use Win2K
Server Terminal Services across the WAN from your office in Los Angeles to manage other Win2K Server
clusters in Denver Des Moines and Duluth and you want to test the Remote Desktop function as a
precursor to migrating away from PC Anywhere for desktop management. You enable Remote Desktop
on the secretary s system install the regular applications enable access to your user account then return
to your office.Which of the following steps should you take to connect to the secretary s machine in
New York with a minimal amount of effort?
Option Available
A) Install an XP Pro machine in your office and select Remote Desktop Client.
B) Make sure port 3389 is open on the WAN links between your office and the New York
office.
C)Make sure port 1168 is open on the WAN links between your office and the New York
office.
D)On the XP Pro machine in your office go to My Network Places Entire Network Microsoft
Terminal Services and select the secretary s machine.Your selected option : Not Answered
Link: undefined
References: undefined
Question 42: Which of the following best describes the difference between Windows XP s Remote
Desktop and Remote Assistance features?
Option Available
A) There s no difference Remote Desktop and Remote Assistance are the same thing.
B) Remote Assistance lets you view a remote desktop but doesn t let you interact with it
Remote Desktop lets you interact with another user s desktop settings.
C) Remote Assistance lets you view a remote desktop but doesn t let you interact with it
Remote Desktop lets multiple users connect to an XP Professional workstation in the same way
Windows 2000 Server Terminal Services Application Server does. A maximum of five users can
connect to the Remote Desktop at any time.
D)Remote Assistance lets you view a remote desktop but doesn t let you interact with it
unless the remote user permits you to Remote Desktop lets you remotely connect to your
workstation as if you were directly connected.Your selected option : Not Answered
Link: undefined
References: undefined
Question 43: What is the GUI tool used to build the UNATTEND.TXT file included with the Windows 2000
Resource Kit?
Option Available
A)SETUPMGR.EXE
B)UNATTEND.EXE
C)PREBUILD.EXE
D)SYSLOAD.SYSYour selected option : Not Answered
Link: undefined
References: undefined
Question 44: Which component of the Windows 2000 Executive is responsible for handling input and
output from installed devices?
Option Available
A)Mirroring
B)Stripping
C)Stripping with parity
D)Hot swapYour selected option : Not Answered
Link: undefined
References: undefined
Question 47: Which RAID level is also called mirroring?
Option Available
A)0
B)1
C)3
D)5Your selected option : Not Answered
Link: undefined
References: undefined
Question 48: You want to install Windows 2000 Professional on 10 non PXE compliant computers on the
marketing segment of your network. The 10 computers do not have operating systems installed. You
attempt to load the computers by using an existing RIS image that is on the RIS server. You find that the
10 computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers including the RIS server. You then check the network servers and find
that the Windows NT Server 4.0 computer running WINS has stopped responding due to hard disk
failure. You want to enable the computers to connect to the RIS server. What should you do?
Option Available
A) Start the computer in Safe Mode and reformat the hard disk
B) Start the computer in debug mode and reformat the hard disk
C) Start the computer by using the Emergency Repair Disk and repair the Master Boot Recor
D) Start the computer by using the Windows 2000 Professional CD ROMYour selected option
: Not Answered
Link: undefined
References: undefined
Set 3:
Question 1: An administrator currently has Secure Gateway and web interface on the same server
in the DMZ. After learning about Access Gateway the administrator decided to purchase two
units for redundancy that will be located in the DMZ and implement the increased functionality
that Access Gateway offers. Two new Interface servers will be introduced. Where should the
administrator place the web interface servers?
Option Available
50
60
15
200Your selected option : 15
Link: undefined
References: undefined
Question 5: To which Citrix service does Web Interface forward a users logon credentials?
Option Available
MFCOM
Independent Management Architecture
WMI
XMLYour selected option : WMI
Link: undefined
References: undefined
Question 6: How can an administrator turn off a policy rule without having to edit every policy
that contains that rule?
Option Available
Image Acceleration
Multimedia Acceleration
Flash Acceleration
Browser AccelerationYour selected option : Browser Acceleration
Link: undefined
References: undefined
Question 11: Scenario: An administrator has created three XenApp policies called Austin Dallas
and Houston. The Austin policy sets up session printers for the Austin location based on the
subnet. The Dallas policy sets up session printers for Dallas based on user groups. The Houston
policy sets up session printers for Houston and is applied to all the servers in the farm. As a
result of these. (Choose the correct option to complete the sentence.)
Option Available
1494
2513
2512
2598Your selected option : 1494
Link: undefined
References: undefined
Question 14: what can you use to seize FSMO Roles?
Option Available
100
250
500
1000Your selected option : 100
Link: undefined
References: undefined
Question 16: Which of the following are the FSMO roles?
Option Available
Set the domain functional level to Windows 2003 and the forest functional level to Windows
2003
Set the domain functional level to Windows 2003 and the forest functional level to Windows
2000 native
Set the domain functional level to Windows 2008 and the forest functional level to Windows
2003
Set the domain functional level to Windows 2008 and the forest functional level to Windows
2003Your selected option : Set the domain functional level to Windows 2008 and the forest
functional level to Windows 2003
Link: undefined
References: undefined
Question 19: Your network consists of one Active Directory forest that contains one domain.
The functional level of the forest is Windows 2000. The functional level of the domain is
Windows 2000 native. Two domain controllers run Windows Server 2008 and three domain
controllers run Windows Server 2003. Service packs are not installed on any of the domain
controllers. You plan to enable Windows BitLocker Drive Encryption (BitLocker) on all domain
controllers. You need to store all BitLocker recovery information in Active Directory Domain
Services (AD DS). What should you do first?
Option Available
On a domain controller,install and configure Active Directory Federation Services (AD FS)
On a domain controller,install and configure Active Directory Rights Management Services
(AD RMS)
On all servers in the domain,ensure that the data volumes are configured to use NTFS file
system and Encrypting File System (EFS)
On all servers in the domain,ensure that the data volumes are configured to use NTFS file
system and Windows BitLocker Drive Encryption (BitLocker)Your selected option : On all servers
in the domain,ensure that the data volumes are configured to use NTFS file system and
Encrypting File System (EFS)
Link: undefined
References: undefined
Question 21: Your network consists of an Active Directory forest that contains only domain
controllers that run Windows Server 2003. You need to prepare the environment for the
implementation of a new Windows Server 2008 domain in the forest. What should you do?
Option Available
Raise the forest functional level of Forest1 and Forest2 to Windows Server 2008
Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate right on
the computer object for Server1
Raise the domain functional level of all domains in both forests to Windows Server 2008
Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate right on
the computer object for the Forest2 infrastructure operations master objectYour selected
option : Create a forest trust between Forest1 and Forest2. Set the Allowed to Authenticate
right on the computer object for Server1
Link: undefined
References: undefined
Question 23: Which command-line tool would you use to add an instance of AD LDS to an
existing Core Server installation?
Option Available
ADAMinstall.exe
ldsinstall.exe
oclist.exe
ocsetup.exeYour selected option : ldsinstall.exe
Link: undefined
References: undefined
Question 24: Your network consists of one Active Directory domain that contains only domain
controllers that run Windows Server 2003. Your company acquires another company. You need
to provide user accounts for the employees of the newly acquired company. The solution must
support multiple account lockout and password policies. What should you do?
Option Available
TCP/IP
ARP
Kerberos
RARPYour selected option : TCP/IP
Link: undefined
References: undefined
Question 27: X.500 is a standard that first described directory services using which ONE of the
following communication protocol?
Option Available
NetBEUI
TCP/IP
IPX/SPX
DAPYour selected option : Not Answered
Link: undefined
References: undefined
Question 28: Protocols and technologies such as SSL and Kerberos would correlate best with
which of the following X.500 model?
Option Available
Distributed model
Authorization model
Authentication model
Security modelYour selected option : Security model
Link: undefined
References: undefined
Question 29: Which ONE of the following advantage does the multimaster replication model
provide?
Option Available
Transmission originates from one bridgehead server and is received by another bridgehead
server
Transmission originates from one bridgehead server,but several servers are able to accept
communication on the receiving end
Transmission originates from several servers in parallel,but only the bridgehead server
accepts communication on the receiving end
Transmission is conducted by several servers on both the transmitting and receiving ends at
the same timeYour selected option : Transmission originates from one bridgehead server,but
several servers are able to accept
communication on the receiving end
Link: undefined
References: undefined
Question 31: You are the network administrator for window 2003 Active directory single forest.
There are 104 Windows 2003 R2 Domain controller. Your CIO has asked you to force the
replication across site. You need to achieve this with minimum administrative efforts. What
should you do?
Option Available
replmon /force
goto site and services and force the replications and In the console tree,click NTDS Settings
for the server that you want to force replication then click replicate now
repadmin /force
none of the aboveYour selected option : goto site and services and force the replications and
In the console tree,click NTDS Settings for the server that you want to force replication then
click replicate now
Link: undefined
References: undefined
Question 32: Your boss wants you to install vSphere 4 server on two HP C-class Blades. Each
blade has two dual core CPU's. How many vSphere processor licenses will be needed for this
setup?
Option Available
12
4
2
8Your selected option : 8
Link: undefined
References: undefined
Question 33: A vNetwork Distributed Switch is best described as?
Option Available
Virtual machines on any virtual switch on the same ESX Server can receive the traffic
The virtual switch will drop the packets if no uplink is present
Only virtual machines in the same port group on the virtual switch can receive the traffic
Virtual machines in any port group on the virtual switch can receive the trafficYour selected
option : Only virtual machines in the same port group on the virtual switch can receive the
traffic
Link: undefined
References: undefined
Question 35: If you are planning on installing the Cisco Nexus 1000v Distributed Switch on your
vSphere cluster, which Licensing package would you need to purchase?
Option Available
Advanced
Enterprise
Enterprise Plus
StandardYour selected option : Enterprise
Link: undefined
References: undefined
Question 36: In vSphere 4 what is the Maximum amount of ports supported on a vSwitch?
Option Available
1016
256
4088
UnlimitedYour selected option : 256
Link: undefined
References: undefined
Question 37: The following connection type can all be configured on a single vSwitch?
Option Available
Version 6
Version 4
Version 7
All VersionsYour selected option : Not Answered
Link: undefined
References: undefined
Question 39: The vSwitch or vSwitch port group policy setting that allows a virtual machine to
listen to traffic other than that which is specifically destined for the given VM is?
Option Available
Forged Transmits
MAC Address Changes
Promiscuous Mode
Traffic ShapingYour selected option : Traffic Shaping
Link: undefined
References: undefined
Question 40: vSphere virtual switches are configured, based on the number of physical uplinks
bound, in which of the following methods?
Option Available
4
2
1
10Your selected option : 2
Link: undefined
References: undefined
Question 43: An administrator currently has Secure Gateway and web interface on the same
server in the DMZ. After learning about Access Gateway the administrator decided to purchase
two units for redundancy that will be located in the DMZ and implement the increased
functionality that Access Gateway offers. Two new Interface servers will be introduced. Where
should the administrator place the web interface servers?
Option Available
50
60
15
200Your selected option : 15
Link: undefined
References: undefined
Question 47: To which Citrix service does Web Interface forward a users logon credentials?
Option Available
MFCOM
Independent Management Architecture
WMI
XMLYour selected option : XML
Link: undefined
References: undefined
Question 48: How can an administrator turn off a policy rule without having to edit every policy
that contains that rule?
Option Available
Answer Report
Question 1: Which server role is responsible for merging your VOIP infrastructure with your
Exchange organization ?
Option Available
Unified Messaging
Mailbox
Hubtransport
EdgeServerYour selected option : Hubtransport
Link: undefined
References: undefined
Question 2: How we can sync AD with the Edge Transport server?
Option Available
DNS
ADAM
DHCP
ACMDYour selected option : DNS
Link: undefined
References: undefined
Question 3: Which secure connection establish between a Hub Transport server and an Edge
Transport serve?
Option Available
LDAP
TLS
EFS
IPSecYour selected option : LDAP
Link: undefined
References: undefined
Question 4: Which server role processes all messages that are sent inside the Exchange 2007
organization before the messages are delivered to a recipient's Inbox or are routed to users
outside the organization ?
Option Available
Client Access
Mailbox
Hubtransport
EdgeServerYour selected option : Hubtransport
Link: undefined
References: undefined
Question 5: Which server role responsible for Autodiscover web service in exchnage 2007?
Option Available
Client Access
Mailbox
Hubtransport
EdgeServerYour selected option : Client Access
Link: undefined
References: undefined
Question 6: Which feature is the not the part of the high availability in exchange 2007?
Option Available
CCR
LCR
SCR
MCRYour selected option : CCR
Link: undefined
References: undefined
Question 7: What method can you use to ensure that user mailboxes do not exceed a specified
size?
Option Available
Client Access
Mailbox
Hubtransport
EdgeServerYour selected option : EdgeServer
Link: undefined
References: undefined
Question 9: Which high availability feature is single server solution ?
Option Available
LCR
CCR
SCC
SCRYour selected option : LCR
Link: undefined
References: undefined
Question 10: which is a non-shared storage failover cluster solution in high availability?
Option Available
LCR
CCR
SCC
SCRYour selected option : CCR
Link: undefined
References: undefined
Question 11: which feature uses built-in asynchronous log shipping technology to create and
maintain a copy of a storage group on a second set of disks that are connected to the same server
as the production storage group?
Option Available
LCR
CCR
SCC
SCRYour selected option : SCR
Link: undefined
References: undefined
Question 12: Which of the use to ensure that the configuration of an Edge Transport server is not
lost in the event of catastrophic hardware failure?
Option Available
Submission
Store driver
receive connector
public folderYour selected option : receive connector
Link: undefined
References: undefined
Question 18: categorizer does not completes the steps.
Option Available
Content conversion
Recipient resolution
Routing resolution
message delievryYour selected option : Routing resolution
Link: undefined
References: undefined
Question 19: which is not provided by Service process is MSExchangeTransport.exe
Option Available
mail-enabled object
mail-box object
Contact
GroupYour selected option : Group
Link: undefined
References: undefined
Question 21: A policy that is applied to mail-enabled objects to generate e-mail
addresses,called ?
Option Available
recipient function
system policy
recipient policy
mailbox policyYour selected option : mailbox policy
Link: undefined
References: undefined
Question 22: An event that can be registered for a parent folder as well as for any child
folders,called ?
Option Available
cursive event
system event
application event
recursive eventYour selected option : recursive event
Link: undefined
References: undefined
Question 23: A data structure that contains information about the security attributes for an
Exchange store resource,including a list of users and groups that have access permissions to the
resource,called ?
Option Available
system descriptor
security descriptor
secure descriptor
security diskYour selected option : security disk
Link: undefined
References: undefined
Question 24: A set of independent operations that are bundled together and performed as an
atomic operation; the operations succeed or fail as a whole,called ?
Option Available
transaction
transfer
move
system transactionYour selected option : transaction
Link: undefined
References: undefined
Question 25: A name used to access the contents of any Exchange store using a Web
browser,called ?
Option Available
directory
virtual directory
virtual server
virtual folderYour selected option : directory
Link: undefined
References: undefined
Question 26: In which of the following network locations should you deploy an Edge Transport
server?
Option Available
Unified Messaging
Mailbox
Hubtransport
EdgeServerYour selected option : Mailbox
Link: undefined
References: undefined
Question 28: How we can sync AD with the Edge Transport server?
Option Available
DNS
ADAM
DHCP
ACMDYour selected option : DHCP
Link: undefined
References: undefined
Question 29: Which secure connection establish between a Hub Transport server and an Edge
Transport serve?
Option Available
LDAP
TLS
EFS
IPSecYour selected option : EFS
Link: undefined
References: undefined
Question 30: What method can you use to ensure that user mailboxes do not exceed a specified
size?
Option Available
Incremental backup
Full backup
Differential backup
Copy backupYour selected option : Full backup
Link: undefined
References: undefined
Question 32: Several users have complained that their messages do not appear to be being
received by the people they are sending them to. Your organization has an Edge Transport server
and a Hub Transport server. Which of the cmdlets can you use in a command to determine
whether the messages are stalling on the Hub Transport server or Edge Transport server?
Option Available
Get-Message
Get-Queue
Resume-Queue
Retry-QueueYour selected option : Resume-Queue
Link: undefined
References: undefined
Question 33: Which of the actions must be taken before the Developers universal security group
can be mail-enabled?
Option Available
Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client
Access servers
Add a replica of the Exchange organizations Free/Busy public folder to at least one of the
Mailbox servers in the same site as the Client Access servers
Add the Full Details read permission to each users calendar properties by using the
Microsoft Office Outlook client
Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the
Client Access serversYour selected option : Add a replica of the Exchange organizations
Free/Busy public folder to at least one of
the Mailbox servers in the same site as the Client Access servers
Link: undefined
References: undefined
Question 36: There is a Mailbox server named S01 in the company. On S01,the mailbox
transaction log volume has very little free disk space remaining. At the time that you move
several large mailboxes to another Mailbox server,no additional free disk space is made available
on the mailbox transaction log volume on S01. You plan to increase the amount of free disk
space on the mailbox trans action log volume on S01. So what action should you perform?
Option Available
a linked mailbox
a managed custom folder
a message classification
an Outlook Protection RuleYour selected option : a managed custom folder
Link: undefined
References: undefined
Question 39: Your network contains Mailbox servers that run Exchange Server 2007 and
Exchange Server 2010. You need to ensure that all e-mail messages located in the Inbox folders
of all users are deleted after 120 days. What should you create first?
Option Available
content filtering
recipient filtering
sender filtering
sender reputationYour selected option : content filtering
Link: undefined
References: undefined
Question 45: You have an Exchange 2010 organization. Your companys security policy states
that all connections to Outlook Web App (OWA) must use smart card authentication. You need
to recommend a solution to meet the security policy requirements. Which two possible ways to
achieve this goal should you recommend?
Option Available
Set 5:
so1 of 50
a) High-availability
Question2 of 50
a) 50
b) 58
c) 75
Question3 of 50
Which of the following network devices sends packets from a central point based upon MAC addresses?
a) Repeater
b) Switch
c) Bridge
d) Router
Question4 of 50
b) STP
c) fiber optic
d) infrared
Question5 of 50
a) Token Ring
b) CSMA/CA
c) CSMA/CD
d) CTS / RTS
Question6 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Remote Access Service role service installed. Server1 is configured as a VPN server. You need to ensure
that you can configure Server1 as a Network Address Translation (NAT) server. What should you do first
on Server1?
Question7 of 50
Which standard divides the data link layer into the LLC and the MAC sublayers?
a) 802.1
b) 802.2
c) 802.3
d) 802.4
Question8 of 50
You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
c) Assign each office a subnet from a new class B private IP address range
d) Assign each office a subnet from the current class C private IP address range
Question9 of 50
You want to specify a permanent address for a printer in the first floor through DHCP server . How you
will do it
a) Server options
b) Simple scope
c) Scope options
d) Reserved options
Question10 of 50
You are the administrator of a Windows Server 2003 network. Your network includes 75 Windows XP
Professional computers. You are adding 50 new PXE-compliant computers to the network. The hardware
on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?
Question11 of 50
d) Using additional SRV records, you can add new domain controllers in the network
Question12 of 50
Which one of the following commands can be used to empty the DNS cache on a DNS client?
a) ipconfig /all
b) nbtstat -RR
c) ipconfig /flushdns
d) ipconfig /emptydns
Question13 of 50
You want to ensure that DNS zone content is always accurate. You employ dynamic DNS, and you are
concerned that many clients may not be deregistering accurately. What should you do to address this
concern?
b) Periodically re-import zones from an export that contains server records only
Question14 of 50
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?
Question15 of 50
a) NSLOOKUP
b) IPCONFIG /registerdns
c) IPCONFIG /displaydns
Question16 of 50
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.
Question17 of 50
a) DHCP
b) DFS
c) WINS
d) IIS
Question18 of 50
You have just installed two Windows Server 2003 computers. You configure the servers as a two node
server cluster. You install WINS on each Node of the cluster. You create a new virtual server to support
WINS. You create a new cluster group named WINSgroup. When you attempt to create the Network
Name resource, you receive an error message. You need to make the proper changes to the cluster to
complete the installation of WINS. What should you do?
d) Add the proper DNS name for the WINS Server in the DNS database
Question19 of 50
Your network consists of one Active Directory domain. Your company has an intranet. You deploy
Terminal Services terminal servers that run Windows Server 2008. You plan to make applications
available to users on the intranet. You need to recommend a solution to ensure that each user session
receives an equal share of the CPU resources on the terminal servers. What should you recommend?
a) Install and configure the Network Load Balancing feature on all terminal servers
b) Install and configure the Terminal Services server role with the Terminal Services Session Broker (TS
Session Broker) services role on all terminal servers
c) Install the Windows System Resource Manager (WSRM) feature on all terminal servers. Set the
resource-allocation policy
d) Install the Network Policy and Access Services (NPAS) server role on another server. Define and apply
a new policy by using Network Policy Server (NPS)
Question20 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Question21 of 50
Your network includes a TS Gateway server named TSG1. TSG1 has installed a self-signed server
certificate that it uses for SSL communications. You want to use a computer running ISA Server as an SSL
endpoint for TS Gateway connections. Which of the following steps must you take to ensure that ISA
Server can communicate with TS Gateway?
a) Export the SSL certificate of ISA Server to TS Gateway.
Question22 of 50
Which are the IIS services that can use SSL communication?
a) News
b) Mail
c) WWW
d) FTP
Question23 of 50
When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?
a) System
b) File
c) Server
d) User
Question24 of 50
Question25 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?
a) From RRAS, create an inbound packet filter
d) At the command prompt, run netsh.exe ras set tracing rasauth enabled
Question26 of 50
a) Client/server network
b) peer network
c) domain
Question27 of 50
Your network contains a six-node Microsoft Clustering Service (MSCS) cluster that has a shared quorum.
Each of the six nodes runs Windows Server 2003. You need to recommend a solution to transition the
cluster to Windows Server 2008. The solution must maintain the availability of cluster services during
the transition. What should you recommend?
a) Evict one node at a time and rebuild the cluster by using Windows Server 2008
b) Evict five nodes from the cluster. Install Windows Server 2008 on the remaining node. Add five new
Windows Server 2008 nodes
d) On the MSCS, change the quorum type to a Majority Node Set (MNS) quorum. Install Windows
Server 2008 on all nodes
Question28 of 50
Your network contains an Active Directory domain. The domain contains 20 member servers. The
domain contains have two servers named Server1 and Server2 that run Windows Server 2008 R2. You
connect Server1 and Server2 to a logical unit number (LUN) on a Storage Area Network (SAN). You
create a failover cluster named Cluster1. You add Server1 and Server2 as nodes to Cluster1. You discover
that there are no cluster disks available for a new clustered file server service on Cluster1. You need to
ensure that you can add a clustered file server service to Cluster1. What should you do?
d) Configure Cluster1 to use a Node and File Share Majority quorum configuration
Question29 of 50
Server1 has a shared printer named Printer1. You need to track the usage for Printer1. The tracked
information must indicate the user that submitted the print job. You enable auditing for object access on
Server1. What should you do next?
Question30 of 50
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You perform a
normal backup of Server1 every Saturday. You need to implement a backup strategy for Server1 to meet
the following requirements: Minimize the time required to back up files. On weekdays, back up files that
have changed since the last backup.? Which type of backup should you perform on weekdays?
a) Copy
b) Daily
c) differential
d) Incremental
Question31 of 50
You plan to use only iSCSI for shared storage that runs Windows 2008. You plan to deploy servers that
run Microsoft SQL Server 2005 on the network. You need to recommend a high-availability solution for
the SQL Server 2005 servers to withstand the failure of any single hardware component. What should
you recommend?
a) Install a two node failover cluster that has multiple network cards.
b) Install a two node failover cluster that has a dual port teamed network card.
c) Install a Network Load Balancing cluster that has multiple network cards.
d) Install a Network Load Balancing cluster that has multiple teamed network cards.
Question32 of 50
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?
b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)
c) Create a Network Policy that defines Remote Access Server as a network connection method
d) Create a Network Policy that specifies EAP-TLS as the only available authentication method
Question33 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?
a) a file group
b) a file screen
d) a quota
Question34 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a
volume named E. From the File Server Resource Manager console, you create a new quota for volume E.
The quota is derived from the 100 MB limit quota template. You need to prevent users from storing
audio and video files on volume E. What should you do?
d) Modify the properties of the Audio and Video Files file group
Question35 of 50
Your network contains an Active Directory domain. The domain contains a print server named Server1.
Server1 runs Windows Server 2008 R2. You need to ensure that users can locate all shared printers on
Server1 by using Active Directory. What should you do from Server1?
b) Run dism.exe
Question36 of 50
What is the default share permissions when creating a new share in Microsoft Windows Server?
Question37 of 50
Your company has one main office and four branch offices. An Active Directory site exists for each office.
The network consists of one Active Directory domain. All servers run Windows Server 2008. The branch
offices are connected to the main office by slow and unreliable wide area network (WAN) links. Users
complain that WAN link failures prevent them from accessing files on remote servers. You need to
recommend a solution to maintain availability of files on the remote servers. The solution must meet the
following requirements: Support scheduling of WAN link traffic. Enable the connection to resume
immediately after a WAN link interruption. What should you recommend?
b) Use the File Server Resource Manager (FSRM) and create file screens
c) Use the File Replication Service (FRS) and replicate data to each branch office
Question38 of 50
You are the desktop administrator for your company. You want to centrally manage user settings on
your network. How do you achieve this?
a) roaming profile (ans)not sure
b) mandatory profile
c) hardware profile
d) local profile
Question39 of 50
The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?
b) Certificates snap-in
d) Windows Backup
Question40 of 50
You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:
1. All Internet communications must use the PKI for all authentication and data encryption.
2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network.
You need to connect to the main office to the branch office. You need to comply with the written
security policy. You install Routing and Remote Access servers in the perimeter network at each office.
What else should you do?
b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication
c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication
d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication
Question41 of 50
a) Mirroring
b) Stripping
d) Hot swap
Question42 of 50
You have a server that runs Windows Server 2008 R2 and has the Hyper-V server role installed.
You create a new virtual machine. You need to configure the virtual machine to meet the following
requirements:
- Allow network communications between the virtual machine and the host system.
ans b
Question43 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?
Question44 of 50
Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?
Question45 of 50
All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?
c) Install a Windows Server 2008 failover cluster that has shared storage.
d) Install a Windows Server 2008 failover cluster that has direct attached storage.
Question46 of 50
Question47 of 50
b) Urgency
c) Impact & Urgency matrix, usually agreed with the customer as well
Question48 of 50
The Problem Management process is intended to reduce both the number and severity of Incidents and
Problems on the business.
a) True
b) False
Question49 of 50
a) Only 4
b) 3 & 4
c) 1, 3 & 4
d) All
Question50 of 50
c) analyzing incidents that have been reported and solving the underlying cause
d) providing second-line support
Question1 of 50
Write the name of layer of the OSI model that maintains a connection between nodes?
a) Transport Layer
b) Session Layer
c) Physical Layer
d) Network Layer
Question2 of 50
Question3 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question4 of 50
Question5 of 50
a) RG-8
b) RG-11
c) RG-58
d) RG-59
Question6 of 50
Question7 of 50
a) 11111111.11111111.11100000.00000000
b) 00000000.00000000.00000000.00000111
c) 11111111.11111111.11111111.11100000
d) 00000000.00000111.11111111.11111111
Question8 of 50
You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
a) Assign each office a new class C private IP address range
c) Assign each office a subnet from a new class B private IP address range
d) Assign each office a subnet from the current class C private IP address range
Question9 of 50
You have a DHCP server named Server1 and an application server named Server2. Both servers run
Windows Server 2008 R2. The DHCP server contains one scope. You need to ensure that Server2 always
receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP.
What should you do?
Question10 of 50
Computers on the Sales subnet run Windows 7. These computers are dynamically assigned IP address
and configuration information from a DHCP server on the subnet. Computers on the development
subnet run Windows XP Professional. These computers are statically assigned IP address and
configuration information. Users on the Sales subnet report that they cannot communicate with users
on the development subnet. A user who works on computer3 reports that he cannot communicate with
computers on either subnet. You want all users to be able to communicate with other users on both
subnets.What should you do?
c) Change the default protocol on the computers on the Sales subnet to NWLink IPX/SPX/NetBIOS
Compatible Transport Protocol.
Question11 of 50
At some point during the name resolution process, the requesting party received an authoritative reply.
What further action is likely to be taken after this reply?
c) After receiving the authoritative reply, the resolution process is effectively over
d) Requests are submitted to the remaining authoritative servers to verify the validity of the reply
Question12 of 50
You are the network administrator for the Oslo branch office of Miracleinfocom. The Oslo office has a
Windows Server 2003 DNS server named Miracleinfocom3. Miracleinfocom3 hosts a DNS primary zone
named Miracleinfocom.com. All computers in the Oslo office are configured to use Miracleinfocom3 as
their preferred DNS server. The Budapest branch office of Miracleinfocom has a UNIX DNS server named
Miracleinfocom4. Miracleinfocom4 hosts a primary zone named engineering.Miracleinfocom.com. The
refresh interval of the engineering.Miracleinfocom.com zone is set to 24 hours. In the Budapest office, a
firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all
computers from the Oslo office network, except Miracleinfocom3, from performing DNS lookups against
Miracleinfocom4. There is a business requirement that no delay should occur between the time that a
new record is created n the engineering.Miracleinfocom.com zone and the time that the record can be
resolved from any computers in the Oslo office. All computers in the Oslo office must be able to resolve
names in the enginnering.Miracleinfocom.com namespace. You need to configure DNS on
Miracleinfocom3 to meet the requirements. What should you do?
Question13 of 50
Your network contains an Active Directory domain named contoso.com. The network has DirectAccess
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you
modify from the DirectAccess Setup console?
a) Application Servers
b) DirectAccess Server
c) Infrastructure Servers
d) Remote Clients
Question14 of 50
Your DNS zones are configured as AD-integrated. You must ensure that regular users are not allowed to
write to zones. What should you do?
Question15 of 50
Your network contains a DNS server named Server1 that runs Windows Server 2008 R2. You need to
ensure that client computers can resolve IPv6 addresses to fully qualified domain names (FQDNs). Which
type of resource record should you create?
a) Alias (CNAME)
c) Pointer (PTR)
d) Host (AAA
Question16 of 50
You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?
Question17 of 50
You install Windows Server 2003 on a computer that has a Non-Plug and Play video adapter. You want
to configure the video adapter to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting. What should you do?
Question18 of 50
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?
a) Start the computer in Safe Mode, and reformat the hard disk
b) Start the computer in debug mode, and reformat the hard disk
c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor
Question19 of 50
Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?
Question20 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Question21 of 50
You want to enable Remote Desktop on a Server Core installation of Windows Server 2008 and then
enable the server to accept connections from clients configured with RDP versions prior to 6.0. Which
commands should you use?
Question22 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?
a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.
c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.
d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
Question23 of 50
You are a help desk technician for your company. An employee named Marc is attempting to open a
Microsoft Word document Phonelist.doc by using Internet Explorer. However, when he types
http://Server1/Files/Phonelist.doc into the address bar in Internet Explorer, he receives the following
error message: 404: Page not found?!You verify that Phonelist.doc exists in a shared folder named Files
on Server1. You need to ensure that Marc can access Phonelist.doc by using Internet Explorer. What
should you do?
b) Grant Marcs domain user account Allow-Read permission on the File shared folder.
d) Instruct Marc to type file:\\server1\File\Phonelist.doc into the address bar in Internet Explorer
Question24 of 50
Your network consists of a single Active Directory domain. All domain controllers run Windows Server
2008. You need to capture all replication errors from all domain controllers to a central location. What
should you do?
Question25 of 50
a) Ntback
b) TSM
c) Ntbackup
d) Veritas
Question26 of 50
a) Print Server
b) File Server
c) Application Server
d) Web Server
Question27 of 50
a) 8 GB
b) 5 GB
c) 16 GB
d) 4 GB
Question28 of 50
Your network contains two servers named Server1 and Server2. Server1 runs Windows Server 2008 R2.
Server2 runs Windows Server 2008. You need to ensure that you can initiate a full server backup of
Server2 from Server1. What should you do?
Question29 of 50
a) The types of cmd command with the conditions are AppLocker: publisher, path, and file hash.
b) The types of AppLocker rule conditions are AppLocker: publisher, path, and file hash.
c) The types of Appbit Locker rule conditions are AppLocker: publisher, path, and file hash.
Question30 of 50
You currently automate backups of the System State data on the servers in your network by using
NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup
of the System State data. You need to select the correct method for performing a restoration of a
backup of the System State data. What should you do?
c) In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.
Question31 of 50
You are the administrator of ABC.com which has a 3 Node Active/Active/Passive Windows 2008 Cluster
for SQL Database using Disk and Node Majority Quorum Type . The Quorum disk is presented from an
EMC Storage. Due to Raid Group failure in the Storage, the disk presented for Quorum went down.
Cluster status will be?
c) Cluster will be online and no impact as Majority of the Node is available for Vote
Question32 of 50
You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?
c) Create a new quota template. Modify the quota for each folder
d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders
Question33 of 50
Question34 of 50
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?
b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group
d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner
Question35 of 50
Your company has a main office and two branch offices. Each office has a domain controller and file
servers. Your network consists of a single Active Directory domain. All servers run Windows Server 2008.
You need to plan the deployment of Distributed File System (DFS) to meet the following requirements:
Ensure that users see only the folders to which they have access
a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a hidden
share
b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each share to
be a hidden share
c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File Replication
Service (FRS)
d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS Replication
Question36 of 50
You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
b) Recommen for thirdparty file server solution like filers and configure the policy.
d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.
Question37 of 50
b) Compression
c) Disk quota
Question38 of 50
Question39 of 50
Question40 of 50
You network contains one Active Directory domain. All domain controllers run Windows Server 2008.
The network has 100 servers and 5,000 client computers. Client computers run either Windows XP
Service Pack 2 (SP2) or Windows Vista Service Pack 1 (SP1). You need to plan the deployment of
Certificate Services on the network to support the following requirements: Automatic certificate
enrollment Supported certificates for all client computers What should you include in your plan?
Question41 of 50
RAID 1 offers what type of fault tolerance?
a) Mirroring
b) Stripping
d) Hot swap
Question42 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?
Question43 of 50
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?
Question44 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. You plan to create an
image of Server1 to deploy to additional servers. You need to identify how many more times you can
rearm the Windows activation clock. What should you run on Server1?
a) msinfo32.exe
b) slmgr.vbs /dlv
c) slui.exe
d) winrm.vbs enumerate
Question45 of 50
Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?
c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.
d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM
Question46 of 50
a) Impact
b) Urgency
c) Impact & Urgency matrix, usually agreed with the customer as well
Question47 of 50
When the cause of one or more incidents is not known, additional resources are assigned to identify the
cause. Which ITIL process is responsible for this?
a) Capacity Management
b) Incident Management
c) Problem Management
Question48 of 50
Which ITIL process provides change proposals in order to eliminate recurring incidents?
c) Event Management
d) Problem Management
Question49 of 50
Question50 of 50
a) A)Problem management
b) B)Change Management
c) C)Access management
d) D)Event management
http://www.aiotestking.com/microsoft/2011/08/which-tool-should-you-use-25/
http://class10e.com/Microsoft?s=Which+coaxial+cable+type+would+be+used+with+Thicknet%3F+
http://tailieu.nhatnghe.com/resource/5.%5BEbooks%20Tieng%20Anh%5D/70-646.pdf
http://certificationpath.com/view/microsoft-70-643-practice-exam/questions
Set 6:
1 of 50
Windows clustering provides which of the following benefits?
a) High-availability
b) Network load balancing
c) Component load balancing
d) All of the above
Question2 of 50
What is the middle layer of the OSI reference model?
a) Application
b) Session
c) Transport
d) Data Link
Question3 of 50
A message is associated with which layer of the OSI reference model?
a) Application
b) Transport
c) Network
d) Data Link
Question4 of 50
Which of the following IRQs are used for LPT1?
a) 1
b) 3
c) 5
d) 7
5 of 50
What is another name for 10Base5 ?
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
Question6 of 50
Under the rules of Telnet option negotiation, a host:
a) Can renegotiate options already established
b) Can begin data exchange even before negotiation is completed
c) Must accept the options proposed
d) Can say no to a proposed option
Question7 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4
Question8 of 50
Assume that you are the administrator of your companys network, which serves a single site
with 150 users. The network includes eight servers running Windows 2008 servers. One server
hosts your internal web site. All servers have static IP addresses in the range from 10.1.1.2
through 10.1.1.10. All client computers run Windows XP Professional and are DHCP clients,
using an address range of 10.1.1.11 through 10.1.1.200. You need to provide internet access to
internal users. To do so, you plan to use a pool of 100 IP addresses supplied by a contracted
internet service provider. Your solution must involve the least possible administrative effort.
What should you do?
a) Allow all client computers to use automatic Private IP addressing for IP address
assignment.Configure all servers to use static IP addresses in the 192.168.0.0 subnet.
b) Install a server for network address translation. Add the IP address of the private interface of
this server to the excluded range on your DHCP server. Change the IP address of the private
interface for the network address translation protocol to 10.1.1.201.
c) Install a server for network address translation and enable the default DHCP allocator. Add
the existing server addresses to the excluded range. Change the IP address of the private
interface for the network Address Translation protocol to 10.1.1.201
d) Map internal addresses and port numbers of your servers to the pool of IP addresses and
port numbers assigned by your internet service provider.
Question9 of 50
You are the desktop administrator for your company. You are using RIS to install Windows XP
Professional on a new computer. You start the computer, but instead of connecting to your
network RIS server, your computer returns the following error message, Operating system not
found ᄑ. You verify that the computer contains a PXE-compliant network adapter that is
connected to your network. You need to start the computer and connect to your network RIS
server.What should you do?
a) Ask a network administrator to modify the network DHCP server to include a DHCP
reservation for the computer.
b) Ask a network administrator to modify the RIS server permissions to grant your domain user
account Allow-Read permission on the RIS images.
c) Modify the computers BIOS settings, and ensure that the computer is configured to boot
from the network.
d) Modify the computers BIOS settings, and ensure that the computers boot password is the
same as the RIS servers Administrator password
Question10 of 50
You want to install windows 7 on 30 PXE-compliant computers and 35 non-PXE-compliant
computers. All 65 computers are included on the current hardware compatibility list (HCL). You
create a RIS image. You load the Image on the RIS server. You then start the 65 computers. You
find that the 30 PXE-Compliant computers can connect to the RIS server. However, the 35 non-
PXE-compliant computers are not able to connect to the RIS server. You want the 35 non-PXE
compliant computers to connect to the RIS server. What should you do?
a) Run Rbfg.exe to create a Non-PXE-compliant startup disk
b) Run Riprep.exe to create a non-PXE complaint startup disk
c) Grant the everyone group NTFS Read permission for the RIS image
d) Grant the Administrators group NTFS Read permission for the RIS image
Question11 of 50
What is the main purpose of a DNS server?
a) To resolve IPX addresses into NetBIOS names
b) To resolve IP addresses into NetBIOS names
c) To resolve IP addresses into FQDN names
d) To resolve FQDN names into NetBIOS names
Question12 of 50
Your network contains a single Active Directory domain named contoso.com. The domain
contains a DNS server named Server1 that hosts the contoso.com zone. The network is
connected to the network of a partner company. The partner companys network contains a
DNS server that hosts a zone named nwtraders.com. You need to ensure that computers in
contoso.com can resolve the names of computers in nwtraders.com. The solution must not
require any changes to the zone configuration of nwtraders.com. What should you configure on
Server1?
a) a conditional forwarder
b) a GlobalNames zone
c) a secondary zone
d) a zone delegation
Question13 of 50
Your network contains an Active Directory domain named contoso.com. The domain contains
two domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a
primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com. You need to
ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must
provide authoritative responses to client computers. What should you do?
a) Convert the contoso.com zone to an Active Directory-integrated zone
b) Configure the contoso.com zone to use DNSSEC
c) Create a new delegation in the contoso.com zone
d) Modify the zone transfer settings of the contoso.com zone
Question14 of 50
The different records held by primay DNS server are?
a) PTR
b) All of the options
c) NS
d) MX
Question15 of 50
Which Service is mandatory for a File and Print server?
a) File replication service
b) Server
c) Print spooler
d) All the Above
Question16 of 50
To communicate between DNS client and a WINS Client, what parameter you will configure?
a) Not possible to communicate
b) DNS parameter in WINS
c) WINS parameter in DNS
d) all the options
Question17 of 50
When would you use the WINS Service?
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to
resolve NetBIOS names to IP address statically.
b) When you need to resolve host an IP address
c) When you need to give each host an IP address
d) When you need to resolve NetBIOS names to IP address dynamically.
Question18 of 50
You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?
a) Windows Explorer
b) Efsinfo
c) Syskey
d) Cipher
Question19 of 50
You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify
user accounts that have multiple Terminal Services connections to Server1. Which tool should
you use?
a) Remote Desktop
b) Terminal Server Licensing
c) Terminal Services Configuration
d) Terminal Services Manager
Question20 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to
end any sessions that are inactive for more than one hour. What should you do?
a) From Terminal Services Manager, create a new group.
b) From Terminal Services Manager, delete the inactive sessions.
c) From Terminal Services Configuration, modify the RDP-Tcp settings.
d) From Terminal Services Configuration, modify the User logon mode setting
Question21 of 50
You have recently created and distributed RDP files for a certain RemoteApp program.
However, you find that the application performs poorly and needs to be migrated to a more
powerful server. What should you do to ensure that users can connect to the RemoteApp
program after it is migrated?
a) Create a new TS Web Access site for the new terminal server and publish the application to
the new site and Re-create an RDP file for the RemoteApp program after the migration and
distribute the file to users
b) TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so
that the server name listed is the new terminal serve
c) Modify the properties of the existing RDP file and re-distribute the file to users
d) All the above
AB
Question22 of 50
Your network consists of one Active Directory domain. All servers run Windows Server 2008.
You plan to publish a Web site on two Web servers. You need to recommend a solution for the
deployment of the two Web servers. The solution must provide the following requirements:
Session-state information for all users Access to the Web site if a single server fails Scalability to
as many as seven Web servers Support for multiple dedicated IP addresses for each Web server
What should you recommend?
a) Install failover clustering on each Web server
b) Install Network Load Balancing on each Web server
c) Assign multiple bindings in Internet Information Services (IIS) 7.0
d) Create managed handler mappings in Internet Information Services (IIS) 7.0
Question23 of 50
Your organization includes two servers named Server1 and Server2 that run Windows Server
2003 Service Pack 2 (SP2). Server1 and Server2 host the same Web sites. You need to back up
the server configuration on Server1 every hour and then apply the configuration to Server2.
Which command should you use?
a) IISBack.vbs /backup
b) IISBack.vbs /list
c) IISCnfg.vbs /copy
d) IISCnfg.vbs /save
Question24 of 50
Which of the following statement about user environment policies is correct?
a) User policies are only applicable to Windows 2003/XP clients
b) User policies are applied only upon user logon, whereas computer policies are applied at the
end of the boot process and upon user logon
c) User policies are applied only upon user logon, whereas computer policies are applied at the
end of the boot process
d) None of them
Question25 of 50
Your network contains a Windows Server Update Services (WSUS) server named Server1. You
need to configure all WSUS client computers to download approved updates directly from the
Microsoft Update servers. The solution must ensure that all WSUS client computers report
successful installation of updates to Server1. What should you do?
a) From Active Directory, deploy a Group Policy object (GPO)
b) From Server1, modify the Update Source and Proxy options
c) From the WSUS client computers, modify the local computer policy
d) From Server1, modify the Update Files and Languages options
Question26 of 50
In Windows 2003, a workgroup is referred as
a) Client/server network
b) peer network
c) domain
d) all of the above
Question27 of 50
What type of memory needs a constant refresh?
a) ROM
b) Harddisk
c) DRAM
d) SRAM
Question28 of 50
Your network contains two servers named Server1 and Server2. Server1 runs Windows Server
2008 R2. Server2 runs Windows Server 2008. You need to ensure that you can initiate a full
server backup of Server2 from Server1. What should you do?
a) Install Windows Server Backup on Server2
b) Upgrade Server2 to Windows Server 2008 R2
c) Add an exception to Windows Firewall on Server2
d) Add your user account to the Backup Operators group on Server2
Question29 of 50
Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core
b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely
manage Windows Server 2008 R2 Server Core
c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core enable by using the SConfig tool.
d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core and enable by using the SConfig tool. ()
Question30 of 50
You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
You need to track all authentication attempts on Server1. What should you do?
a) Enable auditing of logon event events in Server1s local policy.
b) Enable auditing of logon event events in the Default Domain Controller Policy.
c) Enable auditing of account logon event events in Server1s local policy.
d) Enable auditing of account logon event events in the Default Domain Controller Policy.
Question31 of 50
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to
monitor the performance of the VPN server for one day. What should you do?
a) From the Performance console, create a trace log.
b) From the Performance console, create a counter log.
c) Install Network Monitor Tools. From Network Monitor create a new capture.
d) Install Network Monitor Tools. From Network Monitor create a new parser file.
Question32 of 50
Your network contains one Active Directory domain. You have a member server that runs
Windows Server 2008 R2. You need to immediately disable all incoming connections to the
server. What should you do?
a) From the Services snap-in, disable the IP Helper
b) From the Services snap-in, disable the Netlogon service
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question33 of 50
What is the primary purpose of an ACL?
a) It controls access to resources.
b) It explicitly allows or denies access to a particular resource.
c) It explicitly defines users and their respective access rights to a particular resource.
d) All of them
Question34 of 50
Assume that you are the administrator of your companys network. You receive a request from
Stephens manager to disable Stephens access to a network share named Financial. Stephens
user account is the only member in a group named Reports. The Reports group has Full Control
permission to the Financial share. You delete the Reports group. You later find out that the
manager was in error and that Stephen should have his access to Financial share restore What
should you do?
a) Re-create Reports and re-create Stephens user account. Use existing NTFS permissions.
b) Re-Create Reports and grant Reports NTFS Full Control permission to Financial. Stephens
user account will still be a member of Reports.
c) Re-create Reports and grant Reports Full Control permission to Financial. Add Stephens user
account to Reports.
d) Re-Create Reports and add Stephens existing user account to Reports. Use existing NTFS
permissions.
Question35 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\
contoso.com\dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The
domain contains two servers named Server1 and Server2 that run Windows Server 2008 R2.
Server1 is configured as a namespace server for \\contoso.com\dfs. You need to migrate \\
contoso.com\dfs to Windows Server 2008 mode. You install the Distributed File System role
service on Server2. What should you do next?
a) At the command prompt, run dfsutil root export \\contoso.com\dfs c:\dfs.xml
b) Configure Server2 as a namespace server for \\contoso.com\dfs
c) At the command prompt, run dfsutil root adddom \\contoso.com\dfs v2
d) Create a new shared folder named DFS on Server2
Question36 of 50
Your company has a main office and two branch offices. Each office has a domain controller and
file servers. Your network consists of a single Active Directory domain. All servers run Windows
Server 2008.
You need to plan the deployment of Distributed File System (DFS) to meet the following
requirements:
Ensure that users see only the folders to which they have access
Ensure that users can access the data locally
Minimize the bandwidth required to replicate data.
What should you include in your plan?
a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a
hidden share
b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each
share to be a hidden share
c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File
Replication Service (FRS)
d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS
Replication
Question37 of 50
What Command is used to view all the share folders in a system?
a) net share c:
b) net share
c) net share test
d) All the Options
Question38 of 50
You are the desktop administrator for your company. You want to centrally manage user
settings on your network. How do you achieve this?
a) roaming profile
b) mandatory profile
c) hardware profile
d) local profile
Question39 of 50
How would you back up a Certificate Authority installation?
a) Use the certutil -backup command
b) Perform a Copy backup
c) Create a new AD DS snapshot
d) Use the certmgmt -backup command
Question40 of 50
The server contains one volume. You install Certificate Services. You need to back up the
Certificates Services database by using the minimum amount of storage space. Which tool
should you use?
a) Certification Authority snap-in
b) Certificates snap-in
c) Certificate Templates snap-in
d) Windows Backup
Question41 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role
installed. You create a new virtual machine and perform an installation of Windows Server 2003
on the virtual machine. You configure the virtual machine to use the physical network card of
the host server. You notice that you are unable to access network resources from the virtual
machine. You need to ensure that the virtual host can connect to the physical network. What
should you do?
a) On the host server, install the Microsoft Loopback adapter
b) On the host server, enable the Multipath I/O feature
c) On the virtual machine, install the Microsoft Loopback adapter
d) On the virtual machine, install Microsoft Hyper-V Integration Components
Question42 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role
installed. You need to merge a differencing disk and a parent disk. What should you do?
a) Edit the parent disk
b) Inspect the parent disk
c) Edit the differencing disk
d) Inspect the differencing disk
Question43 of 50
Your network contains an Active Directory domain named contoso.com. All servers run
Windows Server 2008 R2. A server named Server1 has the Windows Deployment Services
(WDS) server role installed. A custom Windows 7 image is available for download from Server1.
A server named Server2 has the Hyper-V server role installed. You create a virtual machine
(VM) named VM1 on Server2. You need to deploy the Windows 7 image from Server1 to VM1.
What should you do first?
a) On Server1, configure a multicast transmission
b) On Server1, adjust the PXE Response Delay setting
c) From the properties of VM1, install a legacy network adapter
d) From the properties of VM1, install a synthetic network adapter
Question44 of 50
Which level of RAID provides mirroring only?
a) 0
b) 1
c) 2
d) 3
Question45 of 50
Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-
V.VS1 hosts 10 virtual machines. You need to configure VS1 to shut down each virtual machine
before the server shuts down. What should you do?
a) Create a shutdown script on each virtual machine.
b) Install Integration Services on each virtual machine.
c) Enable the Turn off the virtual machine option in the Automatic stop action properties on
each virtual machine.
d) Enable the shut down the virtual machine option in the Automatic stop action properties on
each VM
Question46 of 50
Do all problem solutions need to be mandatorily implemented?
a) Yes, all of them need to be implemented.
b) No, none of them need to be implemented.
c) On a case on case basis, post discussion with the customer.
d) All of the above
Question47 of 50
Incident and Service requests are the same
a) Yes
b) Yes, both are reported to the Service desk
c) No, although both may be reported to the service desk
d) None of the above
Question48 of 50
The Problem Management process is intended to reduce both the number and severity of
Incidents and Problems on the business.
a) True
b) False
Question49 of 50
Which of the following are the two types of problem management?
a) Reactive and Informative
b) Preventive and Retrospective
c) Reactive and Proactive
d) Retrospective and Proactive
Question50 of 50
Which of the following is NOT a Service Operation process?
a) A)Problem management
b) B)Change Management
c) C)Access management
d) D)Event management
Which layer of the OSI reference model uses the hardware address of a device to ensure
message delivery to the proper host on a LAN?
A.
physical
B.
data link
C.
network
D.
transport
Which layer in the OSI model is used to verify that data was delivered without error?
A.
Physical
B.
Data Link
C.
Network
D.
Transport
Set 7:
1.Assume that you are the administrator of your companys network. Your web server is configured to
run a third party Web application for users on your network. Another network administrator in your
company has recently made some configuration changes to secure the server. Users report that each
time they try to connect to a secure web server, they receive the following error message, Web page
requested is not available? n Users have no problem connecting to FTP, and you have verified that the
web service has started You want to discover why users are receiving the error message. What should
you do to diagnose the problem?
a) Verify that port 21 and port 20 are permitted in your TCP/IP filter.
c) Verify that the connect NTFS file permissions are on the web pages.
d) Verify that the port 80 is permitted in your TCP/IP filter.
Ans:
a) 1
b) 3
c) 5
d) 7
ans: d)
a) RG-8
b) RG-11
c) RG-58
d) RG-59
ans: a)
a) Repeater
b) Switch
c) Bridge
d) Gateway
ans: d)
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
ans: d)
a) 24 bits
b) 28 bits
c) 32 bits
ans: b)
7.Which standard divides the data link layer into the LLC and the MAC sublayers?
a) 802.1
b) 802.2
c) 802.3
d) 802.4
ans: b)
Question8 of 50
Write the name of layer of the OSI model that maintains a connection between nodes?
a) Transport Layer
b) Session Layer
c) Physical Layer
d) Network Layer
ans: b)
Question9 of 50
Your network has a DHCP server that runs the 64-bit version of Windows Server 2008. The network only
uses IPv4. You plan to deploy 50 new Windows Server 2008 servers. Some of the new servers contain
64-bit hardware and some of the servers contain 32-bit hardware. All of the new server hardware
supports Pre-Boot Execution Environment (PXE). You need to plan for the automated deployment of the
new servers. You want to achieve this goal while minimizing hardware costs. What should you include in
your plan?
b) Deploy Remote Installation Services (RIS) on a 64-bit server that runs Windows Server 2003
c) Deploy Windows Deployment Services (WDS) on two servers that run Windows Server 2008. One of
the servers is a 64-bit server, and the other server is a 32-bit server
d) Deploy Remote Installation Services (RIS) on two servers that run Windows Server 2003 Service Pack
2. One of the servers is a 64-bit server, and the other server is a 32-bit server
ans: a)
Question10 of 50
a) TRUE
b) false
Question11 of 50
Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. You need to
ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet.
What should you configure?
c) Trust Anchors
d) Windows Firewall
ans: D)
Question12 of 50
You want to ensure that DNS zone content is secured and that no user can write to DNS zones.
a) Secondary
b) Caching
c) Stub
d) AD-integrated
ans: d)
Question13 of 50
You want to perform maintenance task on a domain controller but you want the services of DNS and
DHCP available. Servers must have the less down time possible. What should you do?
ans: a)
Question14 of 50
You have a domain controller that runs Windows Server 2008 and is configured as a DNS server. You
need to record all inbound DNS queries to the server. What should you configure in the DNS Manager
console?
Question15 of 50
Your network contains a DNS server named Server1 that runs Windows Server 2008 R2. You need to
ensure that client computers can resolve IPv6 addresses to fully qualified domain names (FQDNs). Which
type of resource record should you create?
a) Alias (CNAME)
c) Pointer (PTR)
d) Host (AAA
ans: C)
Question16 of 50
a) DHCP
b) WINS
c) DNS
d) IIS
ans: b)
Question17 of 50
c) WANs
d) MANs
ans: a)
Question18 of 50
You install Windows Server 2003 on a computer that has a Non-Plug and Play video adapter. You want
to configure the video adapter to use 16-bit color and 1024 x 768 resolution. The color setting for the
video adapter is set to 16 colors, and you cannot change that setting. What should you do?
Ans: d)
Question19 of 50
a) Remote administration
b) Deployment of application
ans: c)
Question20 of 50
Five Windows Server 2008 servers that have Terminal Services installed. You plan to establish a
Terminal Services server farm. You need to ensure that the server farm meets the following
requirements: New users automatically connect to the terminal server that has the fewest active
sessions. Disconnected users are redirected to the server that contains their previous session. What
should you implement?
b) Round-robin DNS
ans: d)
Question21 of 50
You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2008. Terminal Services installed on three servers
running Windows 2008 Server. You need to ensure that uses can access the application installed in
Terminal Servers during RDP/terminal session, at the same time you need to ensure the load
distribution to all three Terminal Servers. You also need to ensure that user should be able to connect
back to his session if he disconnects by mistakenly disconnection due to time out.
b) Install and configure Terminal Server Load distribution thrpough Hardware Load balancer as it doesnt
support NLBS.
d) Install and configure all three Windows Servers using Windows NLBS and configure the TS session
broker service to achieve the goal.
Ans: d)
Question22 of 50
Your network consists of one Active Directory domain. All servers run Windows Server 2008. You plan to
publish a Web site on two Web servers. You need to recommend a solution for the deployment of the
two Web servers. The solution must provide the following requirements: Session-state information for
all users Access to the Web site if a single server fails Scalability to as many as seven Web servers
Support for multiple dedicated IP addresses for each Web server What should you recommend?
ans: B)
Question23 of 50
You are working as a system administrator for Wipro.com. You got a complaint that none of the people
could be able to upload the files but they can download the files from the FTP site which you have
created. What could be reason behind it?
ans: b)
Question24 of 50
Your company runs Windows Server Update Services (WSUS) on a server named Server1. Server1 runs
Windows Server 2008 R2. Server1 is located on the company intranet. You configure the WSUS Web site
to use SSL. You need to configure a Group Policy object (GPO) to specify the intranet update locations.
Which URL should you use?
a) http: //SERVER1
b) http: //SERVER1:8080
c) https: //SERVER1:8080
d) https: //SERVER1
ans: d)
Question25 of 50
a) Regedit
c) Sysinfo
d) by using the manage computer Properties
ans: b)
Question26 of 50
You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).
Server1 is the site license server for the Default-First-Site-Name site. You need to configure Server2 to
be the site license server. What should you do?
a) From the Licensing console on Server1, modify the Products View configuration.
b) From the Licensing Control Panel applet on Server2, modify the Replication configuration.
c) From the Active Directory Sites and Services console, modify the Licensing Site Settings.
d) From the Active Directory Users and Computers console, modify the AdminSDHolder object.
Ans: c)
Question27 of 50
Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core
b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core
c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.
d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.
Ans: d)
Question28 of 50
You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster.
All nodes have access to a SAN, and adequate storage is available. Which of the following options should
you choose for your quorum configuration?
a) Node And File Share Majority
d) Node Majority
ans:b)
Question29 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?
a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.
b) Restore the Documents and Settings folder that contains the WorkProduct folder.
c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.
d) Restore Peters WorkProduct folder, and choose the original location for the restoration.
Ans: d)
Question30 of 50
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
implement a backup schedule on Server1 to meet the following requirements: Everyday, back up all files
and folders to disk. Every Friday, back up all files and folders to tape Every Sunday, Tuesday, and
Thursday, back up only the files and folders that have changed since the previous Fridays backup to
tape. Which backup jobs should you create?
a) a normal backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday, and Thursday
b) a normal backup to disk everyday a normal backup to tape on Friday an incremental backup to tape
on Sunday, Tuesday, and Thursday
c) a copy backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday and, Thursday
d) a copy backup to disk everyday a normal backup to tape on Friday an incremental backup to tape on
Sunday, Tuesday and, Thursday
ans: c)
Question31 of 50
You want to make Dinesh a member of the Backup Operators group. Which of the following statements
about the Backup Operators group is correct?
a) By default, only Administrators and Power Users can be members of the Backup Operators group.
b) Backup Operators do not require any additional permissions to NTFS file systems in order to back up
and restore the file system
d) Backup Operators can modify any services that relate to system backup
ans: b)
Question32 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?
a) a file group
b) a file screen
d) a quota
ans: c)
Question33 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. On Server1, you
create a disk quota for volume E that limits storage to 200 MB for all users. You need to ensure that a
user named User1 can store files that are larger than 200 MB on volume What should you do?
a) From File Server Resource Manager, create a file screen exception
ans: c)
Question34 of 50
You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?
c) Create a new quota template. Modify the quota for each folder
d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders
ans: a)
Question35 of 50
Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?
a) Disable referrals
ans: c)
Question36 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
DFS1. You have two servers named Server1 and Server2 that are configured as namespace servers for \\
contoso.com\DFS1. You need to verify that the DFS namespace replicates successfully between Server1
and Server2. Which tool should you use?
a) Dfscmd
b) Dfsdiag
c) Dfsrdiag
d) Dfsutil
ans: c)
Question37 of 50
Your network contains a file server that runs Windows Server 2008 R2. You create a shared folder on the
server. You need to ensure that an administrator is notified whenever a user saves .exe files to the
shared folder. What should you do?
ans: b)
Question38 of 50
a) Security
b) Compression
c) Disk quota
ans: d)
Question39 of 50
c) Both A & B
d) Neither A nor B
ans: c)
Question40 of 50
You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:
1. All Internet communications must use the PKI for all authentication and data encryption.
2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network. You need to connect to the main office to the branch office. You need to
comply with the written security policy. You install Routing and Remote Access servers in the perimeter
network at each office. What else should you do?
b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication
c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication
d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication
ans: d)
Question41 of 50
a) 0
b) 1
c) 3
d) 5
ans: b)
Question42 of 50
Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?
ans: d)
Question43 of 50
Your network contains two servers that have the HyperV server role installed. You install the Failover
Clustering feature on both servers. You add both servers as nodes in the cluster. You need to ensure
that you can perform live migrations of individual virtual machines (VMs) between the nodes. The
solution must minimize the number of volumes required to host the VMs. What should you do first?
b) From HyperV Manager on each server, modify the default location for the virtual hard disks (VHDs)
c) From Failover Cluster Manager, modify the quorum settings of the cluster
d) From HyperV Manager on each server, modify the default location for the virtual machine
configuration files
and: a)
Question44 of 50
Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?
ans: a)
Question45 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1. You add an additional hard disk to Server1. The hard disk is
configured as a basic disk. You need to configure VM1 to use the new hard disk as a passthrough disk.
What should you do before you configure the passthrough disk?
ans: D)
Question46 of 50
Incident management is the process responsible for managing the lifecycle of all incidents
a) TRUE
b) FALSE
ans: a)
Question47 of 50
a) Impact
b) Urgency
c) Impact & Urgency matrix, usually agreed with the customer as well
ans: c)
Question48 of 50
ans: c)
Question49 of 50
The cash registers in a supermarket experience network disruptions daily between 4 p.m. and 6 p.m
REPEATEDLY. Which ITIL process is responsible for solving these difficulties?
a) Availability Management
b) Capacity Management
c) Incident Management
d) Problem Management
ans: d)
Question50 of 50
c) analyzing incidents that have been reported and solving the underlying cause
ans: b)
Set 8:
Question1 of 50
a) Application
b) Transport
c) Network
d) Data Link
ans: a)
Question2 of 50
a) This command-line diagnostic tool helps to isolate networking and connectivity problems by
performing a series of tests to determine the state of your network client. These tests and the key
network status information they expose give network administrators and support personnel a more
direct means of identifying and isolating network problems b) This GUI diagnostic tool helps to isolate
networking and connectivity problems by performing a series of tests to determine the state of your
network client. These tests and the key network status information they expose give network
administrators and support personnel a more direct means of identifying and isolating network
problems
c) its third part tool and Microsoft suggested not to use this tool in medium and large setup.
d) None of the above
ans: a)
Question3 of 50
ans: b)
Question4 of 50
a) 1
b) 3
c) 5
d) 7
ans: d)
Question5 of 50
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
ans: c)
Question6 of 50
b) Binding manager
c) Redirector
d) The registry
Ans:a
Question7 of 50
Which standard divides the data link layer into the LLC and the MAC sublayers?
a) 802.1
b) 802.2
c) 802.3
d) 802.4
Ans:b
Question8 of 50
a) MILNET
b) ARP/RARP
c) TCP/IP
d) Internet
Ans:d
Question9 of 50
Your company has one office in Montreal and one office in New York. Each office has 2,000 client
computers configured as DHCP clients. DHCP relay is not supported on the network routers. The
network consists of one Active Directory domain. You need to recommend a DHCP addressing solution
for both offices. The solution must meet the following requirements: Minimize traffic between offices.
Be available if a single server fails. What should you recommend?
d) In the Montreal office, install a DHCP instance on a two node failover cluster. In the New York office,
install a DHCP Relay Agent
ans: b)
Question10 of 50
a) TRUE
b) false
c) NA
d) Not sure
Question11 of 50
ans: c)
Question12 of 50
You want to ensure that DNS zone content is secured and that no user can write to DNS zones.
a) Secondary
b) Caching
c) Stub
d) AD-integrated
ans: d)
Question13 of 50
You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?
a) Allow zone transfers to any server (Zone Transfer tab in zone properties)
b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone
c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)
ans: b)
Question14 of 50
Your company has a domain controller named Server1 that runs Windows Server 2008 R2. Server1 has
the DNS Server server role installed. You need to configure the DNS server to resolve IP addresses to
host names. Which record should you create?
a) Pointer (PTR)
Question15 of 50
a) PTR
c) NS
d) MX
Question16 of 50
To communicate between DNS client and a WINS Client, what parameter you will configure?
Question17 of 50
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.
Question18 of 50
b) Repair the WINS server and upgrade the server to Windows 2008 Server.
Question19 of 50
How will you administer Windows Server 2008 R2 from the workstation where you cannot install
Windows Server Remote Administration Tools?
b) You can still use Remote Desktop for remote administration, if it is disabled on the target server, if
you have permissions and firewall is blocking the connection.
c) You can still use Remote Desktop for remote administration, if it is enabled on the target server, if
you have permissions and firewall is not blocking the connection.
d) None of the above
Question20 of 50
You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS
Gateway) role service installed. You need to provide a security group access to the TS Gateway server.
What should you do?
Question21 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Question22 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?
a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.
c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.
d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
Question23 of 50
Question24 of 50
a) Printer properties
b) Spooler Printer
c) Print Spool
d) Print Spooler
Question25 of 50
a) Format
b) Sharing
c) Delete
d) Copy
Question26 of 50
b) File Server
c) Application Server
d) Web Server
Question27 of 50
a) 8
b) 32
c) 16
d) 9
Question28 of 50
What is the advantage that the 64-bit environment has over the 32-bit environment?
a) Price
b) Performance
c) Application Support
Question29 of 50
All servers run Windows Server 2003. A network server named Server1 functions as the main file server.
Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by
using the Backup utility. You discover that files that are open during the backup process are not being
backed up. You need to ensure that open files should be backed up successfully. What should you do?
a) Enable volume shadow copies on the partitions that are being backed up
b) Disable volume shadow copies on the partitions that are being backed up.
c) Select the Verify data after backup check box in the Advanced backup options of the backup job.
d) Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
Question30 of 50
Your network consists of one Active Directory domain named ABC.COM. The domain contains three
Windows Server 2008 servers named Server1, Server2, and Server3. Server1 runs Active Directory
Certificate Services (AD CS) and is configured as an enterprise root certification authority. Server2 hosts
an internal Web site. Users currently connect to the Web site by using the URL https://server2.abc.com.
You plan to replicate the Web site from Server2 to Server3. You need to recommend a solution to
enable users to connect to the Web site through HTTPS on either Server2 or Server3 by using a single
URL. The solution must meet the following requirements: Users must be able to use the
https://www.abc.com URL to connect to the Web site. Incoming connections must be dynamically
balanced between Server2 and Server3. What should you recommend?
a) Add both servers to a Network Load Balancing cluster. Export the Web server certificate on Server2
to Server3
b) Add both servers to a failover cluster. Issue a Web server certificate for www.abc.com. Install the
certificate on Server2
c) Add both servers to a Network Load Balancing cluster. Issue a Web server certificate for
www.abc.com. Install the certificate on Server2 and Server3
d) Add both servers to a failover cluster. Issue a Web server certificate for server2.abc.com and install
the certificate on Server2. Issue a Web server certificate for server3.abc.com and install the certificate
on Server3
Question31 of 50
Maximum number of Nodes supported in Windows 2008 standard server Load Balancing and cluster
Question32 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question33 of 50
c) It explicitly defines users and their respective access rights to a particular resource.
d) All of them
Question34 of 50
You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?
a) Attrib.exe
b) Cacls.exe
c) Dsacls.exe
d) Dsmod.exe
Question35 of 50
You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
a) Configure the Disk Quota and file screening policy.
b) Recommen for thirdparty file server solution like filers and configure the policy.
d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media
files.
Question36 of 50
a) TRUE
b) false
c) NA
d) NOT SURE
Question37 of 50
a) Security
b) Compression
c) Disk quota
Question38 of 50
a) net share c:
b) net share
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?
c) Configure the Certification Authority Web Enrollment Role Service on a member server
d) Configure the Certification Authority Web Enrollment Role Service on a domain controller
Question40 of 50
You have added the AD CS role to your server and configured group policy to enroll users
Question41 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?
Question42 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:
- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network
b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network
c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network
d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network
Question43 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?
Question44 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?
d) From the HyperV Manager console, rightclick VM1 and click Revert
Question45 of 50
Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?
Question46 of 50
b) There will be no failures in applications and infrastructure associated with the service
c) All service-related problems are fixed free of charge for a certain period of time
Question47 of 50
b) The term Event is also used to mean an Alert or notification created by any IT Service,configuration
Item or Monitoring tool.
c) Events typically require IT Operations personnel to take actions,and often lead to Incidents being
logged
d) All of above
Question48 of 50
Which of the following statements about Supplier and Contract Database (SC are correct?
1. A database or structured Document used to manage Supplier Contracts throughout their Lifecycle.
a) 1 & 2 only
b) 1,2 & 3
c) 1,2 & 4
d) All of above
Question49 of 50
In which core publication can you find detailed descriptions of the following?
2. Demand Management
3. Financial Management
a) Service Operations
b) Service Strategy
c) Service Transition
Question50 of 50
a) To standardize operation
Set 9:
Question1 of 50
You suspect that a stale record is incorrectly returned by your internal DNS server, and you wish to
empty the server cache. Which ONE of the following action will achieve this?
d) All of them
Ans-b
Question2 of 50
Which ITIL process handles the implementation of the policy for access management and access to
information systems?
a) Availability Management
b) Incident Management
c) Release Management
d) Security Management
Ans-d
Question3 of 50
Your network contains an Active Directory domain named contoso.com. The network has DirectAccess
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to DirectAccess client computers. Which settings should you
modify from the DirectAccess Setup console?
a) Application Servers
b) DirectAccess Server
c) Infrastructure Servers
d) Remote Clients
Ans-c
Question4 of 50
You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify user
accounts that have multiple Terminal Services connections to Server1. Which tool should you use?
a) Remote Desktop
Ans-d
Question5 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Ans-c
Question6 of 50
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?
Ans-b
Question7 of 50
Which tools can you use to manage printers on Windows 2000/2003 computers?
b) Internet Explorer
d) 1 and 2
Ans-a
Question8 of 50
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). You need to track the
amount of disk space used by each user on the server. What should you do?
d) From the Local Security Policy, enable auditing for object access.
Ans-b
Question9 of 50
Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?
a) Disable referrals
Ans-c
Question10 of 50
b) A TCP/IP address
Ans-c
Question11 of 50
Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB
of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to
prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS
replication traffic is minimized. Which tool should you use to prestage the Folder1 data?
a) Dfscmd
b) Dfsrmig
c) Dfsutil
d) Wbadmin
Ans-d
Question12 of 50
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?
a) Start the computer in Safe Mode, and reformat the hard disk
b) Start the computer in debug mode, and reformat the hard disk
c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor
Ans-c
Question13 of 50
You want to see if any broken links are there in your Web site. Which tool do you use?
a) NT Explorer
c) User Manager
d) Performance Monitor
Ans-b
Question14 of 50
Which command launches the file signature verification tool that is used to identify unsigned drivers
installed on a windows 2003 Server?
a) Winmsexe
b) Fsutil.exe
c) Sigverif.exe
d) Regedit.exe
Ans-c
Question15 of 50
Your network contains two servers named Server1 and Server2 that run Windows Server 2008.
Microsoft System Center Operations Manager (SCOM) 2007 is installed on Server2. The Hyper-V role is
installed on Server1. Server1 hosts five child virtual machines that run Windows Server 2003. You need
to recommend a solution that enables administrators to monitor the child virtual machines. The solution
must gather the following data from the virtual machines: Performance statistics Event data from the
application log What should you recommend?
d) On Server2, install Microsoft System Center Virtual Machine Manager (SCVMM) 2007
Ans-b
Question16 of 50
Which of the following is a transport-layer protocol?
a) NetBEUI
b) NetBIOS
c) NDOS
d) PPP
Ans-a
Question17 of 50
The rights required to share a folder on a domain controller for a user jack is
Ans-c
Question18 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?
a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.
b) Restore the Documents and Settings folder that contains the WorkProduct folder.
c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.
d) Restore Peters WorkProduct folder, and choose the original location for the restoration.
Ans-d
Question19 of 50
When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?
a) System
b) File
c) Server
d) User
Ans-a
Question20 of 50
How would you back up a Certificate Authority installation?
Ans-a
Question21 of 50
Your network contains a server that has the SNMP Service installed. You need to configure the SNMP
security settings on the server. Which tool should you use?
b) Scw
c) Secedit
d) Services Console
Ans-d
Question22 of 50
Which of the following categories for UTP has the least expensive cable?
a) 1
b) 2
c) 3
d) 4
Ans-d
Question23 of 50
Which of the following will complete the Four Ps of Service Design? 1. Perspectives 2. Positioning 3. Plan
4. ???
a) People
b) Product
c) Patterns
d) Partners
Ans-c
Question24 of 50
The primary goal of which process is to provide the rights for users to be able to access a service or
group of services,while preventing access to non-authorized users.
a) Configuration Management
b) Availability Management
c) Access Management
d) Change Management
Ans-c
Question25 of 50
What is the default share permissions when creating a new share in Microsoft Windows Server?
Ans-b
Question26 of 50
Which of the following is the most appropriate approach to carrying out Service Operations?
a) The internal IT view is most important as Service Operations has to monitor and manage the
infrastructure
b) Service Operations should maintain a balance between an internal IT view and an external business
view
c) The external business view is most important as Service Operations is the place where value is
realized and the customer obtains the benefit of the services
d) IT Operations does not take an internal or external view as they execute processes defined by Service
Design
Ans-b
Question27 of 50
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?
c) Configure the Certification Authority Web Enrollment Role Service on a member server
d) Configure the Certification Authority Web Enrollment Role Service on a domain controller
Ans-c
Question28 of 50
Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core
b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core
c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.
d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.
Ans-d
Question29 of 50
a) TRUE
b) false
Ans-b
Question30 of 50
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?
Ans-d
Question31 of 50
a) Telnet
b) DHCP
c) BOOTP
d) RAS
Ans-b
Question32 of 50
a) Level0
b) Extended
c) Level1
d) Primary
Ans-d
Question33 of 50
You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?
a) Windows Explorer
b) Efsinfo
c) Syskey
d) Cipher
Ans-d
Question34 of 50
a) 192.168.1.1
b) 192.168.1.63
c) 192.168.1.65
d) 192.168.1.93
Ans-c
Question35 of 50
You have been given a task to set per user 10 GB of Hard disk space on a file server. How you will do
this?
Ans-c
Question36 of 50
How can you ensure that an application installed on a computer running Terminal Services can support
multiple users?
Ans-a
Question37 of 50
Windows clustering provides which of the following benefits?
a) High-availability
Ans-d
Question38 of 50
a) Forward zone
b) Reverse zone
Ans-d
Question39 of 50
b) 6
c) 7
d) 4
Ans-a
Question40 of 50
a) 50
b) 58
c) 75
Ans-d
Question41 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:
- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network
c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network
d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network
Ans-b
Question42 of 50
a) UTP
b) STP
d) Radio
Ans-d
Question43 of 50
b) Standard Edition
c) Enterprise Edition
Ans-c
Question44 of 50
You have a DHCP server that runs Windows Server 2008 R2. You need to reduce the size of the DHCP
database. What should you do?
b) From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb
c) From the properties of the dhcp.mdb file, enable the File is ready for archiving attribute
d) From the properties of the dhcp.mdb file, enable the Compress contents to save disk space attribute
Ans-b
Question45 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?
a) On the host server, install the Microsoft Loopback adapter
Ans-d
Question46 of 50
You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?
Ans-b
Question47 of 50
b) Network Port
c) TCP/IP port
Ans-d
Question48 of 50
Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?
a) On the child domain DNS servers, create stub zones for the root domain zone
b) On the child domain DNS servers, configure conditional forwarders for the parent domain
c) On the root domain DNS servers, configure delegation subdomain records for the child domains
d) On the root domain DNS servers, create stub zones for the child domain zones
Ans-d
Question49 of 50
You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server?
a) Run the Recover d:\payroll command
Ans-d
Question50 of 50
All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?
c) Install a Windows Server 2008 failover cluster that has shared storage.
d) Install a Windows Server 2008 failover cluster that has direct attached storage.
Ans-c
Set3:
Question1 of 50
Which of the following is NOT a step in the Continual Service Improvement (CSI) model?
c) Is there budget?
ANS: C
Question2 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. You have a folder
named Folder1. You need to ensure that files in Folder1 that are older than 365 days are automatically
moved to an archive folder. What should you create from the File Server Resource Manager console?
a) a file group
b) a file screen
d) a quota
ANS: C
Question3 of 50
a) UTP
b) STP
d) Radio
ANS: D
Question4 of 50
Question5 of 50
a) News
b) Mail
c) Gopher
d) WWW
ANS: D
Question6 of 50
Your network consists of one Active Directory domain. All servers run Windows Server 2008. You need
to plan access restriction policies for the network. The plan must support the following restrictions: Only
computers that run Windows Vista must be able to access the network. Only computers that have
Windows Firewall enabled must be able to access the network. What should you include in your plan?
c) Create a Group Policy object (GPO) linked to the domain. Enable the Windows Firewall settings in the
GPO
d) Create a Group Policy object (GPO) linked to the Domain Controllers organizational unit (OU). Enable
the Windows Firewall settings in the GPO
ANS: B
Question7 of 50
Which of the following categories for UTP has the least expensive cable?
a) 1
b) 2
c) 3
d) 4
ANS: D
Question8 of 50
Your network contains a single Active Directory domain named contoso.com. The domain contains a
DNS server named Server1 that hosts the contoso.com zone. The network is connected to the network
of a partner company. The partner companys network contains a DNS server that hosts a zone named
nwtraders.com. You need to ensure that computers in contoso.com can resolve the names of computers
in nwtraders.com. The solution must not require any changes to the zone configuration of
nwtraders.com. What should you configure on Server1?
a) a conditional forwarder
b) a GlobalNames zone
c) a secondary zone
d) a zone delegation
ANS: A
Question9 of 50
Which of the following events in Event Viewer would warrant immediate attention from a user or
administrator?
a) Error
b) Information
c) Warning
d) Both A and C
ANS: D
Question10 of 50
Which of the following is not part of the 5 core volumes of ITIL V3?
a) Service Strategy
c) Service Operation
ANS: C
Question11 of 50
How does an organization use Resources and Capabilities in creating value?
a) They are used to create value in the form of output for production management
b) They are used to create value in the form of goods and services
c) They are used to create value to the IT organization for Service Support
ANS: A
Question12 of 50
b) Diskpart.exe
ANS: C
Question13 of 50
You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
b) Recommen for thirdparty file server solution like filers and configure the policy.
d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.
ANS: D
Question14 of 50
You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. Network Administrator decides to implement a floorwise VLAN and asked you to configure
the DHCP structure accordingly. You have a Windows 2008 DHCP Server in 10.0.10.x segment.Now you
need to ensure that users in other segment like 10.0.11.X , 10.0.12.X ,10.0.13.x can get the IP address
from DHCP Server.
a) Install and configure a Windows 2008 Server in each VLAN as a DHCP Server for respective VLAN.
b) Ask your Network Administrator to configure the static routing between all VLANs to communicate
wih DHCP Server.
c) Install and configure the DHCP relay agent and configure the DHCP Server with scope for all VLAN.
Relay agent will ensure the DHCP service to all VLAN clients.
ans c
Question15 of 50
a) DHCP
b) DFS
c) WINS
d) IIS
Question16 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. You plan to create an
image of Server1 to deploy to additional servers. You need to identify how many more times you can
rearm the Windows activation clock. What should you run on Server1?
a) msinfo32.exe
b) slmgr.vbs /dlv
c) slui.exe
d) winrm.vbs enumerate
Question17 of 50
You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
a) Assign each office a new class C private IP address range
c) Assign each office a subnet from a new class B private IP address range
d) Assign each office a subnet from the current class C private IP address range
ans d
Question18 of 50
Question19 of 50
Question20 of 50
Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is
deployed on the network. Server1 will be used to collect events from the Security event logs of the
other servers on the network. You need to define the Custom Event Delivery Optimization settings on
Server1. Which tool should you use?
a) Event Viewer
b) Task Scheduler
c) Wecutil
d) Wevtutil
Question21 of 50
c) Both A & B
d) Neither A nor B
ans c
Question22 of 50
You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?
a) Attrib.exe
b) Cacls.exe
c) Dsacls.exe
d) Dsmod.exe
Question23 of 50
c) Password-protected Shares
d) Share-level Security
Question24 of 50
You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?
a) Windows Explorer
b) Efsinfo
c) Syskey
d) Cipher
ans d
Question25 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?
d) At the command prompt, run netsh.exe ras set tracing rasauth enabled
Question26 of 50
Your network contains a Windows Server Update Services (WSUS) server. You need to ensure that the
WSUS server automatically downloads service packs. What should you do first?
a) From the Automatic Approvals options, modify the Update Rules list
c) From the Products and Classifications options, modify the Products settings
d) From the Products and Classifications options, modify the Classifications settings
Question27 of 50
You have multiple client computers on which you need to deploy the same image by using multicast.
Some of these computers are slower than others. Will slow clients bring down the speed of multicast
transmission?
a) No, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed
b) Yes, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed
c) Yes, WDS in Windows Server 2008 has the ability to divide multicast transmissions into multiple
streams based on the client speed
d) No, WDS in Windows Server 2008 Standard edtion has the ability to divide multicast transmissions
into multiple streams based on the client speed
Question28 of 50
c) It explicitly defines users and their respective access rights to a particular resource.
d) All of them
Question29 of 50
You have Server that runs Windows 2008.You need to prevent the Server from establishing
communication session to other computers using TCP port 25. What should you do?
c) From Windows firewall with advanced security snap-in create an inbound rule.
d) From Windows firewall with advanced security snap-in create an outbound rule.
Question30 of 50
Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?
Question31 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?
a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.
c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.
d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
Question32 of 50
Network contains a DNS server that runs a Server Core installation of Windows Server 2008. The domain
administrators use client computers that run Windows Vista. You need to recommend a strategy that
allows the administrators to manage DNS from their Windows 7 client computers. What should you
recommend?
a) On the DNS server, set the Remote Access Connection Manager service to automatic.
b) On the Windows Vista client computers, install Remote Server Administration Tools (RSAT).
c) On the Windows Vista client computers, run Setup.exe /u from the Windows Server 2008 installation
media.
d) On the Windows Vista client computers, create a custom Microsoft Management Console, and then
add the Component Services snap-in.
Question33 of 50
The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?
b) Certificates snap-in
d) Windows Backup
Question34 of 50
What is the default share permissions when creating a new share in Microsoft Windows Server?
Question35 of 50
Your network contains a server that has the HyperV server role installed. The server hosts a virtual
machine (VM) named VM1. VM1 runs Windows Server 2008 R2 and has the file server role installed. You
need to add more disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do first on VM1?
Question36 of 50
Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is paused critical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?
Question37 of 50
You manage a member server that runs Windows Server 2008. The server runs the Terminal Server
Gateway (TS Gateway) role service. You need to find out whether a user named User1 has ever
connected to his office workstation through the TS Gateway server. What should you do?
a) View the events in the Monitoring folder from the TS Gateway Manager console.
b) View the events in the Monitoring folder from the TS Gateway Manager console.
Question38 of 50
a) High-availability
Question39 of 50
You have prepared a standard workstation image for your environment and now you want to deploy the
image to multiple computers. What should you do?
a) first need to generalize the workstations by using computer management Then, prepare a capture
media on the WDS server and then boot the workstation with the capture media.
b) first need to generalize the workstations by using ndtsutil Then, prepare a capture media on the WDS
server and then boot the workstation with the capture media.
c) first need to generalize the workstations by using Sysprep. Then, prepare a capture media on the
WDS server and then boot the workstation with the capture media.
d) first need to generalize the workstations by using dcdiag Then, prepare a capture media on the WDS
server and then boot the workstation with the capture media.
Question40 of 50
a) Print Server
b) File Server
c) Application Server
d) Web Server
ans c
Question41 of 50
Your network contains an Active Directory domain named contoso.com. The domain contains two
domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a primary zone for
contoso.com. DC2 hosts a secondary zone for contosto.com. You need to ensure that DNS zone data is
encrypted when the data replicates across the network. DC2 must provide authoritative responses to
client computers. What should you do?
Question42 of 50
Which of the following is NOT an advantage of organizing Continual Service Improvement (CSI) using the
RACI model?
a) Facilitates clear communication and workflow practice across all parties involved in the CSI program
b) Clarifies the roles and responsibilities of individual in the CSI program which could otherwise be
overlapping and confusing
c) Identifies where internal Service Level Agreements (SLAs) can be established to implement CSI
d) Provides a clear focus for matching the CSI processes to financial planning
ans d
Question43 of 50
You are the network administrator for TestKing.com. The network consists of a single Active Directory
domain named testking.com. All network servers run Windows Server 2003, and all client computers run
Windows XP Professional. XML Web services for the internal network run on a member server named
TK1, which is configured with default settings. You are a member of the local Administrators group on
TK1.
You need the ability to remotely manage TK1. You have no budget to purchase any additional licensing
for your network until the next fiscal year. How should you reconfigure TK1?
b) Add your user account to the Remote Desktop Users local group
ans a
Question44 of 50
a) Supplier Management negotiates internal and external agreements to support the delivery of
services
d) Supplier Management should be involved in all stages of the service lifecycle,from Strategy through
Design and Transition to Operations and Improvement
ans a
Question45 of 50
Assume that you are the administrator of your companys network, which serves a single site with 150
users. The network includes eight servers running Windows 2008 servers. One server hosts your internal
web site. All servers have static IP addresses in the range from 10.1.1.2 through 10.1.1.10. All client
computers run Windows XP Professional and are DHCP clients, using an address range of 10.1.1.11
through 10.1.1.200. You need to provide internet access to internal users. To do so, you plan to use a
pool of 100 IP addresses supplied by a contracted internet service provider. Your solution must involve
the least possible administrative effort. What should you do? a) Allow all client computers to use
automatic Private IP addressing for IP address assignment. Configure all servers to use static IP
addresses in the 192.168.0.0 subnet.
b) Install a server for network address translation. Add the IP address of the private interface of this
server to the excluded range on your DHCP server. Change the IP address of the private interface for the
network address translation protocol to 10.1.1.201.
c) Install a server for network address translation and enable the default DHCP allocator. Add the
existing server addresses to the excluded range. Change the IP address of the private interface for the
network Address Translation protocol to 10.1.1.201
d) Map internal addresses and port numbers of your servers to the pool of IP addresses and port
numbers assigned by your internet service provider.
Question46 of 50
a) MILNET
b) ARP/RARP
c) TCP/IP
d) Internet
Question47 of 50
You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone. What should you do?
c) From the properties of the zone, modify the TTL of the SOA record
Question48 of 50
You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server? a) Run the Recover d:\payroll command
Your network contains two servers that run Windows Server 2008 R2. The servers are located on
different IP subnets. You plan to configure the servers in a two node failover cluster. You need to select
the quorum model for the cluster. The solution must ensure that users can access the cluster resources
if a single node fails. Which quorum model should you select?
d) Node Majority
Question50 of 50
You have recently created and distributed RDP files for a certain RemoteApp program. However, you
find that the application performs poorly and needs to be migrated to a more powerful server. What
should you do to ensure that users can connect to the RemoteApp program after it is migrated?
a) Create a new TS Web Access site for the new terminal server and publish the application to the new
site and Re-create an RDP file for the RemoteApp program after the migration and distribute the file to
users
b) TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the
server name listed is the new terminal serve
c) Modify the properties of the existing RDP file and re-distribute the file to users
ans a and b
http://www.aiotestking.com/microsoft/2011/08/what-should-you-do-662/
Set 9:
Question1 of 50
You need to configure a static IPv6 address for a server that runs a Server Core installation of Windows
Server 2008 R2. Which tool should you use?
a) ocsetup
b) netsh
c) servermanagercmd
d) Ipconfig
Question2 of 50
a) Client
b) Service
c) Protocol
d) NIC
Question3 of 50
Which of the following categories for UTP has the least expensive cable?
a) 1
b) 2
c) 3
d) 4
Question4 of 50
a) RG-8
b) RG-11
c) RG-58
d) RG-59
Question5 of 50
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
Question6 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4
Question7 of 50
a) 802.1
b) 802.2
c) 802.3
d) 802.4
Question8 of 50
a) NetBEUI
b) NetBIOS
c) NDOS
d) PPP
Question9 of 50
Assume that You are the network administrator for Miracleinfocom. All client computers on the
network run Windows NT Workstation 4.0. The new written company network policy requires you to
change all network computers from static IP configuration to dynamically assigned IP configuration. The
network policy requires a Windows Server 2003 DHCP server to dynamically assign the addresses. You
anticipate the possibility that some of the client computers in the company will be overlooked and will
continue to use static IP configuration. If this occurs, you want to ensure that the DHCP server will not
lease an address that is already statically configured on another computer. You want to configure the
DHCP servers to lease only IP addresses that are not already in use. Also, you do not want to increase
network traffic any more than necessary, and you want to minimize the amount of time DHCP clients
wait for an IP address lease. What should you do?
Question10 of 50
You have a DHCP server named Server1 and an application server named Server2. Both servers run
Windows Server 2008 R2. The DHCP server contains one scope. You need to ensure that Server2 always
receives the same IP address. Server2 must receive its DNS settings and its WINS settings from DHCP.
What should you do?
Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2. You need to
ensure that DNS1 only responds to DNS queries from computers that are located in the same subnet.
What should you configure?
c) Trust Anchors
d) Windows Firewall
Question12 of 50
Which network ports must be open between external and internal DNS servers for external name
resolution to function properly?
Question13 of 50
You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?
a) Secondary
b) Caching
c) Stub
d) AD-integrated
Question14 of 50
Your network contains an Active Directory domain named contoso.com. The domain contains two
domain controllers named DC1 and DC2 that run Windows Server 2008 R2. DC1 hosts a primary zone for
contoso.com. DC2 hosts a secondary zone for contosto.com. You need to ensure that DNS zone data is
encrypted when the data replicates across the network. DC2 must provide authoritative responses to
client computers. What should you do?
Question15 of 50
a) Second-level domain
b) Root domain
c) Top-level domain
d) Third-level domain
Question16 of 50
You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?
Question17 of 50
c) WANs
d) MANs
Question18 of 50
b) Repair the WINS server and upgrade the server to Windows 2008 Server.
Question19 of 50
You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent
users from establishing multiple Remote Desktop connections to the server. What should you do?
d) From Active Directory Users and Computers, modify the Sessions settings for each user account.
Question20 of 50
The domain contains 13 member servers. The member servers run Windows Server 2003 Service Pack 2
(SP2). The computer accounts for all member servers are located in an organizational unit (OU) named
Servers. You need to prevent remote desktop connections to the member servers. What should you do?
a) On each server, remove all users from the Remote Desktop Users group.
b) On each server, run the Terminal Services Configuration console. From the RDP-TCP connection
permissions properties, set the Full Control permission for the Remote Desktop Users group to deny.
c) Use a Group Policy Object (GPO) to disable the Allow users to connect remotely using Terminal
Services setting.
d) Use a Group Policy Object (GPO) to configure the Sets rules for remote control of Terminal Services
user sessions setting to No Remote Control.
Question21 of 50
You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the concurrently. What should you do?
b) From Add or Remove Programs, add the Connection Point Services component.
c) From the Terminal Services Configuration console, modify the Maximum connections setting.
d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.
Question22 of 50
When connecting IIS to an external data source through ODBC (Open Data Base Connector), what type
of ODBC DSN must be specified?
a) System
b) File
c) Server
d) User
Question23 of 50
Which are the IIS services that can use SSL communication?
a) News
b) Mail
c) WWW
d) FTP
Question24 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN
packets. The solution must minimize the amount of data collected. What should you do?
d) At the command prompt, run netsh.exe ras set tracing rasauth enabled
Question25 of 50
a) Web Edition
b) Standard Edition
c) Enterprise Edition
Question26 of 50
a) LPT port
b) Network Port
c) TCP/IP port
a) Regedit
c) Sysinfo
Question28 of 50
a) FAT 32
b) FAT 16
c) USB
d) NTFS
Question29 of 50
a) 8 GB
b) 5 GB
c) 16 GB
d) 4 GB
Question30 of 50
Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?
Question31 of 50
Windows 2008 Enterprise Edition can support Maximum Physical Process and RAM?
Question32 of 50
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?
b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)
c) Create a Network Policy that defines Remote Access Server as a network connection method
d) Create a Network Policy that specifies EAP-TLS as the only available authentication method
Question33 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question34 of 50
You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?
c) Create a new quota template. Modify the quota for each folder
d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders
Question35 of 50
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?
b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group
d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner
Question36 of 50
To Implement the DFS Topology we need to create?
a) DFS link
b) DFS root
c) link replica
d) 1 and 2
Question37 of 50
You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
b) Recommen for thirdparty file server solution like filers and configure the policy.
d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.
Question38 of 50
a) net share c:
b) net share
Question39 of 50
Your company uses a Windows 2008 Enterprise certificate authority (CA) to issue certificates. You need
to implement key archival. What should you do?
c) Configure the certificate for automatic enrollment for the computers that store encrypted files
d) Install an Enterprise Subordinate CA and issue a user certificate to users of the encrypted files
Question40 of 50
The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?
b) Certificates snap-in
d) Windows Backup
Question41 of 50
a) Stripping
b) Mirroring
c) Hot swappable
d) Warm swappable
Question42 of 50
Your network contains two servers named Server1 and Server2. The network contains a Storage Area
Network (SAN). Server1 and Server2 each connect to two logical unit numbers (LUNs) on the SAN. You
create a failover cluster named Cluster1. Server1 and Server2 are nodes in Cluster1. One of the LUNs is
used as a witness disk. You plan to create 10 virtual machine (VM) instances in Cluster1. You need to
ensure that each VM instance can be moved between nodes independently of the other VMs. How
should you configure Cluster1?
Your network contains a server that runs Windows Server 2008 R2 and has the HyperV server role
installed. The network contains a virtual machine (VM) named VM1. The virtual hard disk (VH file for
VM1 is stored on drive C. The snapshot files for VM1 are stored on drive D. You take several snapshots
of VM1. After taking the snapshots, you discover that the state of VM1 is pausedcritical. You need to
ensure that you can resume VM1. The solution must prevent data loss on VM1. What should you do?
Question44 of 50
a) 0
b) 1
c) 3
d) 5
Question45 of 50
Your network contains two servers that have the HyperV server role installed. You install the Failover
Clustering feature on both servers. You add both servers as nodes in the cluster. You need to ensure
that you can perform live migrations of individual virtual machines (VMs) between the nodes. The
solution must minimize the number of volumes required to host the VMs. What should you do first?
b) From HyperV Manager on each server, modify the default location for the virtual hard disks (VHDs)
c) From Failover Cluster Manager, modify the quorum settings of the cluster
d) From HyperV Manager on each server, modify the default location for the virtual machine
configuration files
Question46 of 50
Incident management is the process responsible for managing the lifecycle of all incidents
a) TRUE
b) FALSE
Question47 of 50
1. users
3. technical staff
a) only 1 and 2
b) only 1, 2 and 3
c) only 1 and 3
Question48 of 50
1. restore normal service operation as quickly as possible and minimize adverse impact on business
operations
b) only 2
c) only 1
Question49 of 50
User is not available to provide the clarification required for an incident diagnosis. As an Incident
Manager, you would ________
b) highlight it to the Problem Manager so that (s)he can update the problem impact and either reinitiate
or speed up the problem investigation
Question50 of 50
a) A)Service Optimization
b) B)Service Transition
c) C)Service Design
d) D)Service Strategy
Set 10:
Question1 of 50
d) All of them
Question2 of 50
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You perform a
normal backup of Server1 every Saturday. You need to implement a backup strategy for Server1 to meet
the following requirements: Minimize the time required to back up files. On weekdays, back up files that
have changed since the last backup.? Which type of backup should you perform on weekdays?
a) Copy
b) Daily
c) differential
d) Incremental
Question3 of 50
All domain controllers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows
XP Professional Service Pack 3 (SP3). You need to ensure that users personal settings are the same when
they log on to different client computers in the domain. What should you do?
b) From the properties of each user account, configure a home folder path
c) From the Default Domain Policy, configure a logon script that runs Loadstate.exe.
d) From the Default Domain Policy, configure a logon script that runs Scanstate.exe.
Question4 of 50
Your network consists of one Active Directory forest that contains 20 domain trees. All DNS servers run
Windows Server 2008. The network is configured as an IPv4 network. Users connect to network
applications in all domains by using a NetBIOS name. You plan to migrate to an IPv6-enabled only
network. You need to recommend a solution to migrate the network to IPv6. The solution must not
require any changes to client computers. What should you recommend?
a) On the DNS servers, add all domain zones to the ForestDNSZones partition
b) On the DNS servers, configure GlobalNames zones
c) On a new server, install and configure a Windows Server 2008 WINS server
d) On a new server, install and configure a Windows Server 2003 WINS server
Question5 of 50
You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2003. Terminal Services installed on three servers
running Windows 2003 Server. Remote users use the terminal servers to access the company intranet so
they can read e-mail and submit time sheets. To make a connection, users choose a terminal server from
a list. This process generates help desk requests. Over time, the remote user load increases. The existing
terminal server cannot support the number of concurrent connections. You need to create a new
terminal server to assist in handling the load. However, you must not add any new server names to the
list of terminal servers. What should you do?
Question6 of 50
a) Service Optimization
b) Service Transition
c) Service Design
d) Service Strategy
Question7 of 50
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server
2008 R2. A server named Server1 has the Windows Deployment Services (WDS) server role installed. A
custom Windows 7 image is available for download from Server1. A server named Server2 has the
Hyper-V server role installed. You create a virtual machine (VM) named VM1 on Server2. You need to
deploy the Windows 7 image from Server1 to VM1. What should you do first?
Question8 of 50
You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the server concurrently. What should you do?
b) From Add or Remove Programs, add the Connection Point Services component.
c) From the Terminal Services Configuration console, modify the Maximum connections setting.
d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.
Question9 of 50
Your company has one office in San Diego and one office in New York. The network consists of one
Active Directory forest that contains one domain named contoso.com and one domain named
newyork.contoso.com. All servers run Windows Server 2008. All domain controllers for contoso.com are
located in San Diego. All domain controllers for newyork.contoso.com are located in New York.
Contoso.com contains two domain controllers named Server1 and Server2. Newyork.contoso.com
contains two domain controllers named Server3 and Server4. All domain controllers host Active
Directory-integrated DNS zones for their respective domains. You need to ensure that users from each
office can resolve computer names for both domains from a local DNS server. What should you do?
a) Create a stub DNS zone for contoso.com on Server3. Create a stub DNS zone for newyork.contoso.
com on Server1
b) Add the contoso.com and the newyork.contoso.com DNS zones to the ForestDNSZones partition
c) Create a standard primary DNS zone named contoso.com on Server3. Create a standard primary DNS
zone named newyork.contoso.com on Server1
A Windows 2008 cluster that has a quorum based on local disks in each node, rather than a shared disk
is called as?
Question11 of 50
Question12 of 50
You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone. What should you do?
c) From the properties of the zone, modify the TTL of the SOA record
Question13 of 50
You want to install Windows XP Professional on 10 non-PXE-compliant computers on the marketing
segment of your network. The 10 computers do not have operating systems installed. You attempt to
load the computers by using an existing RIS image that is on the RIS server. You find that the 10
computers cannot connect to the RIS server. You verify that existing client computers on the network
can connect to network servers, including the RIS server. You then check the network servers and find
that the Windows Server 2003 computer running WINS has stopped responding due to hard disk failure.
You want to enable the computers to connect to the RIS server. What should you do?
b) Repair the WINS server and upgrade the server to Windows 2008 Server.
Question14 of 50
a) Service Pack
b) Office package
Question15 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4
Question16 of 50
You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the
performance of the VPN server for one day. What should you do?
c) Install Network Monitor Tools. From Network Monitor create a new capture.
d) Install Network Monitor Tools. From Network Monitor create a new parser file.
Question17 of 50
a) Application
b) Session
c) Transport
d) Data Link
Question18 of 50
The Terminal Services role is installed on the Windows 2008 server. You deploy a new application on the
server. The application creates files that have an extension of .xyz. You need to ensure that users can
launch the remote application from their computers by double-clicking a file that has the .xyz extension.
What should you do?
a) Configure the Remote Desktop Connection Client on the users computers to point to the server
b) Configure the application as a published application by using a Remote Desktop Program file.
c) Configure the application as a published application by using a Windows Installer package file.
d) Configure the application as a published application by using a Terminal Server Web Access Web site.
Question19 of 50
You network contains one Active Directory domain. All domain controllers run Windows Server 2008.
The network has 100 servers and 5,000 client computers. Client computers run either Windows XP
Service Pack 2 (SP2) or Windows Vista Service Pack 1 (SP1). You need to plan the deployment of
Certificate Services on the network to support the following requirements: Automatic certificate
enrollment Supported certificates for all client computers What should you include in your plan?
a) Deploy a stand-alone certification authority (C. Create V2 templates
Question20 of 50
a) The Process responsible for allowing Users to make use of IT Services,data,or other Assets.
d) All of above
Question21 of 50
a) 8
b) 32
c) 16
d) 9
Question22 of 50
c) WANs
d) MANs
Question23 of 50
a) RG-8
b) RG-11
c) RG-58
d) RG-59
Question24 of 50
You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?
a) Secondary
b) Caching
c) Stub
d) AD-integrated
Question25 of 50
a) TFTP download
b) DHCP request
c) Telnet Session
d) ROSI protocol
Question26 of 50
b) 185 meters
c) 500 meters
d) 1024 meters
Question27 of 50
a) V6
b) V7
c) V9
d) V5
Question28 of 50
a) Security
b) Compression
c) Disk quota
Question29 of 50
Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?
Question30 of 50
Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to prepare the environment to provide a high-availability solution for a back-end Microsoft
SQL Server 2005 data store. What should you do?
c) Install a Windows Server 2008 failover cluster that has shared storage
d) Install a Windows Server 2008 failover cluster that has direct attached storage
Question31 of 50
You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
c) Assign each office a subnet from a new class B private IP address range
d) Assign each office a subnet from the current class C private IP address range
Question32 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4
Question33 of 50
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?
b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group
d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner
Question34 of 50
Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 hosts a
shared folder that stores Microsoft Excel spreadsheets. A new Excel spreadsheet is created each day.
You need to ensure that all Excel spreadsheets that are older than one month are automatically moved
to a different folder. What should you do?
a) Create an Active Directory Rights Management Services (AD RMS) policy template
Question35 of 50
b) ARP/RARP
c) TCP/IP
d) Internet
Question36 of 50
When connecting IIS to an external data source through ODBC (Open Data Base Connector), what type
of ODBC DSN must be specified?
a) System
b) File
c) Server
d) User
Question37 of 50
b) Gateway Address
Question38 of 50
You want to specify a permanent address for a printer in the first floor through DHCP server . How you
will do it
a) Server options
b) Simple scope
c) Scope options
d) Reserved options
Question40 of 50
You have Server that runs Windows 2008.You need to prevent the Server from establishing
communication session to other computers using TCP port 25. What should you do?
b) From Windows firewall, enable the block all incoming connection option.
c) From Windows firewall with advanced security snap-in create an inbound rule.
d) From Windows firewall with advanced security snap-in create an outbound rule.
Question41 of 50
b) Server
c) Print spooler
Question42 of 50
You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008.
You plan to install Windows 7 on a computer that does not support Preboot Execution Environment
(PXE). You have a Windows 7 image that is stored on the WDS server. need to start the computer to
install the image that is stored on the WDS server. What should you create?
a) a capture image
c) a discover image
d) an install image
Question43 of 50
Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?
Question44 of 50
a) Supplier Management
d) Contract Management
Question45 of 50
a) Web Edition
b) Standard Edition
c) Enterprise Edition
The Design Manager Is responsible for the overall coordination and deployment of quality solution
designs for services and processes. Which of the following are NOT responsibilities included In this role?
c) Take the overall Service Strategies and ensure they are reflected in the Service Design process and
the service designs that are produced
d) Measuring the effectiveness and efficiency of the Service Design and supporting processes
Question47 of 50
a) Documenting and maintaining the technical skills required to manage and support Applications
Question48 of 50
Your company has a main office and two branch offices. Each office has a domain controller and file
servers. Your network consists of a single Active Directory domain. All servers run Windows Server 2008.
You need to plan the deployment of Distributed File System (DFS) to meet the following requirements:
Ensure that users see only the folders to which they have access
a) Deploy a domain-based DFS namespace and use DFS Replication. Modify each share to be a hidden
share
b) Deploy a domain-based DFS namespace and use File Replication Service (FRS). Modify each share to
be a hidden share
c) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use File Replication
Service (FRS)
d) Deploy a stand-alone DFS namespace. Enable access-based enumeration and use DFS Replication
Question49 of 50
Which command-line tool would you use to add an instance of AD LDS to an existing Core Server
installation?
a) ADAMInstall.exe
b) ldsinstall.exe
c) oclist.exe
d) ocsetup.exe
Question50 of 50
Question1 of 50
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
Question2 of 50
Write the name of layer of the OSI model that maintains a connection between nodes?
a) Transport Layer
b) Session Layer
c) Physical Layer
d) Network Layer
Question3 of 50
Your network is connected to the Internet through a firewall. Remote users connect to Microsoft
Windows SharePoint Services (WSS) located on the internal network by using HTTPS. Users require
access to file servers located on the internal network. You need to ensure that remote users can connect
to the file servers. The solution must not require that any additional TCP ports be opened on the
firewall. What should you do?
c) Implement a Secure Socket Tunneling Protocol (SSTP) virtual private network (VPN) solution
a) UTP
b) STP
d) Radio
Question5 of 50
Question6 of 50
a) Application
b) Session
c) Transport
d) Data Link
Question7 of 50
a) 802.1
b) 802.2
c) 802.3
d) 802.4
Question8 of 50
Assume that you are the administrator of your companys network, which serves a single site with 150
users. The network includes eight servers running Windows 2008 servers. One server hosts your internal
web site. All servers have static IP addresses in the range from 10.1.1.2 through 10.1.1.10. All client
computers run Windows XP Professional and are DHCP clients, using an address range of 10.1.1.11
through 10.1.1.200. You need to provide internet access to internal users. To do so, you plan to use a
pool of 100 IP addresses supplied by a contracted internet service provider. Your solution must involve
the least possible administrative effort. What should you do?
a) Allow all client computers to use automatic Private IP addressing for IP address assignment.
Configure all servers to use static IP addresses in the 192.168.0.0 subnet.
b) Install a server for network address translation. Add the IP address of the private interface of this
server to the excluded range on your DHCP server. Change the IP address of the private interface for the
network address translation protocol to 10.1.1.201.
c) Install a server for network address translation and enable the default DHCP allocator. Add the
existing server addresses to the excluded range. Change the IP address of the private interface for the
network Address Translation protocol to 10.1.1.201
d) Map internal addresses and port numbers of your servers to the pool of IP addresses and port
numbers assigned by your internet service provider.
Question9 of 50
You are working as a system admin in an organization wipro.com, You have received a complaint one of
the client PC could not able to get IP address from the DHCP server. When you checked up DHCP server
you could able to see blue exclamatory marks on the server and scope. What is the reason behind it ?
You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. Network Administrator decides to implement a floorwise VLAN and asked you to configure
the DHCP structure accordingly. You have a Windows 2008 DHCP Server in 10.0.10.x segment. Now you
need to ensure that users in other segment like 10.0.11.X , 10.0.12.X ,10.0.13.x can get the IP address
from DHCP Server.
a) Install and configure a Windows 2008 Server in each VLAN as a DHCP Server for respective VLAN.
b) Ask your Network Administrator to configure the static routing between all VLANs to communicate
wih DHCP Server.
c) Install and configure the DHCP relay agent and configure the DHCP Server with scope for all VLAN.
Relay agent will ensure the DHCP service to all VLAN clients.
Question11 of 50
Your network contains a single Active Directory domain named contoso.com. The domain contains a
DNS server named Server1 that hosts the contoso.com zone. The network is connected to the network
of a partner company. The partner companys network contains a DNS server that hosts a zone named
nwtraders.com. You need to ensure that computers in contoso.com can resolve the names of computers
in nwtraders.com. The solution must not require any changes to the zone configuration of
nwtraders.com. What should you configure on Server1?
a) a conditional forwarder
b) a GlobalNames zone
c) a secondary zone
d) a zone delegation
Question12 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 is configured
as a DNS server. You need to ensure that Server1 only resolves queries issued from client computers in
the same subnet as Server1. The solution must ensure that Server1 can resolve Internet host names.
What should you do on Server1?
a) Configure Windows Firewall
Question13 of 50
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?
Question14 of 50
Network contains a DNS server that runs a Server Core installation of Windows Server 2008. The domain
administrators use client computers that run Windows Vista. You need to recommend a strategy that
allows the administrators to manage DNS from their Windows 7 client computers. What should you
recommend?
a) On the DNS server, set the Remote Access Connection Manager service to automatic.
b) On the Windows Vista client computers, install Remote Server Administration Tools (RSAT).
c) On the Windows Vista client computers, run Setup.exe /u from the Windows Server 2008 installation
media.
d) On the Windows Vista client computers, create a custom Microsoft Management Console, and then
add the Component Services snap-in.
Question15 of 50
b) Root domain
c) Top-level domain
d) Third-level domain
Question16 of 50
After installing SP2 on a Windows XP professional on a desktop system you discover that a critical
application does not wordk properly. The application vendor indicates that the application is not
compatible with SP2, so you decide to uninstall the SP. Which is a valid method?
Question17 of 50
b) Repair the WINS server and upgrade the server to Windows 2008 Server.
You are the network administrator for Testking.com. The company operates a main office and two
branch offices. The network consists of a single Active Directory domain named testking.com. All
network servers run Windows Server 2003, and all client computers run Windows XP Professional. A
server named TestKingSrvA is located in one of the branch offices, where it is a member of a workgroup.
TestKingSrvA is configured with default operating system settings. Remote Desktop and Remote
Assistance are enabled, and Windows Messenger is installed. The company intranet site is hosted on this
server. Mr King is the local administrator who manages the intranet site. He requests your assistance in
installing an application on TestKingSrvA. You need the ability to view Mr Kings desktop during the
installation process. What should you do?
b) Direct Mr King to create and send an invitation for Remote Assistance from TestKingSrvA
Question19 of 50
You have a terminal server that runs Windows Server 2003 Service Pack 2 (SP2). You need to prevent
users from establishing multiple Remote Desktop connections to the server. What should you do?
d) From Active Directory Users and Computers, modify the Sessions settings for each user account.
Question20 of 50
The Terminal Services role is installed on the Windows 2008 server. You deploy a new application on the
server. The application creates files that have an extension of .xyz. You need to ensure that users can
launch the remote application from their computers by double-clicking a file that has the .xyz extension.
What should you do?
a) Configure the Remote Desktop Connection Client on the users computers to point to the server
b) Configure the application as a published application by using a Remote Desktop Program file.
c) Configure the application as a published application by using a Windows Installer package file.
d) Configure the application as a published application by using a Terminal Server Web Access Web site.
Question21 of 50
You are the Server administrator for ABC.com. The network consists of a single Active Directory domain
ABC.COM. All network servers run Windows Server 2003. Terminal Services installed on three servers
running Windows 2003 Server. Remote users use the terminal servers to access the company intranet so
they can read e-mail and submit time sheets. To make a connection, users choose a terminal server from
a list. This process generates help desk requests. Over time, the remote user load increases. The existing
terminal server cannot support the number of concurrent connections. You need to create a new
terminal server to assist in handling the load. However, you must not add any new server names to the
list of terminal servers. What should you do?
Question22 of 50
You install the Web Server (IIS) role on and the SMTP Server feature on a server that runs Windows
Server 2008. You need to configure the new SMTP server to forward mail to the mail server of the
Internet Service Provider (ISP). What should you do?
b) Configure the smart host setting to use the mail server of the ISP.
d) Configure the SMTP delivery setting to Attempt direct delivery before sending to smart host
Question23 of 50
Which are the IIS services that can use SSL communication?
a) News
b) Mail
c) WWW
d) FTP
Question24 of 50
Your network contains a Windows Server Update Services (WSUS) server. A Group Policy object (GPO)
configures all WSUS client computers to detect updates hourly and install updates weekly. You
download a critical update. You need to ensure that the WSUS client computers install the critical
update during the next detection interval. What should you do?
Question25 of 50
a) Service Pack
b) Office package
Question26 of 50
What is the advantage that the 64-bit environment has over the 32-bit environment?
a) Price
b) Performance
c) Application Support
d) Ease of Management and Maintenance
Question27 of 50
Your network contains a print server named Server1. Server1 has three shared printers named Printer1,
Printer2, and Printer3. Each shared printer uses a different driver. You need to ensure that if Printer1
causes an exception, users can still print to Printer2 and Printer3. What should you do?
Question28 of 50
Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to prepare the environment to provide a high-availability solution for a back-end Microsoft
SQL Server 2005 data store. What should you do?
c) Install a Windows Server 2008 failover cluster that has shared storage
d) Install a Windows Server 2008 failover cluster that has direct attached storage
Question29 of 50
Your network contains a single Active Directory domain. The domain contains two Active Directory sites
named Site1 and Site2. You have a cluster named Cluster1. Cluster1 has two nodes named Server1 and
Server2. Server1 is located in Site1. Server2 is located in Site2. Cluster1 uses a file share witness that is
located in Site1. Cluster1 hosts a clustered application named App1. The network in Site1 fails. You need
to ensure that users can access App1. What should you do?
A server application creates report files. The application saves the report files in a folder named Report.
A service account is listed as the owner of all report files. You need to assign ownership of the report
files to a user in a department named Audit. You must achieve this goal by using the minimum amount
of administrative effort. What should you do?
d) Use the Advanced Security settings to change the owner of each file.
Question31 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?
a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.
b) Restore the Documents and Settings folder that contains the WorkProduct folder.
c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.
d) Restore Peters WorkProduct folder, and choose the original location for the restoration.
Question32 of 50
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group
d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner
Question33 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The domain contains two
servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is configured as a
namespace server for \\contoso.com\dfs. You need to migrate \\contoso.com\dfs to Windows Server
2008 mode. You install the Distributed File System role service on Server2. What should you do next?
Question34 of 50
Your network contains an Active Directory domain. You have a print server named Server1 that runs
Windows Server 2008 R2. You deploy a new print device and create a shared printer. You need to
ensure that only members of a group named Marketing can print color documents on the new print
device. All other users must only be able to print black and white documents on the new print device.
What should you do?
All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP
Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which
permissions User1 has on a file. What should you do?
Question36 of 50
You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?
a) Attrib.exe
b) Cacls.exe
c) Dsacls.exe
d) Dsmod.exe
Question37 of 50
Your network contains a server that runs Windows Server 2008 and that functions as a file server. All
client computers are laptop computers that run Windows 7. The network is not connected to the
Internet. Users in the organization save files that they want to share to a shared folder on the server.
You need to provide a solution that allows users to access the shared files when they are disconnected
from the corporate network. What should you recommend?
Question38 of 50
a) net share c:
b) net share
Question39 of 50
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?
c) Configure the Certification Authority Web Enrollment Role Service on a member server
d) Configure the Certification Authority Web Enrollment Role Service on a domain controller
Question40 of 50
Your network consists of one Active Directory domain. All domain controllers run Windows Server 2008.
You need to deploy Certificate Services on the network to support the following requirements:
- Maintain availability if a single server fails. - Delegate the enrollment of certificates for separate groups
of users.
a) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure a failover cluster.
Configure an enterprise certification authority (C
b) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure a failover cluster.
Configure a stand-alone root certification authority (C
c) Deploy two servers that run Windows Server 2008 Enterprise Edition. Configure an enterprise root
certification authority (C and a stand-alone subordinate CA
d) Deploy two servers that run Windows Server 2008 Standard Edition. Configure a stand-alone root
certification authority (C and an enterprise subordinate CA
Question41 of 50
a) Mirroring
b) Stripping
d) Hot swap
Question42 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?
Question43 of 50
a) 0
b) 1
c) 2
d) 3
Question44 of 50
You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008.
You plan to install Windows 7 on a computer that does not support Preboot Execution Environment
(PXE). You have a Windows 7 image that is stored on the WDS server. need to start the computer to
install the image that is stored on the WDS server. What should you create?
a) a capture image
c) a discover image
d) an install image
Question45 of 50
Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?
c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.
d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM
Question46 of 50
The cash registers in a supermarket experience network disruptions daily between 4 p.m. and 6 p.m
REPEATEDLY. Which ITIL process is responsible for solving these difficulties?
a) Availability Management
b) Capacity Management
c) Incident Management
d) Problem Management
Question47 of 50
The Problem Management process is intended to reduce both the number and severity of Incidents and
Problems on the business.
a) True
b) False
Question48 of 50
Which ITIL process is responsible for tracing the underlying cause of errors?
a) Security Management
b) Incident Management
c) Problem Management
d) Capacity Management
Question49 of 50
a) A)Service Optimization
b) B)Service Transition
c) C)Service Design
d) D)Service Strategy
Question50 of 50
c) analyzing incidents that have been reported and solving the underlying cause
Set 12:
Question1 of 50
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?
b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)
c) Create a Network Policy that defines Remote Access Server as a network connection method
d) Create a Network Policy that specifies EAP-TLS as the only available authentication method
Question2 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question3 of 50
You plan to move 50 Windows Server 2008 servers from an existing network segment to a new network
segment. You need to recommend a method for changing the TCP/IP addresses on the 50 servers. You
want to achieve this goal by using the minimum amount of administrative effort. What should you
recommend?
Question4 of 50
Which of the following network devices sends packets from a central point based upon MAC addresses?
a) Repeater
b) Switch
c) Bridge
d) Router
Question5 of 50
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
Question6 of 50
Which layer(s) of the OSI model is/are included in the NDIS specification?
a) 1
b) 2
c) 3
d) 4
Question7 of 50
a) Protocol manager
b) Binding manager
c) Redirector
d) The registry
Question8 of 50
You are the administrator of the TestKing company network. The network consists of a single Active
Directory domain testking.com. The network includes 20 servers running Windows Server 2008 and 200
client computers running Windows XP Professional. The office uses a single class C private IP address
range. The company announces a major expansion. TestKing will open 12 branch offices. The 12 branch
offices will connect to the existing office by direct T1 lines. Each branch office will have the same number
of computers as the main office. You need to plan the IP addressing for the new company. You want to
assign all company IP addresses from a single classful private IP address range. What should you do?
c) Assign each office a subnet from a new class B private IP address range
d) Assign each office a subnet from the current class C private IP address range
Question9 of 50
Your company uses DHCP to lease IPv4 addresses to computers at the main office. A WAN link connects
the main office to a branch office. All computers in the branch office are configured with static IP
addresses. The branch office does not use DHCP and uses a different subnet. You need to ensure that
the portable computers can connect to network resources at the main office and the branch office. How
should you configure each portable computer?
a) Use a static IPv4 address in the range used at the branch office
b) Use an alternate configuration that contains a static IP address in the range used at the main office
c) Use the address that was assigned by the DHCP server as a static IP address
d) Use an alternate configuration that contains a static IP address in the range used at the branch office
Question10 of 50
You are working as a system admin in an organization wipro.com, You have received a complaint one of
the client PC could not able to get IP address from the DHCP server. When you checked up DHCP server
you could able to see blue exclamatory marks on the server and scope. What is the reason behind it ?
Question11 of 50
Which one of the following commands can be used to empty the DNS cache on a DNS client?
a) ipconfig /all
b) nbtstat -RR
c) ipconfig /flushdns
d) ipconfig /emptydns
Question12 of 50
You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?
a) Allow zone transfers to any server (Zone Transfer tab in zone properties)
b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone
c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)
Question13 of 50
Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?
a) On the child domain DNS servers, create stub zones for the root domain zone
b) On the child domain DNS servers, configure conditional forwarders for the parent domain
c) On the root domain DNS servers, configure delegation subdomain records for the child domains
d) On the root domain DNS servers, create stub zones for the child domain zones
Question14 of 50
a) 55
b) 54
c) 52
d) 53
Question15 of 50
Question16 of 50
You have a WINS server that runs Windows Server 2003 Service Pack 2 (SP2). You need to schedule a
backup of the WINS database whenever the WINS service stops. What should you do?
Question17 of 50
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?
a) Start the computer in Safe Mode, and reformat the hard disk
b) Start the computer in debug mode, and reformat the hard disk
c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Record
Question18 of 50
You are the network administrator for TestKing.com. The network consists of a single Active Directory
domain named testking.com. All network servers run Windows Server 2003, and all client computers run
Windows XP Professional. XML Web services for the internal network run on a member server named
TK1, which is configured with default settings. You are a member of the local Administrators group on
TK1.You need the ability to remotely manage TK1. You have no budget to purchase any additional
licensing for your network until the next fiscal year. How should you reconfigure TK1?
b) Add your user account to the Remote Desktop Users local group
Question19 of 50
Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote
Assistance connections to all computers without a Remote Assistance invitation. Which group policy
setting should you configure?
Question20 of 50
You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users
report that they occasionally receive an error message indicating that Terminal Server has reached the
maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop
connections to the server concurrently. What should you do?
b) From Add or Remove Programs, add the Connection Point Services component.
c) From the Terminal Services Configuration console, modify the Maximum connections setting.
d) From the Terminal Services Configuration console, modify the Restrict each user to one session
setting.
Question21 of 50
Your network includes a TS Gateway server named TSG1. TSG1 has installed a self-signed server
certificate that it uses for SSL communications. You want to use a computer running ISA Server as an SSL
endpoint for TS Gateway connections. Which of the following steps must you take to ensure that ISA
Server can communicate with TS Gateway?
Question22 of 50
Your network consists of one Active Directory domain. All servers run Windows Server 2008. You plan to
publish a Web site on two Web servers. You need to recommend a solution for the deployment of the
two Web servers. The solution must provide the following requirements: Session-state information for
all users Access to the Web site if a single server fails Scalability to as many as seven Web servers
Support for multiple dedicated IP addresses for each Web server What should you recommend?
Question23 of 50
You are a help desk technician for your company. An employee named Marc is attempting to open a
Microsoft Word document Phonelist.doc by using Internet Explorer. However, when he types
http://Server1/Files/Phonelist.doc into the address bar in Internet Explorer, he receives the following
error message: 404: Page not found?! You verify that Phonelist.doc exists in a shared folder named Files
on Server1. You need to ensure that Marc can access Phonelist.doc by using Internet Explorer. What
should you do?
b) Grant Marcs domain user account Allow-Read permission on the File shared folder.
c) Grant Marcs domain user account Allow-Read permission on Phonelist.do
d) Instruct Marc to type file:\\server1\File\Phonelist.doc into the address bar in Internet Explorer
Question24 of 50
Your network contains a Windows Server Update Services (WSUS) server named Server1. You need to
configure all WSUS client computers to download approved updates directly from the Microsoft Update
servers. The solution must ensure that all WSUS client computers report successful installation of
updates to Server1. What should you do?
c) From the WSUS client computers, modify the local computer policy
Question25 of 50
Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is
deployed on the network. Server1 will be used to collect events from the Security event logs of the
other servers on the network. You need to define the Custom Event Delivery Optimization settings on
Server1. Which tool should you use?
a) Event Viewer
b) Task Scheduler
c) Wecutil
d) Wevtutil
Question26 of 50
a) 7
b) 4
c) 8
d) 13
Question27 of 50
a) 256 MB
b) 2 GB
c) 512 MB
d) 1 GB
Question28 of 50
A server application creates report files. The application saves the report files in a folder named Report.
A service account is listed as the owner of all report files. You need to assign ownership of the report
files to a user in a department named Audit. You must achieve this goal by using the minimum amount
of administrative effort. What should you do?
d) Use the Advanced Security settings to change the owner of each file.
Question29 of 50
How can you administer Windows Server 2008 R2 from a Windows 7 workstation?
Question30 of 50
You have multiple client computers on which you need to deploy the same image by using multicast.
Some of these computers are slower than others. Will slow clients bring down the speed of multicast
transmission?
a) No, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed
b) Yes, WDS in Windows Server 2008 R2 has the ability to divide multicast transmissions into multiple
streams based on the client speed
c) Yes, WDS in Windows Server 2008 has the ability to divide multicast transmissions into multiple
streams based on the client speed
d) No, WDS in Windows Server 2008 Standard edition has the ability to divide multicast transmissions
into multiple streams based on the client speed
Question31 of 50
a) Install and configure the SCSI card driver, Tape drive driver and fire the Systemstate backup through
Backup console.
b) Installa and configure the SCSI card driver,Tape drive driver and fire the systemstate backup through
Wbadmin command.
c) Tape drive cannot be configured to backup directly using native tools in Windows 2008. Backup can
be taken only on disks.
d) Systemstate backup can only be taken to CD/DVD but not to Tape Drive in Windows 2008.
Question32 of 50
You have a file server that runs Windows Server 2008 R2. You configure quotas on the server. You need
to view each users quota usage on a per folder basis. What should you do?
d) From the properties of each volume, review the Quota Entries list
Question33 of 50
Assume that you are the administrator of your companys network. You receive a request from Stephens
manager to disable Stephens access to a network share named Financial. Stephens user account is the
only member in a group named Reports. The Reports group has Full Control permission to the Financial
share. You delete the Reports group. You later find out that the manager was in error and that Stephen
should have his access to Financial share restore What should you do?
a) Re-create Reports and re-create Stephens user account. Use existing NTFS permissions.
b) Re-Create Reports and grant Reports NTFS Full Control permission to Financial. Stephens user
account will still be a member of Reports.
c) Re-create Reports and grant Reports Full Control permission to Financial. Add Stephens user account
to Reports.
d) Re-Create Reports and add Stephens existing user account to Reports. Use existing NTFS permissions.
Question34 of 50
Your company has a server named FS1. FS1 hosts the domain-based DFS namespace named \\
contoso.com\dfs. All domain users store their data in subfolders within the DFS namespace. You need to
prevent all users, except administrators, from creating new folders or new files at the root of the \\
contoso.com\dfs share. What should you do?
b) Configure the NTFS permissions for the C:\DFSroots\dfs folder on FS1. Set the Create folders/append
data special permission to Deny for the Authenticated Users group. Set the Full Control permission to
Allow for the Administrators group
c) Start the Delegate Management Permissions Wizard for the DFS namespace named \\contoso.com\
dfs. Remove all groups that have the permission type Explicit except the Administrators group
d) Configure the \\FS1\dfs shared folder permissions. Set the permissions for the Authenticated Users
group to Reader. Set the permissions for the Administrators group to Co-owner
Question35 of 50
Your network contains a domain-based Distributed File System (DFS) namespace named \\contoso.com\
dfs. \\contoso.com\\dfs is configured to use Windows 2000 Server mode. The domain contains two
servers named Server1 and Server2 that run Windows Server 2008 R2. Server1 is configured as a
namespace server for \\contoso.com\dfs. You need to migrate \\contoso.com\dfs to Windows Server
2008 mode. You install the Distributed File System role service on Server2. What should you do next?
Question36 of 50
Your network contains a server that runs Windows Server 2008 R2. You need to enable access based
enumeration (ABE) on a shared folder. Which console should you use?
b) Disk Management
d) Storage Explorer
Question37 of 50
a) TRUE
b) false
c) NA
d) Not sure
Question38 of 50
d) provide a single logon process for the user to gain access to computer resources
Question39 of 50
Question40 of 50
You are a network administrator for TestKing. The network consists of a single Active Directory domain
testking.com. All servers run Windows Server 2003. TestKing has a main office and a branch office. Both
offices are connected to the Internet by Network Address Translation (NAT) firewalls and T1 connections
to the companys ISP. Each firewall is configured with a perimeter network. TestKing uses a public key
infrastructure (PKI) for both internal and external authentication. TestKing needs to connect to the main
office to the branch office by using the existing Internet connections. TestKings written security policy
included the following requirements:
1. All Internet communications must use the PKI for all authentication and data encryption.
2. All servers that are required to communicate to or by means of the Internet must be located in a
firewall perimeter network.
You need to connect to the main office to the branch office. You need to comply with the written
security policy. You install Routing and Remote Access servers in the perimeter network at each office.
What else should you do?
b) Configure persistent, two-way initiated PPTP connections with MS-CHAP v2 user authentication
c) Configure persistent, two-way initiated L2TP/IPSec connections with MS-CHAP v2 user authentication
d) Configure persistent, two-way initiated L2TP/IPsec connections with EAP-TLS user and computer
authentication
Question41 of 50
a) 0
b) 1
c) 3
d) 5
Question42 of 50
Your network contains a server that has the HyperV server role installed. The server hosts a virtual
machine (VM) named VM1. VM1 runs Windows Server 2008 R2 and has the file server role installed. You
need to add more disk space to VM1. The solution must minimize the amount of downtime for VM1.
What should you do first on VM1?
Question43 of 50
Your network contains a two node Hyper-V cluster that hosts 10 virtual machines (VMs). You discover
that when a failover occurs, all of the VMs fail over simultaneously. You need to modify the cluster so
that you can fail over each VM individually. What should you do first?
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?
Question45 of 50
Your company has a server named VS1 that runs Windows Server 2008 and Microsoft Hyper-V.VS1 hosts
10 virtual machines. You need to configure VS1 to shut down each virtual machine before the server
shuts down. What should you do?
c) Enable the Turn off the virtual machine option in the Automatic stop action properties on each virtual
machine.
d) Enable the Turn off the virtual machine option in the Automatic stop action properties on each VM
Question46 of 50
Question47 of 50
Incident and Service requests are the same
a) Yes
Question48 of 50
a) A) Incident management
b) B) Problem management
c) C) Release management
Question49 of 50
Question50 of 50
Which process or function ensures that change proposals are submitted with the aim of removing errors
within the IT infrastructure?
a) Configuration Management
b) Problem Management
c) Change Management
d) Service Desk
Set 13:
Question1 of 50
You suspect that a stale record is incorrectly returned by your internal DNS server, and you wish to
empty the server cache. Which ONE of the following action will achieve this?
d) All of them
Question2 of 50
Which ITIL process handles the implementation of the policy for access management and access to
information systems?
a) Availability Management
b) Incident Management
c) Release Management
d) Security Management
Question3 of 50
Your network contains an Active Directory domain named contoso.com. The network has Direct Access
deployed. You deploy a new server named Server1 that hosts a management application. You need to
ensure that Server1 can initiate connections to Direct Access client computers. Which settings should
you modify from the Direct Access Setup console?
a) Application Servers
b) DirectAccess Server
c) Infrastructure Servers
d) Remote Clients
Question4 of 50
You have a terminal server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).
Occasionally, users report that they cannot connect to the terminal server. You need identify user
accounts that have multiple Terminal Services connections to Server1. Which tool should you use?
a) Remote Desktop
Question5 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Question6 of 50
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server
in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS
server in the main office, and you need to limit the number of DNS records that are transferred to the
DNS server in the branch office. What should you do?
Question7 of 50
Which tools can you use to manage printers on Windows 2000/2003 computers?
b) Internet Explorer
d) 1 and 2
Question8 of 50
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). You need to track the
amount of disk space used by each user on the server. What should you do?
d) From the Local Security Policy, enable auditing for object access.
Question9 of 50
Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode
enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are
displayed. What should you do?
a) Disable referrals
b) A TCP/IP address
Question11 of 50
Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB
of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to
prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS
replication traffic is minimized. Which tool should you use to prestage the Folder1 data?
a) Dfscmd
b) Dfsrmig
c) Dfsutil
d) Wbadmin
Question12 of 50
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?
a) Start the computer in Safe Mode, and reformat the hard disk
b) Start the computer in debug mode, and reformat the hard disk
c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor
Question13 of 50
You want to see if any broken links are there in your Web site. Which tool do you use?
a) NT Explorer
c) User Manager
d) Performance Monitor
Question14 of 50
Which command launches the file signature verification tool that is used to identify unsigned drivers
installed on a windows 2003 Server?
a) Winmsexe
b) Fsutil.exe
c) Sigverif.exe
d) Regedit.exe
Question15 of 50
Your network contains two servers named Server1 and Server2 that run Windows Server 2008.
Microsoft System Center Operations Manager (SCOM) 2007 is installed on Server2. The Hyper-V role is
installed on Server1. Server1 hosts five child virtual machines that run Windows Server 2003. You need
to recommend a solution that enables administrators to monitor the child virtual machines. The solution
must gather the following data from the virtual machines: Performance statistics Event data from the
application log What should you recommend?
d) On Server2, install Microsoft System Center Virtual Machine Manager (SCVMM) 2007
Question16 of 50
b) NetBIOS
c) NDOS
d) PPP
Question17 of 50
The rights required to share a folder on a domain controller for a user jack is
Question18 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?
a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.
b) Restore the Documents and Settings folder that contains the WorkProduct folder.
c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.
d) Restore Peters WorkProduct folder, and choose the original location for the restoration.
Question19 of 50
When connecting IIS to an external data source through ODBC (Open Data Base Connector), which type
of ODBC DSN must be specified?
a) System
b) File
c) Server
d) User
Question20 of 50
Question21 of 50
Your network contains a server that has the SNMP Service installed. You need to configure the SNMP
security settings on the server. Which tool should you use?
b) Scw
c) Secedit
d) Services Console
Question22 of 50
Which of the following categories for UTP has the least expensive cable?
a) 1
b) 2
c) 3
d) 4
Question23 of 50
Which of the following will complete the Four Ps of Service Design? 1. Perspectives 2. Positioning 3. Plan
4. ???
a) People
b) Product
c) Patterns
d) Partners
Question24 of 50
The primary goal of which process is to provide the rights for users to be able to access a service or
group of services, while preventing access to non-authorized users.
a) Configuration Management
b) Availability Management
c) Access Management
d) Change Management
Question25 of 50
What is the default share permissions when creating a new share in Microsoft Windows Server?
Question26 of 50
Which of the following is the most appropriate approach to carrying out Service Operations?
a) The internal IT view is most important as Service Operations has to monitor and manage the
infrastructure
b) Service Operations should maintain a balance between an internal IT view and an external business
view
c) The external business view is most important as Service Operations is the place where value is
realized and the customer obtains the benefit of the services
d) IT Operations does not take an internal or external view as they execute processes defined by Service
Design
Question27 of 50
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?
c) Configure the Certification Authority Web Enrollment Role Service on a member server
d) Configure the Certification Authority Web Enrollment Role Service on a domain controller
Question28 of 50
Is it possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core? If yes, how can you use it for remote management?
a) no, it is possible to use compmgmt in Windows Server 2008 R2 to remotely manage Windows Server
2008 R2 Server Core
b) yes, it is possible to use system centre Manager in Windows Server 2008 R2 to remotely manage
Windows Server 2008 R2 Server Core
c) no, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core enable by using the SConfig tool.
d) Yes, it is possible to use Server Manager in Windows Server 2008 R2 to remotely manage Windows
Server 2008 R2 Server Core and enable by using the SConfig tool.
Question29 of 50
ITIL V3 talks about "aligning IT with business".
a) TRUE
b) false
Question30 of 50
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?
Question31 of 50
a) Telnet
b) DHCP
c) BOOTP
d) RAS
Question32 of 50
a) Level0
b) Extended
c) Level1
d) Primary
Question33 of 50
You want to write a script that encrypts each users My Documents folder using EFS. It has to be
scheduled only run once. What tool must you use in the script?
a) Windows Explorer
b) Efsinfo
c) Syskey
d) Cipher
Question34 of 50
a) 192.168.1.1
b) 192.168.1.63
c) 192.168.1.65
d) 192.168.1.93
Question35 of 50
You have been given a task to set per user 10 GB of Hard disk space on a file server. How you will do
this?
How can you ensure that an application installed on a computer running Terminal Services can support
multiple users?
Question37 of 50
a) High-availability
Question38 of 50
a) Forward zone
b) Reverse zone
Question39 of 50
a) 5
b) 6
c) 7
d) 4
Question40 of 50
a) 50
b) 58
c) 75
Question41 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:
- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network
b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network
c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network
d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network
Question42 of 50
Which of the following media has the highest EMI?
a) UTP
b) STP
d) Radio
Question43 of 50
a) Web Edition
b) Standard Edition
c) Enterprise Edition
Question44 of 50
You have a DHCP server that runs Windows Server 2008 R2. You need to reduce the size of the DHCP
database. What should you do?
b) From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb temp.mdb
c) From the properties of the dhcp.mdb file, enable the File is ready for archiving attribute
d) From the properties of the dhcp.mdb file, enable the Compress contents to save disk space attribute
Question45 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You create a new virtual machine and perform an installation of Windows Server 2003 on the virtual
machine. You configure the virtual machine to use the physical network card of the host server. You
notice that you are unable to access network resources from the virtual machine. You need to ensure
that the virtual host can connect to the physical network. What should you do?
a) On the host server, install the Microsoft Loopback adapter
Question46 of 50
You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?
Question47 of 50
a) LPT port
b) Network Port
c) TCP/IP port
Question48 of 50
Your network consists of one Active Directory forest that contains one root domain and 10 child
domains. Administrators of the child domains frequently modify the records for authoritative DNS
servers for the child domain DNS zones. You need to recommend a solution to minimize the amount of
manual configuration steps required to maintain name resolution on the network. What should you
recommend?
a) On the child domain DNS servers, create stub zones for the root domain zone
b) On the child domain DNS servers, configure conditional forwarders for the parent domain
c) On the root domain DNS servers, configure delegation subdomain records for the child domains
d) On the root domain DNS servers, create stub zones for the child domain zones
Question49 of 50
You manage a server that runs Windows Server 2008 R2. The D:\Payroll folder is corrupted. The most
recent backup version is 10/29/2007-09:00. You need to restore all the files in the D:\Payroll folder back
to the most recent backup version without affecting other folders on the server. What should you do on
the server?
Question50 of 50
All domain controllers run Windows Server 2008. You need to prepare the environment to provide a
high-availability solution for a back-end Microsoft SQL Server 2005 data store. What should you do?
c) Install a Windows Server 2008 failover cluster that has shared storage.
d) Install a Windows Server 2008 failover cluster that has direct attached storage.
Set 14:
Your computer has Windows Server 2003 installed. Your office has a power outage while you are
running the Windows 2003 disk defragmenter. When you restart your computer, you receive the
following error message: Bad or missing operating system. What should you do?
a) Start the computer in Safe Mode, and reformat the hard disk
b) Start the computer in debug mode, and reformat the hard disk
c) Start the computer by using the Emergency Repair Disk, and repair the Master Boot Recor
Question2 of 50
A user complains that whenever he tries to open acrobat file from Internet explorer it does not get
opened. What would be the problem?
a) IE Cipher Strength
b) ActiveX controls
c) Internet explorer
Question3 of 50
Which of the following would NOT be stored in the Definitive Media Library (DML)?
c) Software licenses
Question4 of 50
Your network contains a virtual machine (VM) named VM1. VM1 contains two virtual hard disks (VHDs).
One VHD is a dynamically expanding disk and the other VHD is a fixed disk. You need to manually copy
the VHDs. The solution must minimize the amount of downtime for VM1. What should you do first?
Question5 of 50
To communicate between DNS client and a WINS Client, what parameter you will configure?
Question6 of 50
Write the name of layer of the OSI model that maintains a connection between nodes?
a) Transport Layer
b) Session Layer
c) Physical Layer
d) Network Layer
Question7 of 50
Which of the following IRQs are used for the CMOS/real-time clock?
a) 0
b) 2
c) 4
d) 8
Question8 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the File
Services role installed. You configure a file classification rule. You discover that scanned documents
stored as JPG files are not being classified. You need to ensure that all file classification rules apply to
scanned documents. What should you do?
Question9 of 50
a) NetBEUI
b) NetBIOS
c) NDOS
d) PPP
Question10 of 50
a) Second-level domain
b) Root domain
c) Top-level domain
d) Third-level domain
Question11 of 50
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
implement a backup schedule on Server1 to meet the following requirements: Everyday, back up all files
and folders to disk. Every Friday, back up all files and folders to tape Every Sunday, Tuesday, and
Thursday, back up only the files and folders that have changed since the previous Fridays backup to
tape. Which backup jobs should you create?
a) a normal backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday, and Thursday
b) a normal backup to disk everyday a normal backup to tape on Friday an incremental backup to tape
on Sunday, Tuesday, and Thursday
c) a copy backup to disk everyday a normal backup to tape on Friday a differential backup to tape on
Sunday, Tuesday and, Thursday
d) a copy backup to disk everyday a normal backup to tape on Friday an incremental backup to tape on
Sunday, Tuesday and, Thursday
Question12 of 50
a) TRUE
b) false
c) NA
d) Not sure
Question13 of 50
Your network consists of an Active Directory forest that contains one domain. All domain controllers run
Windows Server 2008 and are configured as DNS servers. You have an Active Directory-integrated zone.
You have two Active Directory sites. Each site contains five domain controllers. You add a new NS record
to the zone. You need to ensure that all domain controllers immediately receive the new NS record.
What should you do?
c) From the DNS Manager console, increase the version number of the SOA record
d) From the command prompt, run repadmin /syncall
Question14 of 50
Your company runs Terminal Services on a server named Server2. You need to prevent new sessions on
the Terminal Server without affecting current user sessions. Which command should you run?
c) Tskill /server:Server2 /A
Question15 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?
Question16 of 50
Which of the following categories for UTP has the least expensive cable?
a) 1
b) 2
c) 3
d) 4
Question17 of 50
The main benefits of a domain are
d) provide a single logon process for the user to gain access to computer resources
Question18 of 50
You want to install windows 7 on 30 PXE-compliant computers and 35 non-PXE-compliant computers. All
65 computers are included on the current hardware compatibility list (HCL). You create a RIS image. You
load the Image on the RIS server. You then start the 65 computers. You find that the 30 PXE-Compliant
computers can connect to the RIS server. However, the 35 non-PXE-compliant computers are not able to
connect to the RIS server. You want the 35 non-PXE compliant computers to connect to the RIS server.
What should you do?
c) Grant the everyone group NTFS Read permission for the RIS image
d) Grant the Administrators group NTFS Read permission for the RIS image
Question19 of 50
a) News
b) Mail
c) Gopher
d) WWW
Question20 of 50
Your company has one main office and four branch offices. An Active Directory site exists for each office.
The network consists of one Active Directory domain. All servers run Windows Server 2008. The branch
offices are connected to the main office by slow and unreliable wide area network (WAN) links. Users
complain that WAN link failures prevent them from accessing files on remote servers. You need to
recommend a solution to maintain availability of files on the remote servers. The solution must meet the
following requirements: Support scheduling of WAN link traffic. Enable the connection to resume
immediately after a WAN link interruption. What should you recommend?
b) Use the File Server Resource Manager (FSRM) and create file screens
c) Use the File Replication Service (FRS) and replicate data to each branch office
Question21 of 50
a) Upto 2TB
b) Upto 4TB
c) upto 6TB
d) Upto 16TB
Question22 of 50
You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). You need to create a report
of all the printers that are on the server and the drivers that they use. What should you do?
a) Open The Printers and Faxes control panel applet and select the details view. Take a screen capture
of the Printers and Faxes window.
Question23 of 50
CSMA/CD stands for?
Question24 of 50
a) TFTP download
b) DHCP request
c) Telnet Session
d) ROSI protocol
Question25 of 50
a) Through testing,to ensure that services are designed to meet business needs
Question26 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
Question27 of 50
a) Remote administration
b) Deployment of application
Question28 of 50
You have a file server that runs Windows Server 2008 R2. You configure quotas on the server. You need
to view each users quota usage on a per folder basis. What should you do?
d) From the properties of each volume, review the Quota Entries list
Question29 of 50
Which of the following is the CORRECT description of the Four P's of Service Design?
d) The four major areas that need to be considered in the design of effective Service Management
Question30 of 50
You’ve added the AD CS role to your server and configured group policy to enroll users automatically.
What else must you do in order to start issuing certificates?
Question31 of 50
You are configuring a failover cluster for a database server. You are assigning four nodes to the cluster.
All nodes have access to a SAN, and adequate storage is available. Which of the following options should
you choose for your quorum configuration?
d) Node Majority
Question32 of 50
Which of the following best describes the goal of Information Security Management Process?
a) To align IT security with business security and ensure that information security is effectively managed
in all service and Service Management activities
b) To ensure that that the information security risks are appropriately managed and enterprise
information resources are used responsibly
c) To provide a focus for all aspects of IT security and manage all IT security activities
d) To provide the strategic direction for security activities and ensures objectives are achieved
Question33 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements:
- All virtual machines (VMs) on Server1 must be able to communicate with other computers on the
network.
a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network
b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network
c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network
d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network
Question34 of 50
You are the network administrator for TestKing. TestKing is deploying a public Web server farm on
Windows Server 2008 computers. This Web server farm will allow the public to view company
information. The Web servers in the Web server farm will be placed in TestKings perimeter network,
which uses a public Internet address space. TestKing wants to reduce the probability of external
unauthorized users breaking into the public Web servers. You need to make the Web servers less
vulnerable to attack. You also want to ensure that the public will be able to view information that is
placed in TestKings perimeter network. What should you do?
Question35 of 50
Application Management is NOT responsible for?
a) Documenting and maintaining the technical skills required to manage and support Applications
Question36 of 50
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You need to
use Windows Backup to meet the following requirements: Minimize the number of scheduled backup
jobs. Perform a scheduled normal backup to disk every Friday. Perform a scheduled normal backup to
tape every Friday. Perform scheduled differential backups to tape every Monday, Tuesday, Wednesday,
and Thursday. How many scheduled jobs should you create from Windows Backup?
a) one
b) two
c) three
d) six
Question37 of 50
You are the administrator of a Windows Server 2003 network. Your network includes 75 Windows XP
Professional computers. You are adding 50 new PXE-compliant computers to the network. The hardware
on each computer is configured identically. You are using a RIS image to deploy Windows XP
Professional to the 50 computers. You successfully install Windows XP Professional on the first 10
computers. However, you cannot install Windows XP Professional on remaining 40 computers. What
should you do?
You plan to use only iSCSI for shared storage thats runs Windows 2008. You plan to deploy servers that
run Microsoft SQL Server 2005 on the network. You need to recommend a high-availability solution for
the SQL Server 2005 servers to withstand the failure of any single hardware component. What should
you recommend?
a) Install a two node failover cluster that has multiple network cards.
b) Install a two node failover cluster that has a dual port teamed network card.
c) Install a Network Load Balancing cluster that has multiple network cards.
d) Install a Network Load Balancing cluster that has multiple teamed network cards.
Question39 of 50
a) Level0
b) Extended
c) Level1
d) Primary
Question40 of 50
Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?
Question41 of 50
The server contains one volume. You install Certificate Services. You need to back up the Certificates
Services database by using the minimum amount of storage space. Which tool should you use?
b) Certificates snap-in
d) Windows Backup
Question42 of 50
Your company has a server that runs Windows Server 2008 R2. You have a new application that locates
remote resources by name. The new application requires IPv6. You need to ensure that the application
can locate remote resources by using IPv6. What should you do?
Question43 of 50
You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are
configured as DNS servers. The domain contains one Active Directory-integrated DNS zone. You need to
ensure that outdated DNS records are automatically removed from the DNS zone.What should you do?
c) From the properties of the zone, modify the TTL of the SOA record
Question44 of 50
You have a server that runs Windows Server 2008 R2. You create a new quota template. You apply
quotas to 100 folders by using the quota template. You need to modify the quota settings for all 100
folders. You must achieve this goal by using the minimum amount of administrative effort. What should
you do?
c) Create a new quota template. Modify the quota for each folder
d) Create a file screen template. Apply the file screen template to the root of the volume that contains
the folders
Question45 of 50
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You
install a new network adapter on Server1. You need to view the media access control (MAC) address for
the new network adapter. What should you do
c) From the Device Manager snap-in, view the properties of the network adapter.
d) From the Services snap-in, view the properties on the Network Connections service.
Question46 of 50
Your network contains an Active Directory domain. You have a print server named Server1 that runs
Windows Server 2008 R2. You deploy a new print device and create a shared printer. You need to
ensure that only members of a group named Marketing can print color documents on the new print
device. All other users must only be able to print black and white documents on the new print device.
What should you do?
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.
Question48 of 50
You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored
on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from
his user profile. He needs to have his WorkProduct folder restored. You need to restore Peters
WorkProduct folder. What should you do?
a) Restore Peters WorkProduct folder, and clear the Restore junction points, but not the folders and the
file data they reference check box.
b) Restore the Documents and Settings folder that contains the WorkProduct folder.
c) Restore Peters WorkProduct folder, and choose an alternate location for the restoration.
d) Restore Peters WorkProduct folder, and choose the original location for the restoration.
Question49 of 50
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to
the network by using 802.1X authentication from any access point. You need to ensure that all client
computers that access the network are evaluated by NAP. What should you do?
b) Configure all access points as RADIUS clients to the Network Policy Server (NPS)
c) Create a Network Policy that defines Remote Access Server as a network connection method
d) Create a Network Policy that specifies EAP-TLS as the only available authentication method
Question50 of 50
a) Compressed
b) Archived
c) Encapsulated
d) Encrypted
Set 15:
Question1 of 50
a) Application
b) Transport
c) Network
d) Data Link
Question2 of 50
a) This command-line diagnostic tool helps to isolate networking and connectivity problems by
performing a series of tests to determine the state of your network client. These tests and the key
network status information they expose give network administrators and support personnel a more
direct means of identifying and isolating network problems
b) This GUI diagnostic tool helps to isolate networking and connectivity problems by performing a series
of tests to determine the state of your network client. These tests and the key network status
information they expose give network administrators and support personnel a more direct means of
identifying and isolating network problems
c) its third part tool and Microsoft suggested not to use this tool in medium and large setup.
Question4 of 50
a) 1
b) 3
c) 5
d) 7
Question5 of 50
a) Baseband
b) Broadband
c) Thicknet
d) Thinnet
Question6 of 50
a) Protocol manager
b) Binding manager
c) Redirector
d) The registry
Question7 of 50
Which standard divides the data link layer into the LLC and the MAC sublayers?
a) 802.1
b) 802.2
c) 802.3
d) 802.4
Question8 of 50
a) MILNET
b) ARP/RARP
c) TCP/IP
d) Internet
Question9 of 50
Your company has one office in Montreal and one office in New York. Each office has 2,000 client
computers configured as DHCP clients. DHCP relay is not supported on the network routers. The
network consists of one Active Directory domain. You need to recommend a DHCP addressing solution
for both offices. The solution must meet the following requirements: Minimize traffic between offices.
Be available if a single server fails. What should you recommend?
c) In the Montreal office, install a DHCP server. In the New York office, install a DHCP Relay Agent
d) In the Montreal office, install a DHCP instance on a two node failover cluster. In the New York office,
install a DHCP Relay Agent
Question10 of 50
a) TRUE
b) false
c) NA
d) Not sure
Question11 of 50
Question12 of 50
You want to ensure that DNS zone content is secured and that no user can write to DNS zones. How
should you configure your zones?
a) Secondary
b) Caching
c) Stub
d) AD-integrated
Question13 of 50
You configured a DNS zone on the primary server and now would like to set up a transfer to a secondary
server. However, during secondary zone initiation on another server attempts to load the zone
consistently fail. What should you do to correct the problem?
a) Allow zone transfers to any server (Zone Transfer tab in zone properties)
b) Allow zone transfers to servers listed in the Name Servers tab (Zone Transfer tab in zone properties)
and add the secondary server to the NS of the zone
c) Allow zone transfers to selected servers (Zone Transfer tab in server properties)
Question14 of 50
Your company has a domain controller named Server1 that runs Windows Server 2008 R2. Server1 has
the DNS Server server role installed. You need to configure the DNS server to resolve IP addresses to
host names. Which record should you create?
a) Pointer (PTR)
Question15 of 50
a) PTR
c) NS
d) MX
Question16 of 50
To communicate between DNS client and a WINS Client, what parameter you will configure?
a) Not possible to communicate
Question17 of 50
a) When you need to resolve NetBIOS names to IP address dynamically and When you need to resolve
NetBIOS names to IP address statically.
Question18 of 50
b) Repair the WINS server and upgrade the server to Windows 2008 Server.
Question19 of 50
How will you administer Windows Server 2008 R2 from the workstation where you cannot install
Windows Server Remote Administration Tools?
a) You can not use Remote Desktop for remote administration
b) You can still use Remote Desktop for remote administration, if it is disabled on the target server, if
you have permissions and firewall is blocking the connection.
c) You can still use Remote Desktop for remote administration, if it is enabled on the target server, if
you have permissions and firewall is not blocking the connection.
Question20 of 50
You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS
Gateway) role service installed. You need to provide a security group access to the TS Gateway server.
What should you do?
Question21 of 50
You have a Terminal Server that runs Windows Server 2008. You need to configure the server to end any
sessions that are inactive for more than one hour. What should you do?
d) From Terminal Services Configuration, modify the User logon mode setting
Question22 of 50
You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the
application event logs for all the Web servers. The archived logs must contain all information from the
original logs. What should you do?
a) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
b) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file
type.
c) On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer,
and then export the settings.
d) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
Question23 of 50
Question24 of 50
a) Printer properties
b) Spooler Printer
c) Print Spool
d) Print Spooler
Question25 of 50
a) Format
b) Sharing
c) Delete
d) Copy
Question26 of 50
a) Print Server
b) File Server
c) Application Server
d) Web Server
Question27 of 50
a) 8
b) 32
c) 16
d) 9
Question28 of 50
What is the advantage that the 64-bit environment has over the 32-bit environment?
a) Price
b) Performance
c) Application Support
All servers run Windows Server 2003. A network server named Server1 functions as the main file server.
Server1 is backed up each night by using the Backup utility. You perform a test restoration of Server1 by
using the Backup utility. You discover that files that are open during the backup process are not being
backed up. You need to ensure that open files should be backed up successfully. What should you do?
a) Enable volume shadow copies on the partitions that are being backed up
b) Disable volume shadow copies on the partitions that are being backed up.
c) Select the Verify data after backup check box in the Advanced backup options of the backup job.
d) Clear the Disable volume shadow copy check box in the Advanced backup options of the backup job.
Question30 of 50
Your network consists of one Active Directory domain named ABC.COM. The domain contains three
Windows Server 2008 servers named Server1, Server2, and Server3. Server1 runs Active Directory
Certificate Services (AD CS) and is configured as an enterprise root certification authority. Server2 hosts
an internal Web site. Users currently connect to the Web site by using the URL https://server2.abc.com.
You plan to replicate the Web site from Server2 to Server3. You need to recommend a solution to
enable users to connect to the Web site through HTTPS on either Server2 or Server3 by using a single
URL. The solution must meet the following requirements: Users must be able to use the
https://www.abc.com URL to connect to the Web site. Incoming connections must be dynamically
balanced between Server2 and Server3. What should you recommend?
a) Add both servers to a Network Load Balancing cluster. Export the Web server certificate on Server2
to Server3
b) Add both servers to a failover cluster. Issue a Web server certificate for www.abc.com. Install the
certificate on Server2
c) Add both servers to a Network Load Balancing cluster. Issue a Web server certificate for
www.abc.com. Install the certificate on Server2 and Server3
d) Add both servers to a failover cluster. Issue a Web server certificate for server2.abc.com and install
the certificate on Server2. Issue a Web server certificate for server3.abc.com and install the certificate
on Server3
Question31 of 50
Maximum number of Nodes supported in Windows 2008 standard server Load Balancing and cluster
a) 16 Nodes in cluster and 32 Nodes in Load Balancing
Question32 of 50
Your network contains one Active Directory domain. You have a member server that runs Windows
Server 2008 R2. You need to immediately disable all incoming connections to the server. What should
you do?
c) From Windows Firewall, enable the Block all connections option on the Public Profile
d) From Windows Firewall, enable the Block all connections option on the Domain Profile
Question33 of 50
c) It explicitly defines users and their respective access rights to a particular resource.
d) All of them
Question34 of 50
You have a stand-alone file server, The server has a shared folder that contains over 1,000 folders. The
folders contain over 100,000 files. You need to create a batch file that modifies the permissions of all
files that start with the string "report". Which command should you include in the batch
file?
a) Attrib.exe
b) Cacls.exe
c) Dsacls.exe
d) Dsmod.exe
Question35 of 50
You need to ensure that none of the user should be able store media files in File Server and also ensure
that you need to assign the quota level on the shared common folder. What should you do ?
b) Recommen for thirdparty file server solution like filers and configure the policy.
d) Configure the Folder Level Quota using FSRM and enable the file screening policy to block media files.
Question36 of 50
a) TRUE
b) false
c) NA
d) NOT SURE
Question37 of 50
a) Security
b) Compression
c) Disk quota
a) net share c:
b) net share
Question39 of 50
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents port 443 and port 80 from
being opened on domain controllers and on the issuing CA. You need to allow users to request
certificates from a Web interface. You install the AD CS role. What should you do next?
c) Configure the Certification Authority Web Enrollment Role Service on a member server
d) Configure the Certification Authority Web Enrollment Role Service on a domain controller
Question40 of 50
You’ve added the AD CS role to your server and configured group policy to enroll users automatically.
What else must you do in order to start issuing certificates?
Question41 of 50
You have a server that runs Windows Server 2008 R2. The server has the Hyper-V server role installed.
You need to merge a differencing disk and a parent disk. What should you do?
Question42 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 has
two network adapters. You need to configure Server1 to meet the following requirements: - All virtual
machines (VMs) on Server1 must be able to communicate with other computers on the network.
a) Create one internal virtual network. Clear the Enable virtual LAN identification for management
operating system check box for the virtual network
b) Create one external virtual network. Clear the Allow management operating system to share this
network adapter check box for the virtual network
c) Create one internal virtual network. Select the Enable virtual LAN identification for management
operating system check box for the virtual network
d) Create one external virtual network. Select the Allow management operating system to share this
network adapter check box for the virtual network
Question43 of 50
Your network contains a server named Server1 that has the Hyper-V server role installed. Server1 hosts
a virtual machine (VM) named VM1 that runs Windows Server 2003 Service Pack 2 (SP2). VM1 is
configured to use a 127GB dynamically expanding virtual hard disk (VH. You need to add 500 GB of disk
space to VM1. The solution must minimize the amount of downtime for VM1. What should you do?
a) Increase the size of the VHD drive
Question44 of 50
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the
HyperV server role installed. Server1 hosts a virtual machine (VM) named VM1. You take a snapshot of
VM1 at 05:00 and at 19:00. You use HyperV Manager to delete the snapshot taken at 05:00. You need to
ensure that the files created by the 05:00 snapshot are deleted from the hard disk on Server1. What
should you do?
d) From the HyperV Manager console, rightclick VM1 and click Revert
Question45 of 50
Which of the following is a feature only of Windows Server Hyper-V and not of Virtual PC or Virtual
Server?
Question46 of 50
c) All service-related problems are fixed free of charge for a certain period of time
Question47 of 50
a) A change of state which has significance for the management of a Configuration Item or IT service.
b) The term Event is also used to mean an Alert or notification created by any IT Service,configuration
Item or Monitoring tool.
c) Events typically require IT Operations personnel to take actions,and often lead to Incidents being
logged
d) All of above
Question48 of 50
Which of the following statements about Supplier and Contract Database (SC are correct?
1. A database or structured Document used to manage Supplier Contracts throughout their Lifecycle.
a) 1 & 2 only
b) 1,2 & 3
c) 1,2 & 4
d) All of above
Question49 of 50
In which core publication can you find detailed descriptions of the following?
2. Demand Management
3. Financial Management
a) Service Operations
b) Service Strategy
c) Service Transition
Question50 of 50
a) To standardize operation