final test part 2 Flashcards

1
Q

Which of the following RAID level combinations makes RAID-10? Each correct answer represents a part of the solution. Choose two.
A. RAID-1
B. RAID-0
C. RAID-2
D. RAID-3

A

AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Andrew purchases a laptop that has the Windows 2000 Professional operating system. He wants to know about the BIOS version of the computer. Which of the following steps will he take to determine the version of the BIOS? Each correct answer represents a part of the solution. Choose two.
A. In the System Information window, click the Hardware Resources folder in the left pane.
B. Click the Start menu, choose Programs > Accessories > System Tools > System Information.
C. Click the Start menu, choose Programs > Accessories > Communications > System Information.
D. In the System Information window, click the System Summary folder in the left pane.

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

David works as a System Administrator for company Inc. The company has a Windows Server 2008 domain-based network. David uses Microsoft Deployment
Toolkit (MDT) 2010 for preparing a deployment. He wants to mount a virtual hard disk (.vhd) file offline and service it just like a Windows image file. Which of the following will David use to accomplish the task?
A. Windows Preinstallation Environment (Windows PE)
B. ImageX
C. DiskPart
D. SYSPREP tool

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have installed iSCSI Initiator to enable block-based storage area networks in the network infrastructure of your organization. For security reasons, you need to configure authentication protocols in the network. Which of the following protocols will you use with iSCSI Initiator? Each correct answer represents a complete solution. Choose two.
A. CHAP
B. IPSec
C. PAP
D. MS-CHAP

A

AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You work as a System Administrator for company Inc. The company has a Windows 2008 Active Directory network. The company purchases twenty new computers. The management instructs you to deploy Windows 2008 on all the new computers. You install Windows PE on all computers. You want to control whether a customized shell is loaded in Windows PE instead of the default Command Prompt window. Which of the following commands will you use to accomplish the task?
A. Wpeinit
B. Winpeshl
C. Wpeutil
D. Oscdimg

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements best describe the features of a network printer? Each correct answer represents a complete solution. Choose two.
A. Anyone in the network can use it to print only if the machine to which the printer is connected is switched on.
B. It is shared by more than one computer.
C. Print jobs can be sent only by the computer that is directly connected to the printer.
D. It is connected directly to a computer.

A

AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work as a Server Administrator for company Inc. The company has a Windows Server 2008 domain-based network. The network contains twenty Windows
Server 2008 R2 and 600 Windows 7 client computers. You want to manage the installation of Windows updates on the client computers so that each client does not have to download updates for his computer. You also want only those updates to be installed on the client computers that you have tested and approved.
Which of the following tools will you use to accomplish the task?
A. EMS
B. DISM
C. SCCM
D. SCOM

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You add Web Server support while installing the Application Server role on a computer running Windows Server 2008 R2. Web Server support installs IIS (Internet
Information Services) on the server. Which of the following benefits are provided by IIS? Each correct answer represents a complete solution. Choose three.
A. It is used to support ASP.NET applications accessed from a Web browser.
B. It is used to support Web services built with ASP.NET or WCF (Windows Communication Foundation).
C. It is used to disable Application Server to host external Websites with static or dynamic content.
D. It is used to enable Application Server to host internal Websites with static or dynamic content.

A

ABD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You work as a Server Administrator for company Inc. The company has a Windows 2008 based network environment. There are thirty client computers running
Windows 7 and three servers running Windows Server 2008 R2. You need to implement a system in the network that provides data access to heterogeneous network clients using SMB/CIFS. Which of the following will you use?
A. Storage area network
B. Failover clustering
C. Datafile striping
D. Network-attached storage

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following server roles simplifies the process of deploying applications that respond to requests sent over the network from remote applications?
A. Windows Server Virtualization
B. Network Policy and Access Services
C. Active Directory Certificate Services
D. Application Server

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following types of logs contains events such as valid or invalid log on attempts and access to designated objects such as files, folders, printers, etc.?
A. Application logs
B. System logs
C. Security logs
D. Setup logs

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are using self-healing NTFS in Microsoft Windows Server 2008 R2. Which of the following are functions of self-healing NTFS? Each correct answer represents a complete solution. Choose all that apply.
A. It decreases failed file system mounting requests that occur due to inconsistencies during restart or for an online volume.
B. It identifies and recovers an NTFS volume.
C. It provides continuous data availability.
D. It allows an authorized user to administer and monitor repair operations.

A

ACD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You work as a System Administrator for company Inc. Management has asked you to find a way to make sure that all systems working in the network are updated on a regular basis. Which of the following will you configure to update the systems?
A. SIM
B. WDS
C. SCOM
D. WSUS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are the ways to open the Task Manager utility on a Windows computer? Each correct answer represents a complete solution. Choose all that apply.
A. Press Ctrl + Alt + Del
B. Press Ctrl + Alt
C. Press Ctrl + Shift + Esc
D. Click on the Start button, choose Run, and type devmgmt.msc

A

AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two different ways of creating Group Policy Object (GPO) with the help of Group Policy Management Console (GPMC)? Each correct answer represents a complete solution. Choose two.
A. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects node. Right-click the Group Policy Objects node, and click Properties. Change the default name of the GPO to your desired name, and then click OK.
B. Open the Group Policy Management Console (GPMC) and navigate to the container where you want to apply the GPO. Right-click the container, and click Create A GPO In This Domain And Link It Here.
C. Open the Group Policy Management Console (GPMC) and navigate to the Domain Controller where you want to apply the GPO. Right-click the controller, and click Create A GPO In This Domain And Link It Here.
D. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects node. Right-click the Group Policy Objects node, and click

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You work as a System Administrator for company Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. You are planning to create a group that can be used only for non-security functions, such as distributing e- mail messages. Which of the following groups will you create?
A. Application group
B. User group
C. Distribution group
D. Security group

A

C

17
Q

Mark works as a Network Administrator for Net Tech Inc. The company has a Windows Server 2008 domain-based network. The network contains 3 Windows
Server 2008 R2 and 100 Windows 7 client computers. Mark wants to modify an online image using the DISM tool. Which of the following modifications will he be able to do in the image? Each correct answer represents a complete solution. Choose two.
A. Change the currently active user interface language.
B. Disable an operating system feature.
C. Add a new device driver to the image.
D. Add a language pack to the image.

A

BD

18
Q

Which of the following server roles offers various methods to provide users with local and remote network connectivity, to connect network segments, and to permit network administrators to centrally manage network access and client health policies?
A. Active Directory Certificate Services
B. Network Policy and Access Services
C. Web Services
D. Terminal Services

A

B

19
Q

Which of the following services allows a user to run specific programs and tools with diverse permissions than the user’s current logon provides?
A. WCF service
B. RunAs service
C. Web service
D. WMI service

A

B

20
Q

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The network has a file server that uses a
RAID-5 volume. The RAID-5 volume is configured with five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the RAID-5 volume?
A. Replace the failed drive with a new one, use FDISK, select a new area of free space, and then regenerate the volume.
B. Replace the failed drive with a new one, use Disk Management, select a new area of free space, and then regenerate the volume.
C. Use Disk Management, select the failed drive, and then regenerate the volume.
D. Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

A

B