Single Topic Flashcards
Running a system in safe mode:
A. protects the system from viruses.
B. protects the system from data loss.
C. loads a minimum number of drivers.
D. prevents unauthorized access.
C. loads a minimum number of drivers.
Your backup plan calls for a full backup every Sunday. Every other day of the week, you need to back up only the changes since the last full backup. Which backup type should you use for Tuesday?
A. Daily
B. Normal
C. Copy
D. Differential
D. Differential
To protect a server in case of a blackout, you should use a/an:
A. Uninterruptible Power Supply. B. Dedicated surge protector. C. Power Supply Unit. D. Redundant power supply. E. Hot-swappable power supply. F. Line conditioner.
A. Uninterruptible Power Supply.
Which tool would you use to retrieve detailed information about a significant occurrence in a computer system?
A. Event Viewer
B. System Information
C. System Monitor
D. Resource Monitor
A. Event Viewer
Which task is executed during the Power-On Self Test (POST)?
A. The amount of system RAM is detected.
B. The Master Boot Record is created.
C. The operating system is initialized.
D. Disk file systems are detected.
Correct Answer: A (The amount of system RAM is detected.)
The principal duties of the main BIOS during POST are as follows:
✑ verify CPU registers
✑ verify the integrity of the BIOS code itself
✑ verify some basic components like DMA, timer, interrupt controller
✑ find, size, and verify system main memory
✑ initialize BIOS
✑ pass control to other specialized BIOSes (if and when required)
✑ identify, organize, and select which devices are available for booting
You configure Volume Shadow Copy Service (VSS) to save previous versions of a shared folder. By default, the copies of shared folders are stored in:
A. A Network Attached Storage (NAS) device.
B. A Distributed File System (DFS) share.
C. A failover cluster.
D. A local volume.
Correct Answer: D ( A local volume )
Shadow Copy technology requires the file system to be NTFS to be able to create and store shadow copies. Shadow Copies can be created on local and external
(removable or network) volumes by any Windows component that uses this technology, such as when creating a scheduled Windows Backup or automatic
System Restore point.
By default, group policies are first applied to networked computers when the:
A. Computer is backed up.
B. Computer starts up.
C. User accesses a shared drive.
D. User runs gpresult.exe.
B. Computer starts up.
A domain controller that is designated to perform a set of specialized domain controller tasks is commonly referred to as a/an:
A. Windows Internet Name Service (WINS) server
B. Operations Master
C. Organizational Unit
D. Primary domain controller
Correct Answer: B (Operations Master)
Operations Master Roles -
The five operations master roles are assigned automatically when the first domain controller in a given domain is created.
You manage a company’s Active Directory. You need to delegate the control of a branch office to a set of administrators. Where would you place the users and computers that belong to the branch office?
A. In a distribution group
B. In an Organizational Unit
C. In the root of the domain
D. In the Built-in container
B. In an Organizational Unit
You need to assign permissions to access resources.
Which type of group should you use?
A. Workgroup
B. Security group
C. Organizational group
D. Distribution group
Correct Answer: B (Security group)
Security groups control access to the Workgrup server’s functionality.
You manage a Workgroup. You need to create a group for print administrators. Which type of group should you create?
A. Domain Local group
B. Local group
C. Global group
D. Universal group
Correct Answer: B (Local group)
Many organizations deploy Windows servers and workstations in workgroup configurations and for these organizations, local group policies can play a vital role in simplifying Windows system administration.
Read more at http://tech.sportstoday.us/windows_server/windows-server-2008-r2—planning-workgroup-and-standalone-local-group-policy- configuration.aspx#iV1QJMxpiO0FVQyk.99
DRAG DROP -
In which order are group policies applied?
(To answer, move the appropriate scopes from the list of scopes to the answer area and arrange them from first applied to last applied)
Select and Place:
Group Policy settings are processed in the following order:
1. Local Group Policy object Each computer has exactly one Group Policy object that is stored locally. This processes for both computer and user Group
Policy processing.
2. Site Any GPOs that have been linked to the site that the computer belongs to are processed next. Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for the site in Group Policy Management Console (GPMC). The GPO with the lowest link order is processed last, and therefore has the highest precedence.
3. Domain Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest precedence.
4. Organizational units GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on. Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.
Reference: Order of processing settings
https://technet.microsoft.com/sv-se/library/cc778890%28v=ws.10%29.aspx
You need to create a group that includes users from different domains in a single forest. You also need to enable the group to access resources in any domain in the forest. Which type of group should you create?
A. Workgroup B. Local group C. Universal group D. Global group E. Domain Local group
Correct Answer: C (Universal group)
Universal Group:
* Group can include as members
Accounts from any domain within the forest in which this Universal Group resides
Global groups from any domain within the forest in which this Universal Group resides
Universal groups from any domain within the forest in which this Universal Group resides
* Group can be assigned permissions in
Any domain or forest -
*
You need to access resources located in another forest.
Which should you create?
A. Child domain
B. Distribution group
C. Trust
D. Organizational unit
D. Organizational unit
Users report that they are unable to print. You verify that the print spooler service is running. What should you do next?
A. Purge the service
B. Disable the service
C. Pause the service
D. Restart the service
D. Restart the service
You need to automate the installation of Windows Server 2008 on several servers. What should you use?
A. unattendinstall.exe
B. Microsoft Software Installer (MSI)
C. Windows Installer Service
D. Windows Deployment Services (WDS)
Correct Answer: D (Windows Deployment Services (WDS))
Windows Deployment Services is the updated and redesigned version of Remote Installation Services (RIS). Windows Deployment Services enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.
Plug and Play is a/an:
A. Automatic device configuration system.
B. Automatic system update application.
C. Method used by developers to create applications.
D. Multimedia device.
A. Automatic device configuration system.
Which two components are required to configure a TCP/IP connection? (Choose two)
A. Subnet mask
B. DHCP address
C. Host address
D. Domain name
Correct Answer: AB(Subnet mask, DHCP address)
An IP address and a subnet mask.
Which file storage system can be used on a Windows Server?
A. NFS
B. NTFS
C. EXT3
D. FAT16
B. NTFS
You notice frequent writes to the page file. Which should you monitor to determine the cause?
A. CPU
B. RAM
C. Network
D. Hard disk
Correct Answer: B (RAM)
When the RAM is full the page file is used as virtual RAM.
You want to receive a notification when your server’s processor exceeds 80 percent utilization. You should create a:
A. Performance Alert. B. Scheduled task. C. Performance Log. D. Performance counter. E. System Event.
A. Performance Alert.
You need to monitor the performance of a server.
What should you create first?
A. Baseline
B. Counters
C. Page File
D. Alerts
Correct Answer: A (Baseline)
Later compare the performance to the baseline.
What is the minimum Windows Server version on which Hyper-V can be installed?
A. 2003 32-bit
B. 2003 64-bit
C. 2008 32-bit
D. 2008 64-bit
Correct Answer: D (2008 64-bit)
Hyper-V, formerly known as Windows Server Virtualization, is a native hypervisor that enables platform virtualization on x86-64 systems. A beta version of Hyper-
V was shipped with certain x86-64 editions of Windows Server 2008, and a finalized version (automatically updated through Windows Update) was released on
June 26, 2008.
What is the default port for HTTPS?
A. 21
B. 80
C. 135
D. 443
Correct Answer: D (443)
43, TCP, Hypertext Transfer Protocol over TLS/SSL (HTTPS)