Final test revision Flashcards

1
Q

Running a system in safe mode:
A. protects the system from viruses.
B. protects the system from data loss.
C. loads a minimum number of drivers.
D. prevents unauthorized access.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your backup plan calls for a full backup every Sunday. Every other day of the week, you need to back up only the changes since the last full backup.
Which backup type should you use for Tuesday?
A. Daily
B. Normal
C. Copy
D. Differential

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To protect a server in case of a blackout, you should use a/an:
A. Uninterruptible Power Supply.
B. Dedicated surge protector.
C. Power Supply Unit.
D. Redundant power supply.
E. Hot-swappable power supply.
F. Line conditioner.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tool would you use to retrieve detailed information about a significant occurrence in a computer system?
A. Event Viewer
B. System Information
C. System Monitor
D. Resource Monitor

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which task is executed during the Power-On Self Test (POST)?
A. The amount of system RAM is detected.
B. The Master Boot Record is created.
C. The operating system is initialized.
D. Disk file systems are detected.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You configure Volume Shadow Copy Service (VSS) to save previous versions of a shared folder. By default, the copies of shared folders are stored in:
A. A Network Attached Storage (NAS) device.
B. A Distributed File System (DFS) share.
C. A failover cluster.
D. A local volume.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

By default, group policies are first applied to networked computers when the:
A. Computer is backed up.
B. Computer starts up.
C. User accesses a shared drive.
D. User runs gpresult.exe.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A domain controller that is designated to perform a set of specialized domain controller tasks is commonly referred to as a/an:
A. Windows Internet Name Service (WINS) server
B. Operations Master
C. Organizational Unit
D. Primary domain controller

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You manage a company’s Active Directory. You need to delegate the control of a branch office to a set of administrators. Where would you place the users and computers that belong to the branch office?
A. In a distribution group
B. In an Organizational Unit
C. In the root of the domain
D. In the Built-in container

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to assign permissions to access resources.
Which type of group should you use?
A. Workgroup
B. Security group
C. Organizational group
D. Distribution group

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You manage a Workgroup. You need to create a group for print administrators.
Which type of group should you create?
A. Domain Local group
B. Local group
C. Global group
D. Universal group

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to create a group that includes users from different domains in a single forest. You also need to enable the group to access resources in any domain in the forest.
Which type of group should you create?
A. Workgroup
B. Local group
C. Universal group
D. Global group
E. Domain Local group

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You need to access resources located in another forest.
Which should you create?
A. Child domain
B. Distribution group
C. Trust
D. Organizational unit

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Users report that they are unable to print. You verify that the print spooler service is running. What should you do next?
A. Purge the service
B. Disable the service
C. Pause the service
D. Restart the service

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You need to automate the installation of Windows Server 2008 on several servers.
What should you use?
A. unattendinstall.exe
B. Microsoft Software Installer (MSI)
C. Windows Installer Service
D. Windows Deployment Services (WDS)

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Plug and Play is a/an:
A. Automatic device configuration system.
B. Automatic system update application.
C. Method used by developers to create applications.
D. Multimedia device.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which two components are required to configure a TCP/IP connection? (Choose two)
A. Subnet mask
B. DHCP address
C. Host address
D. Domain name

A

AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which file storage system can be used on a Windows Server?
A. NFS
B. NTFS
C. EXT3
D. FAT16

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You notice frequent writes to the page file.
Which should you monitor to determine the cause?
A. CPU
B. RAM
C. Network
D. Hard disk

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You want to receive a notification when your server’s processor exceeds 80 percent utilization. You should create a:
A. Performance Alert.
B. Scheduled task.
C. Performance Log.
D. Performance counter.
E. System Event.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You need to monitor the performance of a server.
What should you create first?
A. Baseline
B. Counters
C. Page File
D. Alerts

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the minimum Windows Server version on which Hyper-V can be installed?
A. 2003 32-bit
B. 2003 64-bit
C. 2008 32-bit
D. 2008 64-bit

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the default port for HTTPS?
A. 21
B. 80
C. 135
D. 443

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To enable enhanced keyboard and mouse functions for a Hyper-V virtual machine, you need to install:
A. Hyper-V Integration Components.
B. Keyboard and mouse drivers.
C. Microsoft Updates.
D. Hyper-V Server.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You need to make a share hidden. Which symbol should you append to the share name?
A. _
B. !
C. @
D. #
E. $

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which type of license is required to connect remotely to an application?
A. Windows Server External Connector License
B. Remote Desktop Services Client Access License
C. System Center Operations Manager Client Management License
D. Remote Server Application License

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which technology is designed to host calendars, contacts, and e-mail on the server?
A. Microsoft Host Integration Server
B. Microsoft Expression Studio
C. Microsoft SQL Server
D. Microsoft Exchange Server

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which is used to verify that a secure Web site is legitimate?
A. Active Directory
B. Enterprise trust
C. Private key
D. Digital certificate

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

One advantage of application virtualization is:
A. Fewer operating system updates.
B. Improved collaboration.
C. Reduced network traffic.
D. Reduced client administrative overhead.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which type of folder permissions takes precedence?
A. Explicit Deny permissions
B. Explicit Allow permissions
C. Inherited Deny permissions
D. Inherited Allow permissions

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You need to manage your server remotely as if you were seated in front of it.
Which tool should you use?
A. Remote Desktop Client
B. Remote Desktop Session Host
C. Remote Desktop Gateway
D. Remote Server Administration Tools

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is required to create a volume mount point?
A. A dynamic disk
B. RAID 1 implementation
C. An NTFS file system volume or partition
D. Extended volumes

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Distributed File System (DFS) is used to:
A. Delegate permissions to a global distribution group.
B. Implement parity.
C. Group shared folders from different servers.
D. Configure spanned and extended volumes.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which RAID level can consist of two disks and provides redundancy?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An external storage unit that is self-contained and provides shared file-level access is referred to as:
A. Small Computer System Interface (SCSI).
B. Storage Area Network (SAN).
C. Network Attached Storage (NAS).
D. Direct Attached Storage (DAS).

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which RAID level mirrors a set of disks and then stripes across the disks?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

One advantage of a SAN is that it:
A. Can be located either inside or outside the server.
B. Provides USB and Firewire connectivity.
C. Consolidates storage space for servers.
D. Encrypts all files.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Disk mirroring occurs when data is:
A. Duplicated on the same disk.
B. Backed up by using parity.
C. Duplicated on separate disks.
D. Split between disks.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The system partition on a Windows Server must always be installed to a:
A. Dynamic disk.
B. Simple volume.
C. NTFS volume.
D. FAT32 volume.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The purpose of the Information Technology Infrastructure Library is to provide a:
A. Set of standards for networking protocols.
B. Set of best practices for managing IT services.
C. Downloadable library of hardware drivers.
D. Technical library of Windows infrastructure services.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

To change the boot device order of a computer, you should use:
A. Device Manager.
B. Disk Management.
C. BIOS settings.
D. Computer Policy.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which two locations can a Windows Server be backed up to? (Choose two)
A. Network router
B. Local drive
C. Local DFS root share
D. Remote share folder

A

BD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

You need to control which Microsoft Office updates are automatically deployed to client computers. Which tool should you use?
A. Microsoft Office SharePoint Services (MOSS)
B. Windows Server Update Services (WSUS)
C. Windows Update
D. Microsoft Office Update

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which two are Windows Server Cluster types? (Choose two)
A. Shared storage
B. Failover
C. Network Load Balancing (NLB)
D. Shared services

A

BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which is an advantage of 64-bit operating systems over 32-bit operating systems?
A. Larger amounts of accessible RAM
B. More device drivers
C. More compatible applications
D. Cheaper hardware

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A record of specific aspects of system performance over time is referred to as a/an:
A. Threshold
B. Log
C. Event
D. Alert

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which technology is designed to help teams collaborate?
A. Microsoft SharePoint Server
B. Microsoft System Center Operations Manager
C. Microsoft Forefront Identity Manager
D. Microsoft BizTalk Server

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which file extension indicates a Hyper-V virtual disk file?
A. . xml
B. . vhd
C. ,vud
D. . vsd

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

You need to centralize management of network printers. You also need to enable users to choose a printer based on location. What should you do?
A. Create multiple print servers
B. Publish the printers in Active Directory
C. Set up Web printing
D. Create a printer pool

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What must you install in order to host a Web site on a Windows Server?
A. Active Directory Sites and Services
B. Windows Internet Naming Service (WINS)
C. Fully Qualified Domain Name (FQDN)
D. Internet Information Server (IIS)

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which technology uses digital certificates for secure communications over the Internet?
A. Fully Qualified Domain Name (FQDN)
B. Internet Service Manager (ISM)
C. Secure Sockets Layer (SSL)
D. File Transfer Protocol (FTP)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is required for a computer to print to either a local or a network printer?
A. 500 GB of free hard disk space
B. Printer Device Drivers
C. 1 GB of RAM
D. Administration tools

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

You need to limit what a service can access. You should change the service’s:
A. Dependencies
B. Status
C. Startup type
D. Logon options

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Services that are required to enable another service to run are referred to as service:
A. Roots
B. Prerequisites
C. Dependencies
D. Parents
E. Hosts

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which two specifications are included in Microsoft’s hardware requirements for Windows Server? (Choose two)
A. USB ports
B. RAM
C. Processor speed
D. Disk I/O

A

BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

You need to see what effect the applied group policies are having on an individual user or computer.
What should you use?
A. Local Users and Groups
B. Resultant Set of Policy
C. Local Security Policy
D. Effective Permissions

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the default location for a new user account in Active Directory?
A. The Users Organizational Unit
B. The Accounts container
C. The Accounts Organizational Unit
D. The Users container

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which provides centralized management of users and computers?
A. Active Directory
B. Windows Internet Name Service (WINS)
C. Dynamic Host Configuration Protocol (DHCP)
D. Remote Access

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

You need to apply a Windows Server 2008 group policy. You also need to prevent policies that are applied at lower levels from affecting this new policy.
What should you do?
A. Set the policy to Loopback
B. Set the permission to Full Control
C. Select the Enforced policy link setting
D. Select the Enabled policy link setting

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

You create a new domain. Which two Active Directory objects will be available by default? (Choose two)
A. Computer
B. Employee
C. User
D. Device
E. Server

A

AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

By default, which group can create and link Group Policy Objects?
A. Authenticated Users
B. Domain Users
C. Domain Administrators
D. Local Administrators

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which kind of group is only used for e-mail applications?
A. Exchange Admins group
B. Universal group
C. Security group
D. Distribution group

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which tool should you use to track real-time system resource utilization?
A. System Information
B. Component Services
C. Device Manager
D. Perfmon

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which should you use to monitor server performance and resource utilization?
A. Memory
B. Counters
C. Boot logs
D. RAM

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which snap-in is used to create files that contain information about the state of your server’s resources at a given time?
A. Reliability and Performance Monitor
B. Event Viewer
C. Services
D. System Monitor

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Enabling additional users to handle administrative tasks for a particular object is referred to as:
A. Redirection
B. Assignment
C. Targeting
D. Delegation

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Where are domain user accounts managed in Windows Server?
A. Local Users and Groups console
B. Control Panel
C. Active Directory Users and Computers
D. Active Directory Sites and Services

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which task can you accomplish by using Organizational Units?
A. Apply shared folder permissions to users
B. Place different domains in a centralized manageable environment
C. Create a secondary Active Directory
D. Logically represent a hierarchical structure of your company

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Your network includes Windows Server 2003 and Windows Server 2008 domain controllers. You need to ensure that group policy change are applied immediately.
Which tool should you use on the client computer?
A. Groupware
B. Windows update
C. GPUpdate
D. Policy Editor

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

You need to grant a set of users permissions to a specific folder.
Where should you place the user accounts?
A. Domain root
B. Security group
C. Shared folder
D. Organizational Unit

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which should you use to manage the working environments of users and computers in an Active Directory infrastructure?
A. Active Directory Domains and Trusts
B. Group Policy Objects
C. Builtin containers
D. Global security groups

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

You have an Active Directory infrastructure that contains one domain and seven domain controllers. How many forests can you have without creating any trusts?
A. 0
B. 1
C. 7
D. 8

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

To convert a disk from dynamic to basic, you must first:
A. Mirror all disk volumes.
B. Connect the disk to a different controller.
C. Delete all disk volumes.
D. Format all disk volumes in the NTFS file system.

A

C

73
Q

Which RAID level uses parity information to recover data from a failed disk?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

A

C

74
Q

Which disk types can be used for internal storage?
A. SAN/iSCSI
B. NFS/Distributed File System (DFS)
C. PATA/SATA/SCSI
D. NAS/Fiber-channel

A

C

75
Q

You need to ensure that Active Directory can be recovered in case of a server failure. Your backup must include the:
A. Shared drives
B. Page File
C. System State
D. Computer name

A

C

76
Q

You need to find a list of specific events.
What should you do?
A. Export the events to a .doc file.
B. Clear the log by saving it.
C. Filter by creating a custom view.
D. Use the Search menu option.

A

C

77
Q

You need to secure a server that you have been working on without disrupting the work of other employees in your company. What should you do?
A. Log off the server
B. Hibernate the server
C. Restart the server
D. Shut down the server

A

A

78
Q

Which tool enables an administrator to centralize the distribution of Microsoft security updates?
A. Microsoft Security Response Center (MSRC)
B. Windows Server Update Services (WSUS)
C. Windows Update
D. Microsoft Software Assurance
E. Microsoft Update

A

B

79
Q

You turn on a computer.
What happens first?
A. The operating system is loaded.
B. The boot sector is accessed.
C. The BIOS is loaded.
D. The Master Boot Record (MBR) is accessed.

A

C

80
Q

You are using the Services Management Console. Which term is used to describe a service that is running?
A. Started
B. Activated
C. Engaged
D. Working

A

A

81
Q

You need to install storage device drivers for a Windows boot partition. When should you do this?
A. After you have started Windows for the first time
B. Before creation of the RAID array
C. During the post-boot phase
D. During the installation phase

A

D

82
Q

Which two features are advantages of upgrading to Windows Server Enterprise Edition? (Choose two)
A. Support for additional processors
B. Support for additional RAM
C. Support for additional RAID levels
D. Support for additional disk partition:

A

AB

83
Q

You need to manage a Windows Server 2008 server from a Windows client computer by using a Management Console.
What should you install on the client computer?
A. Remote Assistance
B. Remote Server Administration Tools
C. Windows Server Resource Kit
D. Microsoft Office SharePoint Server

A

B

84
Q

You enable Remote Desktop. Which group will be granted access by default?
A. Domain users group
B. Remote access security group
C. Local administrators group
D. Local users group

A

C

85
Q

You are logged in as an administrator. You need to recover company documents created by a person who has left the company. You get an “Access Denied” message when you try to access the folder.
What is the first step you should take to access the documents?
A. Disable inheritance
B. Take ownership
C. Enable sharing
D. Remove the “Read-Only” Attribute
E. Enable offline files

A

B

86
Q

Which technology provides both e-mail and database services?
A. Windows Server Enterprise Edition
B. Microsoft Office Communications Server
C. Windows Small Business Server
D. Microsoft Project Server

A

C

87
Q

Which technology is used to create and manage relational databases?
A. Microsoft Exchange Server
B. Microsoft Commerce Server
C. Microsoft Groove Server
D. Microsoft SQL Server

A

D

88
Q

You need to centralize administration of print servers and network printers.
What should you use?
A. Print Management
B. Printers and Faxes
C. Device Manager
D. Print queue

A

A

89
Q

Which Hyper-V network type shares the host’s physical network adapter?
A. External
B. Public
C. Private
D. Internal

A

A

90
Q

Which two firmware platforms does the Boot Configuration Data store support? (Choose two.)
A. UEFI
B. RAID
C. eSATA
D. BIOS

A

AD

91
Q

Which two services should you use to ensure that your networked computers and servers automatically maintain the latest security patches? (Choose two.)
A. Windows Server Update Service
B. Update command in Programs and Features
C. Microsoft Windows Update
D. Driver Update in Hardware Properties

A

AC

92
Q

What should you use to prevent power spikes from harming a server?
A. Power supply unit
B. Hot-swappable power supply
C. Dedicated surge protector
D. Line conditioner

A

C

93
Q

Power On Self Test (POST) runs when a computer first boots.
Which component software issues this test?
A. Complementary Metal Oxide Semiconductor
B. Northbridge On Board Chip
C. Basic Input/Output System
D. Southbridge On Board Chip

A

C

94
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“Hardware-based RAID” uses system processing resources.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. Windows-based RAID
B. RAID 10
C. RAID 6
D. No change is needed.

A

A

95
Q

What is the minimum number of disks required for RAID 5?
A. 1
B. 2
C. 3
D. 5

A

C

96
Q

The manager at the coffee house where you work asks for advice on adding storage to the store’s server to perform backups.
The additional storage must meet the following requirements:
✑ Hold at least 600 GB
✑ Be reasonably priced
✑ Be reasonably fast
Which solution should you recommend?
A. USB hard drive
B. USB flash drive
C. SCSI tape backup system
D. External SCSI hard drive

A

C

97
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The “Security” log in Event Viewer shows information regarding server reboots.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Application
B. Setup
C. System
D. No change is needed

A

C

98
Q

You often stop by Fourth Coffee before class. The owner knows you are studying computer networking. One morning, the owner asks for your help with a file server because it is running slower than usual.
Which two tools should you use to diagnose the problem with this server? (Choose two.)
A. Task Manager
B. Share & Storage Management
C. Device Manager
D. Perfmon
E. Profiler

A

AD

99
Q

The University Chess Club has a single Windows Server 2008 R2 server. The server has 12 GB of RAM and 1TB of disk space on a RAID 5 array. Using this server, you need to install two separate instances of Windows Server 2008 R2: one to act as a web server and one to act as a database server.
Which Windows Server 2008 R2 role or feature provides this capability?
A. Windows Deployment Services
B. Hyper-V
C. Windows System Resource Manager
D. Windows Internal Database

A

A

100
Q

You are an IT intern for Tailspin Toys.
Your manager attends a conference out of town and wants you to perform routine maintenance directly on a Windows 2008 R2 server console.
Because you have restricted access, you need your manager to enter credentials at a UAC prompt in your session.
What should you do?
A. Have your manager use Server Manager to connect to the server.
B. Have your manager use Remote Administration to connect to the server.
C. Send a Remote Assistance request to your manager.
D. Have your manager use Remote Desktop to connect to the server.

A

C

101
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Settings from the “Local” Group Policy Object are processed last during logon.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Site
B. Organizational Unit
C. Domain
D. No change is needed.

A

B

102
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Active Directory “Distribution groups” can only be assigned permissions to resources within the same domain but can have members from other domains.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Global groups
B. Universal groups
C. Domain local groups
D. No change is needed

A

C

103
Q

This question requires that you evaluate the underlined text to determine if it is correct.
You install a new Windows Server 2008 R2 server for your school athletic department. The installation completes without errors. However, the new server is unable to communicate with the network. After checking cable connections and network configuration, you find that no network connections are listed in the
Control Panel/Network Connections applet.
You should use “Device Manager” to investigate a potential problem with the network adapter driver.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed’’ if the underlined text makes the statement correct
A. Network and Sharing Center
B. Control Panel/Network Connections
C. Server Manager/WMI Control
D. No change is needed

A

D

104
Q

The owner of Fourth Coffee wants to add a new computer to the company network. The owner configures the Host Address for the computer but still cannot connect to the network.
Which component should the owner use to connect to the network?
A. DNS Server
B. DHCP address
C. Subnet mask
D. Domain name

A

C

105
Q

Which type of additional drivers does the Windows 7 installation phase prompt for?
A. Video
B. Network
C. Use
D. Storage

A

D

106
Q

Which two files are executed so that a Windows 2008 R2 server boots into the operating system? (Choose two.)
A. winload.exe
B. ntldr.exe
C. bootmgr.exe
D. boot.ini

A

AC

107
Q

You maintain backup schedules for a Windows Server 2008 R2 server. Some users store vital information on their local hard drives.
You need to perform nightly backups that include this data.
Which built-in process should you use?
A. Agent backup
B. Folder redirection
C. Local backup schedules
D. System state data backup

A

B

108
Q

This question requires that you evaluate the underlined text to determine if it is correct.
You need to troubleshoot network environment problems. First, you define the issues that are most likely causing the symptoms. Then you eliminate each issue until the symptoms disappear.
This approach is referred to as “performance” troubleshooting.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. Systematic
B. Specific
C. Trial and error
D. No change is needed

A

A

109
Q

Disk striping occurs when data is:
A. Duplicated on separate disks
B. Duplicated on the same disk
C. Shared between disks
D. Written across multiple disks

A

D

110
Q

Your relative is the owner of Humongous Insurance, and you provide part time IT support for the company’s Windows desktops and servers. All of its computers are on a private network behind a firewall.
Because you are going away to college, you need a secure method to manage the servers and desktops.
Which two Windows 2008 R2 features should you use? (Choose two.)
A. VPN Server
B. Hyper-V
C. Remote Desktop
D. Active Directory Federation Services
E. FTP Server

A

AC

111
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The default security permission assigned to Everyone when a new share is created is “change”.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.
A. Read
B. Fun control
C. None
D. No change is needed.

A

A

112
Q

You manage the servers for the School of Business at your university. The school has a Hyper-V server that runs three virtual machines (VMs). Each VM runs
Windows Server 2008 R2.
You need to apply the latest Windows server updates to each of the VMs. You need to be able to revert the servers back to their original state before applying the updates.
Which Microsoft Virtualization feature should you use?
A. Live Migration
B. Snapshots
C. VHD Virtual Hard Disks
D. Failover Cluster

A

B

113
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“Microsoft App-V” can make applications available to end user computers without having to install the applications on those computers.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Microsoft Hyper-V
B. DirectAccess
C. Windows Deployment Services
D. No change is needed.

A

D

114
Q

This question requires that you evaluate the underlined text to determine if it is correct.
The minimum permission needed to delete other users’ documents from a print queue is “Print”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Manage Documents
B. Manage Printers
C. Deny
D. No change is needed

A

A

115
Q

You need to install a driver. Where should you get the driver?
A. The Task Manager
B. The device manufacturer
C. The system firmware
D. The Hardware Compatibility List

A

B

116
Q

Users report that they are unable to print. What should you do first?
A. Verify that the Print Spooler Service is running.
B. Pause the Print Spooler service.
C. Restart the Print Spooler service.
D. Disable the Print Spooler Service.

A

C

117
Q

What are three benefits of performing a Server Core installation of Windows Server 2008 R2? (Choose three.)
A. Option to upgrade to a Full Server installation
B. Reduced maintenance
C. Reduced attack vulnerability
D. Enhanced installation GUI
E. Lower disk space requirement

A

BCE

118
Q

This question requires that you evaluate the underlined text to determine if it is correct.
Active Directory user account names are not case sensitive.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct
A. Can be from 1 to 256 characters in length
B. Can contain numbers and letters but no special characters
C. Must be created with a first and last name
D. No change is needed.

A

D

119
Q

Which storage technology supports speeds up to 16 Gbps?
A. Network File System (NFS)
B. Small Computer System Interface (SCSI)
C. Serial Advanced Technology Attachment (SATA)
D. Fibre Channel (FC)

A

D

120
Q

What is the name for a stand-alone digital storage system connected directly to a server or workstation HBA?
A. Small Computer System Interface (SCSI)
B. Direct Attached Storage (DAS)
C. Network Attached Storage (NAS)
D. Storage Area Network (SAN)

A

A

121
Q

You are an IT technician for a company that has an environment consisting entirely of Windows 2008 Server R2 and Windows 7 laptops.
You need to establish a secure method that allows employees to work remotely but still have access to the internal network resources.
What are two possible ways to achieve this goal? (Choose two.)
A. Offline Files
B. DirectAccess
C. Network Access Protection (NAP)
D. Virtual Private Network (VPN)
E. DFS Namespace

A

BD

122
Q

What is one advantage of application virtualization?
A. Fewer operating system updates
B. Improved collaboration
C. Reduced network traffic
D. Hardware consolidation

A

B

123
Q

Settings from which group policy object are processed first during logon?
A. Domain
B. Organizational Unit
C. Local
D. Site

A

C

124
Q

What are two functions of the Group Policy loopback feature? (Choose two.)
A. Apply Group Policy Objects for only the current site.
B. Apply Group Policy Objects that depend only on the computer the user logs on to.
C. Apply only the local computer Group Policy Object.
D. Give higher precedence to computer policy over user policy.

A

BD

125
Q

A system error window keeps displaying.
Where do you find detailed information about that error?
A. Event Viewer
B. Resource Monitor
C. Task Manager
D. Device Manager

A

A

126
Q

This question requires that you evaluate the underlined text to determine if it is correct.
“Windows Deployment Services (WDS)” allows you to automate the installation of Windows Server 2008 on several servers.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is needed” if the underlined text makes the statement correct.
A. Microsoft Software Installer (MSI)
B. Unattendinstall.exe
C. Windows Installer Service
D. No change is needed

A

D

127
Q

You need to restart the print spooler on a Windows Server 2008 R2 server. Which tool should you use?
A. Devices and Printers
B. The Device Manager
C. Printer Properties
D. The Services console

A

D

128
Q

A small law firm hires you to set up its first file server. You decide to install Windows Server 2008 R2 on a custom-built computer purchased from a local computer supplier. Early in the process, the installation prompts for storage drivers.
What are two possible ways to provide the drivers to the installation process? (Choose two.)
A. Download the drivers, save them to the original installation DVD disk, and restart the installation process.
B. Point the installation to a URL on the manufacturer’s website.
C. Place them in the root directory of a USB flash drive and insert the flash drive into a USB port.
D. Burn them to a blank CD and insert it in place of the installation disk.

A

BD

129
Q

A disaster recovery plan should contain data, hardware, and software that are critical for a business. Which of the following are disaster recovery planning steps?
Each correct answer represents a complete solution. Choose all that apply.
A. Prioritize business processes
B. Monitor the plan
C. Identify alternate sites
D. Identify and assess the risks

A

ACD

130
Q

After the promotion of a computer to a domain controller, a user can use various MMC snap-in consoles to manage Active Directory. Which of these consoles is used for administering and publishing information in the directory, which includes managing users, groups, computers, domains, domain controllers, and organizational units?
A. Active Directory Users and Computers
B. Active Directory Sites and Services
C. Active Directory Domains and Trusts
D. Active Directory Administrative Center

A

D

131
Q

Which of the following statements are true about Resmon? Each correct answer represents a complete solution. Choose all that apply.
A. It is used for parental control and filtering, and controls which Web sites can be visited and which programs can have Internet access.
B. It is a system monitoring tool.
C. It enables users to view and monitor complete resource information about their computer.
D. It is a lightweight utility for local host monitoring that is queried by tools like nagios over http.

A

BCD

132
Q

Which of the following statements best describe the functions of RD Connection Broker in network infrastructure? Each correct answer represents a complete solution. Choose two.
A. It is used to permit a user to reconnect to his existing session in a load-balanced RD Session Host server farm.
B. It is used to integrate with Hyper-V to provide virtual machines by using RemoteApp and Desktop Connection.
C. It is used to redirect users to a shared virtual machine pool where a virtual machine is dynamically assigned.
D. It is used to enable a user to evenly distribute the session load among RD Session Host servers in a load-balanced RD Session Host server farm.

A

AD

133
Q

You are working on a Windows 2008 environment. You find that some applications are not responding while creating a project. You want to terminate these applications anyhow and start a new session. What will you do to accomplish the task?
A. Use Device Manager.
B. Use Network Monitor.
C. Use System Monitor.
D. Use Task Manager.

A

D

134
Q

You work as a System Administrator for company Inc. The company has a Windows 2008 domain-based network. The network has 120 Windows 7 computers and two Windows Server 2008 R2 servers. You want to ensure that when users log on to any client computer on the network, settings can be changed, but all settings are reset back to their default values when they log on again. What will you do to accomplish the task?
A. Create a Group Policy Object.
B. Create a local user profile.
C. Create a roaming user profile.
D. Create a mandatory user profile.

A

D

135
Q

Which of the following are the levels of printer permissions provided by Windows Server 2008? Each correct answer represents a complete solution. Choose all that apply.
A. Manage documents
B. Print
C. Reload the printer
D. Manage this printer

A

ABD

136
Q

You work as a System Administrator for company Inc. The company has a Windows 2008 based network environment. There are twenty client computers running
Windows 7 and three servers running Windows server 2008 R2. You want to increase the data availability for these servers without rebuilding them and without investing a large amount of money for purchasing array controllers. What will you do? Each correct answer represents a part of the solution. Choose all that apply.
A. Add another physical drive to each server.
B. Convert the drives from basic disks to dynamic disks.
C. Implement the RAID 1 solution between the two drives.
D. Ensure that the backups are running smoothly.

A

ABC

137
Q

Which of the following servers is used to store and forward e-mail messages using several protocols, including SMTP, POP3, and IMAP?
A. File server
B. Monitoring server
C. Database server
D. Mail server

A

D

138
Q

You work as a Network Administrator for company Inc. The network of the company contains Windows Server 2008 R2 server and Windows 7 client computers.
You have been assigned the task to connect printers to the server. Which of the following ports (on the server) will you use to accomplish the task?
A. VGA port
B. DVI-I port
C. Parallel port
D. PS/2 port

A

C

139
Q

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a
Windows Active Directory-based single forest network. You are configuring a new computer. You want to configure the computer’s hard disk as a dynamic disk.
Which of the following command-line tools will you use to convert a hard disk from basic to dynamic?
A. NTDSUTIL
B. DISKPART
C. FDISK
D. FSUTIL

A

B

140
Q

You work as a System Administrator for company Inc. The company has a Windows Server 2008 domain-based network. The network contains one Windows
Server 2008 R2 and twelve Windows 7 client computers. You want to centralize management and configuration of operating systems, applications, and user settings. What will you do?
A. Apply NTFS permission.
B. Implement an account policy.
C. Apply an audit policy.
D. Implement a group policy.

A

D

141
Q

Which of the following tools will you use to create image files of an existing system for duplicating or backup purposes?
A. Windows System Image Manager
B. ImageX
C. BCDEdit
D. Setup Manager

A

B

142
Q

You work as a Server Administrator for company Inc. The company has its main branch in London and two sub-branches in Tokyo and Paris. The company has
1,500 clients and a number of servers that run Windows Server 2008 R2. You need to distribute workload across the cluster nodes for supporting a larger number of simultaneous clients. What will you do to accomplish the task?
A. Deploy Windows AIK.
B. Use Network Load Balancing.
C. Implement NIC teaming.
D. Create a failover cluster.

A

B

143
Q

Adam works as a Software Tester for SecureEnet Inc. He is required to test the software on different operating systems. Adam installs Windows 7 on his laptop, which enables him to create, mount, and boot from VHD files. Which of the following statements are true about Virtual Hard Disk (VHD)? Each correct answer represents a complete solution. Choose all that apply.
A. VHD can be used to install a wide variety of operating systems.
B. VHD allows multiple operating systems to reside on a single host machine
C. VHDs are implemented as files that reside on the native host file system.
D. VHD is a file formatted to be structurally different to a physical Hard Disk Drive.

A

ABC

144
Q

You work as a Network Administrator for Perfect Solutions Inc. The company plans to establish a Windows 2008 Active Directory-based network. The network will be configured as a single forest and a multiple-domain network. You are planning for the placement of operations master roles. In this context, which of the following operations master roles are applied to the entire forest? Each correct answer represents a complete solution. Choose all that apply.
A. Domain naming master
B. Schema master
C. PDC emulator master
D. Relative ID (RID) master

A

AB

145
Q

You work as a Server Administrator for company Inc. The company has a Windows Server 2008 R2 network environment. The network is configured as a
Windows Active Directory-based single forest single domain network. A single domain controller is configured on the network. Some employees reported that they failed to log on to the domain controller. You want to know IP addresses and other details of the accounts of the employees. Which of the following utilities will you use to accomplish the task?
A. Server Manager
B. Resource Monitor
C. Event Viewer
D. Performance Monitor

A

C

146
Q

Which of the following statements are true about a device driver? Each correct answer represents a complete solution. Choose all that apply.
A. Device drivers are software-dependent and do not depend on operating systems.
B. It allows higher-level computer programs to interact with a hardware device.
C. It is a program or software that controls a particular device.
D. It works as a translator between the device and the operating system and programs that use the device.

A

BCD

147
Q

You work as a Server Administrator for company Inc. The company has deployed Windows Server 2008 R2 for the deployment of workstations and servers. You need to service Windows images offline before the deployment. Which of the following tools will you use to accomplish the task?
A. BootSect
B. DISM
C. BCDEdit
D. BCDBoot

A

B

148
Q

You work as a System Administrator for company Inc. The company has a Windows 2008 based network environment. There are twenty client computers running
Windows 7 and three servers running Windows Server 2008 R2. You have to ensure that customer service representatives can access the client’s information whenever they need. For this, you want to configure a RAID 5 solution in Network Attached Storage (NAS). How many minimum hard drives can you use?
A. 5
B. 6
C. 4
D. 3

A

D

149
Q

Web developers request FTP access to the Web server so that they can upload and download updated contents. Which of the following ports does FTP use for communication? Each correct answer represents a complete solution. Choose two.
A. 20
B. 80
C. 23
D. 21

A

AD

150
Q

Which of the following types of volumes supported by dynamic disk uses a minimum of three disks for creating a fault-tolerant drive among the drives?
A. RAID-5 volume
B. Mirrored volume
C. Striped volume
D. Spanned volume

A

A

151
Q

Which of the following statements are NOT true about the Volume Boot Sector, commonly known as Master Boot Record? Each correct answer represents a complete solution. Choose all that apply.
A. The actual program can be 512 bytes long.
B. Four 16-byte master partition records are present in MBR.
C. The end of MBR marker is h55CC.
D. The volume boot sector is present in cylinder 0, head 0, and sector 1 of the default boot drive.

A

AC

152
Q

Which of the following key combinations opens the Task Manager window?
A. Ctrl + Shift + Esc
B. Ctrl + Alt + Esc
C. Ctrl + Alt + Del
D. Ctrl + Shift + Alt

A

A

153
Q

Which of the following tasks can you perform without requiring administrative permissions or rights when you log in as a standard user in Windows Server 2008
R2? Each correct answer represents a complete solution. Choose three.
A. Change Windows settings.
B. Connect Bluetooth devices to the computer.
C. Install updates from Windows Update.
D. Reset the network adapter and perform network diagnostic and repair tasks.

A

BCD

154
Q

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true? Each correct answer represents a complete solution.
Choose two.
A. The server always authenticates the client.
B. The client can optionally authenticate the server.
C. The server can optionally authenticate the client.
D. The client always authenticates the server.

A

CD

155
Q

Disaster recovery is the process of resuming normal business operations as quickly as possible after the disaster is over. What does the disaster recovery process include? Each correct answer represents a complete solution. Choose all that apply.
A. Testing all hardware and software before resuming operations
B. Restoring data
C. Encrypting data
D. Executing a written disaster recovery plan
E. Replacing any damaged hardware

A

ABDE

156
Q

You work as a Server Administrator for company Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008 R2. Which of the following MMC snap-in consoles is used to administer and publish information in the directory and to manage users, groups, computers, domains, domain controllers, and organizational units?
A. Active Directory Administrative Center
B. Active Directory Users and Computers
C. Active Directory Sites and Services
D. Active Directory Domains and Trusts

A

A

157
Q

You work as a Network Administrator for NetTech Inc. A server in the network is unable to load the network operating system. You find that a POST error has occurred. You want to use a POST diagnostic hardware adapter to diagnose the error. How will you use it?
A. Insert the card into an open bus slot. Boot the computer. The error codes will display on the adapter.
B. Connect the card to a serial port. Boot the computer. The error codes will be stored in a memory buffer created by the card.
C. Insert the card into an open bus slot. Boot the computer. The error codes will print.
D. Insert the card into an open bus slot. Boot the computer using the floppy disk provided by the card manufacturer. The error codes will be stored on a floppy

A

A

158
Q

You are troubleshooting a system working on Windows Server 2008 R2. You need to create the ntbtlog.txt file in order to list all the drivers that are installed during startup. Which of the following booting options will you choose to accomplish the task?
A. Safe Mode
B. Repair Your Computer
C. Directory Services Restore Mode
D. Enable Boot Logging

A

D

159
Q

Which of the following will you use to diagnose and recover from serious errors that may prevent Windows Server 2008 R2 operating systems from booting successfully?
A. Windows RE
B. Windows DS
C. Windows AIK
D. Windows SIM

A

A

160
Q

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2008 domain-based network. Mark has recently installed Windows Server
2008 R2 on a computer. He wants to implement Distributed File system on the network using Windows Server 2008 R2. What are the changes to DFS Replication available in Windows Server 2008 Release 2? Each correct answer represents a complete solution. Choose three.
A. Read-only SYSVOL folders on Read-only Domain Controllers (RODCs)
B. Performance counters
C. Failover cluster support
D. Read-only replicated folder

A

ACD

161
Q

Which of the following refers to a digital storage system directly attached to a server or workstation, without a storage network in between?
A. DAS
B. SAS
C. NAS
D. SAN

A

A

162
Q

You work as a Server Administrator for company Inc. The company has a virtual server hosted on a Windows Server 2008 server with the Hyper-V role installed.
You have upgraded an application on the virtual server. You experience that this upgrade causes problems. Now, you want to quickly revert back to the point before the changes are made. Which of the following will you use to accomplish the task?
A. Virtual Server Migration Toolkit
B. Snapshots
C. Windows System Resource Manager
D. Logical unit number

A

A

163
Q

Which of the following is described in the following statement:
“It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume Boot Sector, if the boot drive is un-partitioned. “
A. POST
B. BIOS
C. SBR
D. MBR

A

D

164
Q

David and Vivian work as Network Administrators for company Inc. David installs a printer on his Windows 7 Ultimate computer. The printer will be shared on the network and will be used only by the members of the Developers local group.
David wants to accomplish the following goals:
1. Prevent all other members, except those of the Developers local group, from using the printer.
2. Members of the Developers local group will only manage print jobs sent by them.
3. Only he and Vivian will manage the printer and all print jobs.
David takes the following steps:
✑ Grant the Allow-Print permission to the Developers local group.

✑ Grant the Allow-Manage Documents and Allow-Manage Printers permissions to Vivian’s and his user accounts.

Which of the above stated goals will David accomplish?
A. Only the second goal will be accomplished.
B. Only the third goal will be accomplished.
C. Only the first and third goals will be accomplished.
D. Only the second and third goals will be accomplished.
E. All the three goals will be accomplished.
F. Only the first goal will be accomplished.
G. Only the first and second goals will be accomplished.

A

D

165
Q

Which of the following statements best describe the features of a fixed-size VHD? Each correct answer represents a complete solution. Choose two.
A. It offers better performance by eliminating the fragmentation associated with the growing file.
B. It has a set amount of hard disk space and that amount does not change.
C. It uses the space that is being used currently by the VHD.
D. It provides a way to set up the VHD if hard drive space is limited on the server.

A

AB

166
Q

You work as a Server Administrator for company Inc. The company has a Windows-based network environment. You need to make a balance between accessibility, security, and cost while planning for backup. Which of the following management methods will allow you to switch to the backup site while repairing the primary site?
A. Near-line
B. Backup site
C. Off-line
D. On-line

A

B

167
Q

You have installed and configured the Application Server role on a server running Windows Server 2008 R2. For which of the following options can you add support on this server? Each correct answer represents a complete solution. Choose all that apply.
A. Web Server
B. COM+ Network Access
C. Windows Process Activation Service
D. DFS Management
E. File Server Resource Manager
F. TCP Port Sharing

A

ABCF

168
Q

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains 3 Windows
Server 2008 R2 and 100 Windows 7 client computers. Mark wants to add a device driver to the booted Windows PE image. Which of the following tools will he use to accomplish the task?
A. Drvload
B. PEimg
C. LDIFDE
D. VSMT

A

A

169
Q

Which of the following RAID levels provides best performance because data read and data write operations are not limited to a single disk, but to a set of disks?
A. RAID-1
B. RAID-10
C. RAID-0
D. RAID-3

A

C

170
Q

You work as a Server Administrator for company Inc. The company has a Windows 2008 based network environment. There is a domain controller with Windows
Server 2008 R2 installed on it. You want to install the Hyper-V role for production server consolidation and business continuity management. Which of the following are the prerequisites for installing the Hyper-V role? Each correct answer represents a complete solution. Choose all that apply.
A. x32-based processor
B. GUI accelerator
C. Hardware-assisted virtualization
D. Hardware-enforced Data Execution Prevention
E. x64-based processor

A

CDE

171
Q

You want to compare the performance reports that you have created during the initial deployment of servers. Which of the following applications will you need to launch in order to create a comparison report?
A. Task manager
B. Performance Monitor
C. Resource Monitor
D. Server Manager

A

B

172
Q

Which of the following is a blank optical disk where you can save only once, even while the whole space available is not used?
A. CD-MO
B. CD-ROM
C. CD-R
D. CD-RW

A

C

173
Q

You work as a system administrator for a medium-sized company. You receive a call in the middle of the night that people cannot access their mails. Your mail servers name is mymail01. You log into the VMware service console to see the status of the server and you see a little exclamation point over the virtual machines name. You click edit settings and click on the hard disk to find out that your mail server is running off of mymail01-000001.vmdk. What is the most likely conclusion of why your server went down and is not powering on?
A. Your mail server’s .vmdk file that stores system files has been deleted.
B. Your mail server was being updated and received a bad patch.
C. Your mail server did not properly release the snapshot and became unstable.
D. Your mail server was in the middle of a backup and the snapshot used up the rest of the storage space on the LUN.

A

D

174
Q

You install a sound driver on a system running Windows Server 2008 R2. After finishing installation, you find that the sound driver is not working. Which of the following will you check to verify whether the driver is properly installed or not?
A. Control panel
B. Server Manager console
C. Computer Management console
D. Device Manager

A

D

175
Q

Which of the following statements are true about a boot sector? Each correct answer represents a complete solution. Choose all that apply.
A. It allows the boot process of a computer to load a program stored on the same storage device.
B. It is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into RAM by a computer system’s built-in firmware.
C. The location and size of the boot sector is specified by the design of the computing platform.
D. If multiple operating systems exist on a computer, it provides the choice of selecting an operating system.

A

ABC

176
Q

Which of the following hardware devices will you connect to the server in order to resist power outages or power fluctuations?
A. Hard disk
B. UPS
C. VHD
D. RAM

A

B

177
Q

You are working on Windows Server 2008. You want to specify the default entry that the boot manager selects when the timeout expires. Which of the following commands will you use to accomplish the task?
A. /bootsequence
B. /default
C. /copy
D. /displayorder

A

B

178
Q

Adam works as a Desktop Support Technician for Umbrella Inc. The company has a Windows-based network. All client computers run Windows 7 Ultimate operating system. Andy, Managing Director of the company, complains that his laptop is consuming battery very rapidly affecting the performance of the system.
Adam inspects his laptop and finds that appropriate power is implemented on the laptop but many USB devices are attached to it. Which of the following steps will
Adam take to resolve the problem?
A. Enable the USB selective suspend option from the Advanced Power Settings.
B. Connect all USB devices in one USB hub and then connect it to the laptop.
C. Ask Andy to disconnect all USB devices.
D. Remove the USB response from the Registry Editor.

A

A

179
Q

Which of the following master roles is used for synchronizing cross-domain group membership changes?
A. Domain Naming Master role
B. Infrastructure Master role
C. Schema Master role
D. RID Master role

A

B

180
Q

You work as a System Administrator for company Inc. The company has a Windows 2008 based network environment. You have added all users to a different built-in group with specific rights and permissions. Which of the following built-in groups includes users who can create, delete, and modify user accounts and groups?
A. Domain Users
B. Authenticated Users
C. Account Operators
D. Backup Operators

A

C

181
Q

You work as a Server Administrator for company Inc. The company has a Windows 2008-based Active Directory network. You are assigning NTFS permissions to the E:\Projects folder for the Marketing group. You want to ensure that the members of the Marketing group can list the contents of the folder and read the data of files contained in the folder, but none of them can change or delete data from the folder. Which of the following permissions will you apply?
A. Write
B. Full control
C. Read
D. Modify

A

C