dbm
Quiz por , criado more than 1 year ago

Practice for Final.

182
0
0
dbm
Criado por dbm mais de 8 anos atrás
Fechar

Admin Final

Questão 1 de 170

1

Why would you use multicasting for WDS?

Selecione uma das seguintes:

  • It requires less space on the client system

  • It decreases deployment time

  • It supports IPv6 and DHCPv6

  • It minimizes network traffic

Explicação

Questão 2 de 170

1

What two things should you check if a particular client is having problems downloading and installing software?

Selecione uma das seguintes:

  • local policy and the update schedule

  • group policy and the update schedule

  • local policy and the Windows Update log

  • group policy and the Windows Update log

Explicação

Questão 3 de 170

1

What single performance indicator can tell you if your CPU is over capacity and needs to be replaced?

Selecione uma das seguintes:

  • Disk Queue Length

  • Paging File % Usage

  • Physical Disk Time

  • Processor Time

Explicação

Questão 4 de 170

1

What is the primary difference between domain-based namespace and stand-alone namespace?

Selecione uma das seguintes:

  • Where the namespaces are stored

  • The names given to namespaces

  • The number of servers participating in the namespace

  • The requirement for at least one Windows Server 2008 system

Explicação

Questão 5 de 170

1

By default, where are storage reports saved?

Selecione uma das seguintes:

  • C:\StorageReports\Scheduled

  • C:\StorageReports\Saved

  • C:\StorageReports\Queued

  • C:\StorageReports\Quotas

Explicação

Questão 6 de 170

1

If you’re a command-line user, what command will encrypt files and folders?

Selecione uma das seguintes:

  • encrypt.exe

  • compress.exe

  • cipher.exe

  • efs.exe

Explicação

Questão 7 de 170

1

Which utility do you use to access advanced audit policy settings?

Selecione uma das seguintes:

  • Local Policy Editor

  • Group Policy Editor

  • Domain Policy Editor

  • Schema Policy Editor

Explicação

Questão 8 de 170

1

What is the major reason behind using a forwarder?

Selecione uma das seguintes:

  • To decrease client DNS lookups outside your network

  • To improve the efficiency of name resolution for your computers

  • So that your servers only perform recursive queries

  • To justify the use of multiple DNS server layers

Explicação

Questão 9 de 170

1

Before creating PTR records, what DNS objects should you create?

Selecione uma das seguintes:

  • reverse lookup zones

  • CNAME records

  • SOA records

  • NS records

Explicação

Questão 10 de 170

1

Which Windows Server 2012 R2 server role is useful to install the Web Application proxy for AD FS?

Selecione uma das seguintes:

  • AD FS

  • Remote Access

  • Remote Desktop

  • Web Services

Explicação

Questão 11 de 170

1

What does the netsh namespace show policy command do?

Selecione uma das seguintes:

  • Shows the DNS search order

  • Displays the static routing table for a namespace

  • Shows the NRPT rules are configured on the policy

  • Displays local direct access security policy

Explicação

Questão 12 de 170

1

What process determines what a user is permitted to do on a computer or on a network?

Selecione uma das seguintes:

  • access

  • authorization

  • authentication

  • permission

Explicação

Questão 13 de 170

1

Identify the correct NPS templates. Select all that apply.

Selecione uma ou mais das seguintes:

  • Shared Secrets

  • NPS Filters

  • Health Policies

  • RADIUS Clients

Explicação

Questão 14 de 170

1

Which computers are not affected by VPN enforcement?

Selecione uma das seguintes:

  • Newly deployed computers

  • Computers that access the LAN remotely

  • Isolated computers

  • Locally connected computers

Explicação

Questão 15 de 170

1

Identify another utility that you can use to add SPNs to an account.

Selecione uma das seguintes:

  • setspn

  • spnedit

  • dnscmd

  • netsh

Explicação

Questão 16 de 170

1

The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.

Selecione uma ou mais das seguintes:

  • logon

  • object searches

  • universal group memberships

  • schema integrity

Explicação

Questão 17 de 170

1

Which of the following ntdsutil commands cleans up metadata?

Selecione uma das seguintes:

  • metadata defrag

  • metadata cleanup

  • metadata restore

  • metadata repair

Explicação

Questão 18 de 170

1

Which of the following ntdsutil commands cleans up metadata?

Selecione uma das seguintes:

  • metadata defrag

  • metadata cleanup

  • metadata restore

  • metadata repair

Explicação

Questão 19 de 170

1

What is the secpol.msc utility used for?

Selecione uma das seguintes:

  • editing group policies

  • editing local security policies

  • editing global security policies

  • editing domain-level policies

Explicação

Questão 20 de 170

1

If a site, domain or OU has multiple GPOs, how are the group policies processed?

Selecione uma das seguintes:

  • by precedence

  • by importance

  • by administrative control

  • by GPO controller policy

Explicação

Questão 21 de 170

1

What are MST files used for?

Selecione uma das seguintes:

  • They deploy customized software installation files

  • They are template files for software packages

  • They are custom patch files

  • They specialize in software installation test files

Explicação

Questão 22 de 170

1

GPP can be configured on domain controllers running which version of Windows Server? Select all that apply.

Selecione uma ou mais das seguintes:

  • 2003

  • 2008

  • 2008 R2

  • 2012

Explicação

Questão 23 de 170

1

What is a collection of files store in the SYSVOL (%SystemRood%\SYSVOL\<Domain>\Policies\<GPOCUID>) of each domain controller?

Selecione uma das seguintes:

  • Group Policy Container (GPC)

  • Group Policy Template (GPT)

  • migration table

  • delegation

Explicação

Questão 24 de 170

1

Selecione da lista do Menu para completar o texto.

To give someone permission to manage a particular GPO, you use the ( Delegate, Permissions, Security, Settings ) tab of the individual GPO.

Explicação

Questão 25 de 170

1

Which domain users are automatically granted permissions to perform Group Policy Management tasks?

Selecione uma das seguintes:

  • local administrators

  • power users

  • domain administrators

  • domain users

Explicação

Questão 26 de 170

1

Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files?

Selecione uma das seguintes:

  • .ini

  • files

  • folders

  • environment

Explicação

Questão 27 de 170

1

Which items can you configure shortcuts to in performing GPP deployments? Select all that apply.

Selecione uma ou mais das seguintes:

  • Windows Firewall applet

  • Documents folder

  • Microsoft Excel

  • Printer

Explicação

Questão 28 de 170

1

Which utility do you use to create GPO preferences?

Selecione uma das seguintes:

  • Group Policy Management Editor

  • Group Policy Preference Editor

  • Group Policy Editor

  • Group Policy Wizard

Explicação

Questão 29 de 170

1

Which component allows you to create multiple Registry preference items based on registry settings that you select?

Selecione uma das seguintes:

  • the Registry Scope

  • the Registry Extension

  • the Registry Configurator

  • the Registry Wizard

Explicação

Questão 30 de 170

1

When working with Network Drive Mapping Preferences, which preference behaviours delete drive mappings? Select all that apply.

Selecione uma ou mais das seguintes:

  • Create

  • Replace

  • Update

  • Delete

Explicação

Questão 31 de 170

1

To copy, replace, update, or delete files, you can use wildcard characters. Which wildcard characters can you use? Select all that apply.

Selecione uma ou mais das seguintes:

  • ?

  • X

  • $

  • *

Explicação

Questão 32 de 170

1

Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply.

Selecione uma ou mais das seguintes:

  • If they've become corrupted

  • If someone deleted one of the policies

  • To refresh policy settings

  • As a regular part of domain maintenance and housekeeping

Explicação

Questão 33 de 170

1

If you don't want a GPO to apply, which group policy permission do you apply to a user or group?

Selecione uma das seguintes:

  • Disallow Apply

  • Disallow Read

  • Disallow Write

  • Disallow Modify

Explicação

Questão 34 de 170

1

Which of the following is the most efficient method of using WDS on a very large network?

Selecione uma das seguintes:

  • Unattended installation using bootable media

  • Bootable media using discover images

  • Unattended installation using PXE boot

  • Installation using PXE boot

Explicação

Questão 35 de 170

1

What two things should you check if a particular client is having problems downloading and installing updates?

Selecione uma das seguintes:

  • Local policy and update schedule

  • Group policy and update schedule

  • Local policy and the windows update log

  • Group policy and the windows update log

Explicação

Questão 36 de 170

1

The event viewer is essentially what kind of tool?

Selecione uma das seguintes:

  • Registry cleanup

  • Conflict resolver

  • Log viewer

  • Performance monitor

Explicação

Questão 37 de 170

1

When should you increase the default quota size for the staging folder?

Selecione uma das seguintes:

  • When the staging folder approaches 90% capacity

  • When bandwidth is available

  • When you have multiple large files that change frequently

  • When replication queues back up for more than two hours

Explicação

Questão 38 de 170

1

What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files?

Selecione uma das seguintes:

  • Storage reports

  • Storage Exceptions

  • Storage Quotas

  • Storage Assessment

Explicação

Questão 39 de 170

1

Public-key cryptography uses how many keys?

Selecione uma das seguintes:

  • Two

  • One

  • Two-pair

  • 256

Explicação

Questão 40 de 170

1

Why are success audits as important as failure audits?

Selecione uma das seguintes:

  • Successes are important to troubleshooting for establishing baselines of normal behaviour

  • Successes are included by default and can be filtered out

  • Successes can point to security breaches as well as normal behaviour

  • Successes allows you to track activity such as a new account creation

Explicação

Questão 41 de 170

1

Why would you implement a caching-only DNS server on your network?

Selecione uma das seguintes:

  • To speed DNS queries and decrease networking traffic

  • To avoid installing and configuring a full-blown DNS server

  • To reduce the amount of maintenance for administrators

  • To reduce complexity in a network environment

Explicação

Questão 42 de 170

1

If you issue the command nslookup 192.168.1.50 and got no response, but then issue nslookup server1 and receive 192.168.1.50 ?

Selecione uma das seguintes:

  • The CNAME record is incorrect

  • The PTR record doesn’t exist

  • The A record doesn’t exits

  • The SOA for the zone is malformed

Explicação

Questão 43 de 170

1

What is the first thing to check when troubleshooting VPN problems?

Selecione uma das seguintes:

  • Network connectivity

  • Usernames and passwords

  • DNS lookups

  • Firewall settings

Explicação

Questão 44 de 170

1

Which one of the Remote Access Management interfaces gives you the most control?

Selecione uma das seguintes:

  • The Run the Remote Access Setup Wizard

  • The Run the Getting Started Wizard

  • The Remote Access Management Console

  • The command line dnsmcd.exe command

Explicação

Questão 45 de 170

1

What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?

Selecione uma das seguintes:

  • A RADIUS proxy server

  • A RADIUS engine server

  • A ARDIUS client server

  • A RADIUS relay server

Explicação

Questão 46 de 170

1

RADIUS Access-Request message are processed and forwarded by NPS only if the settings of the incoming message match what on the NPS server?

Selecione uma das seguintes:

  • One of the connection request policies

  • The time zone of the requestor

  • The client type of the requestor

  • The TCP/IP port of the requestor

Explicação

Questão 47 de 170

1

Health policies are connected to what two policies?

Selecione uma ou mais das seguintes:

  • Compliance policies

  • Network policies

  • Connection request policies

  • Performance policies

Explicação

Questão 48 de 170

1

What type of account is an account under which operating system, process, and service runs?

Selecione uma das seguintes:

  • User

  • System

  • Service

  • Network

Explicação

Questão 49 de 170

1

What two things must you do to a Windows Server to convert it to a domain controller?

Selecione uma ou mais das seguintes:

  • Install AD DS

  • Execute dcpromo from Server Manager

  • Install Server Manager

  • Install DNS

  • Install Server Manager Tools

Explicação

Questão 50 de 170

1

Why can you not modify snapshots?

Selecione uma das seguintes:

  • They are read-only

  • They are encrypted

  • They are compressed and zipped

  • They are binary files

Explicação

Questão 51 de 170

1

By default, who has read/write capability to the Default Domain Policy?

Selecione uma das seguintes:

  • Local administrators

  • Power users

  • Domain users

  • Domain administrators

Explicação

Questão 52 de 170

1

GPO are processed on computer start up and after logon. Why is the user never aware of the processing?

Selecione uma das seguintes:

  • Processing is hidden from the users

  • The user is too busy to be aware of to the processing

  • The processing occurs when the system is not being used

  • The user is aware of the only startup delays

Explicação

Questão 53 de 170

1

What is the central Store?

Selecione uma das seguintes:

  • An App store from which you can deploy GPO

  • A public share that allows users to place GPO request into a queue

  • A repository for Administrative Templates

  • An online App Store for Administrative Templates

Explicação

Questão 54 de 170

1

Where do you place a discover image to ensure proper deployment?

Selecione uma das seguintes:

  • In the PXE configuration parameters

  • In memory

  • On a network share

  • On bootable media

Explicação

Questão 55 de 170

1

What two ways can you assign computers to groups in WSUS?

Selecione uma das seguintes:

  • Client-side and Server-side targeting

  • Upstream and Downstream targeting

  • Client-side and Upstream targeting

  • Downstream and Distributed targeting

Explicação

Questão 56 de 170

1

You have a centralized file server and a remote file server. You want to configure DFS replication between the two servers so that you can perform backups with the centralized file server. You started to perform DFS replication but determine that it will take weeks for the initial replication to occur. How can you speed up the initial replication?

Selecione uma das seguintes:

  • Configure the replication to use full speed

  • Assign two NICs to the site server

  • Ship a disk with the files, preseed the files, clone the database from the remote file server, and import the database into the centralized file server

  • Copy the files manually from the site server to the centralized file server

Explicação

Questão 57 de 170

1

Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of many audit subsettings?

Selecione uma das seguintes:

  • 23

  • 53

  • 56

  • 64

Explicação

Questão 58 de 170

1

Which one of the following is an example of an FQDN?

Selecione uma das seguintes:

  • SERVER1

  • 192.168.50.1

  • sales.microsoft.com

  • C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS

Explicação

Questão 59 de 170

1

A Start of Authority record specifies what kind of information about a zone?

Selecione uma das seguintes:

  • A list of hosts or A names

  • A list of canonical (CNAME) records

  • The zone serial number

  • A reverse lookup record

Explicação

Questão 60 de 170

1

Why are phone lines and ISDN not used today for remote access services (RAS)?

Selecione uma das seguintes:

  • They no longer supply acceptable bandwidth

  • They create dedicated access

  • They’re not secure enough

  • They’re too expensive

Explicação

Questão 61 de 170

1

Which one of the following operating systems may not act as a DirectAccess client?

Selecione uma das seguintes:

  • Windows 7 Enterprise

  • Windows Server 2008

  • Windows Server 2008 R2

  • Windows 8

Explicação

Questão 62 de 170

1

Using what feature can streamline the creation and setup of RADIUS servers?

Selecione uma das seguintes:

  • build guidelines

  • documentation

  • templates

  • wizards

Explicação

Questão 63 de 170

1

The default connection request policy uses NPS as what kind of server?

Selecione uma das seguintes:

  • DNS

  • Active Domain controller

  • RADIUS

  • RRAS

Explicação

Questão 64 de 170

1

What is the purpose of the System Health Agent (SHA)?

Selecione uma das seguintes:

  • To provide feedback to the system for CPU, memory, and disk health

  • To provide feedback to the Security Health Validator (SHV)

  • To provide feedback on the status of system protection and updates

  • To provide feedback on overall critical performance to a central collector

Explicação

Questão 65 de 170

1

NTLM uses a challenge-response mechanism for authentication without doing what?

Selecione uma das seguintes:

  • Revealing the client’s operating system to the server

  • Revealing the protocol to the server

  • Sending a password to the server

  • Sending an encrypt/decrypt message to the server

Explicação

Questão 66 de 170

1

When you add attributes to an Active Directory object, what part of the domain database are you actually changing?

Selecione uma das seguintes:

  • FSMO

  • Schema

  • Directory Structure

  • Organizational Units

Explicação

Questão 67 de 170

1

If a single domain controller’s AD database becomes corrupt, which types of restore should you perform on it?

Selecione uma das seguintes:

  • authoritative

  • nonauthoritative

  • explicit

  • full

Explicação

Questão 68 de 170

1

The default maximum password age is how long?

Selecione uma das seguintes:

  • 12 days

  • 36 days

  • 42 days

  • 86 days

Explicação

Questão 69 de 170

1

Which utility do you use to set up loopback policies?

Selecione uma das seguintes:

  • Group Policy Management Editor

  • Server Manager

  • Active Directory Users and Groups

  • PowerShell

Explicação

Questão 70 de 170

1

What is an Active Directory object stored in the Group Policy Objects container with the domain naming content of the directory that defines basic attributes of the GPO but does not contain any of the settings?

Selecione uma das seguintes:

  • Group Policy Container (GPC)

  • Group Policy Template (GPT)

  • migration table

  • delegation

Explicação

Questão 71 de 170

1

What object can you create to organize Registry preference items?

Selecione uma das seguintes:

  • A Collection

  • A file system folder

  • A Control Panel applet

  • An OU

Explicação

Questão 72 de 170

1

To convert a discover image to a bootable ISO image, what non-included component do you need to download and install?

Selecione uma das seguintes:

  • Windows Assessment and Deployment Kit (ADK)

  • Windows Application Programming Interface (API)

  • Windows Public Key Infrastructure(PKI)

  • Windows Software Development Kit(SDK)

Explicação

Questão 73 de 170

1

You work for an organization that has a mix of Windows 7,Windows 8, and Windows 8.1 computers. You will be using WSUS to deploy Microsoft updates to those computers. What is the number of computer groups required for the updates?

Selecione uma das seguintes:

  • One

  • None

  • Two

  • Three

Explicação

Questão 74 de 170

1

What can Task Manager tell you about performance?

Selecione uma das seguintes:

  • That you might have a bottleneck

  • That you need to reboot the system

  • That you need a larger hard drive

  • That your system needs to be replaced

Explicação

Questão 75 de 170

1

If you want to save on CPU and disk I/0 but consume more network bandwidth for replication, which DFS feature can you disable?

Selecione uma das seguintes:

  • Remote differential compression (RDC)

  • Collective compression technology (CCT)

  • Shortest path replication (SPR)

  • Server-to-server replication compression (S2SRC)

Explicação

Questão 76 de 170

1

What effect does using quotas in File Server Resource Manager have?

Selecione uma das seguintes:

  • It limits the number of files allocated to a user

  • It limits the number of access licenses allotted to a server

  • It limits the number of drive mappings to a shared resource

  • It limits the number of gigabytes allocated to a volume or folder

Explicação

Questão 77 de 170

1

An encrypted file can be converted back to its original format by a process known as what?

Selecione uma das seguintes:

  • Encryption

  • Digitization

  • Decryption

  • Encapsulation

Explicação

Questão 78 de 170

1

What command do you use to manage auditing at the command prompt?

Selecione uma das seguintes:

  • Auditpol.exe

  • Adpolicy.exe

  • Audit.exe

  • Policy.exe

Explicação

Questão 79 de 170

1

What is the first and most important step in installing and deploying DNS in your network?

Selecione uma das seguintes:

  • Planning the infrastructure and service requirements

  • Setting up an AD so that DNS can be integrated into it

  • Configuring the forward and reverse lookup zones correctly

  • Splitting the network into subdomains

Explicação

Questão 80 de 170

1

If you have a server named server1.blah.com, want to use it as your web server, and have requests point to www.blah.com, what kind of DNS record would you create?

Selecione uma das seguintes:

  • A CNAME record

  • An A record

  • A PTR record

  • An NS record

Explicação

Questão 81 de 170

1

Why would you set verify Caller ID on a remote dial-up connection for a user?

Selecione uma das seguintes:

  • For enhanced security

  • Because you don’t trust the user

  • Because you want users to call in only from specific numbers

  • Because it’s the default setting

Explicação

Questão 82 de 170

1

What is the best reason for deploying DirectAccess connectivity for remote users?

Selecione uma das seguintes:

  • Remote users computers can be easily managed and kept up to date

  • Remote users computers connect automatically

  • Remote computers connect via encrypted links over the internet

  • Remote users can access corporate resources

Explicação

Questão 83 de 170

1

What is the final step in the authentication, authorization and accounting scenario between an access client and the RADIUS server?

Selecione uma das seguintes:

  • An accounting-response to the access server

  • A log entry that the connection is established

  • An access-reject message to the access server

  • A final credential check with the domain controller

Explicação

Questão 84 de 170

1

To what type of file do you export an NPS configuration?

Selecione uma das seguintes:

  • TXT

  • XML

  • DOC

  • NPS

Explicação

Questão 85 de 170

1

What happens to a computer that isn’t running Windows Firewall?

Selecione uma das seguintes:

  • The computer is isolated

  • The computer is powered off

  • A server message is sent off the computer

  • An event is logged

Explicação

Questão 86 de 170

1

What are the two restrictions for adding SPNs to an account?

Selecione uma ou mais das seguintes:

  • Domain Administrators privileges

  • Full control permissions for the folder

  • Local administrator privileges

  • The editor runs from the domain controller

Explicação

Questão 87 de 170

1

Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?

Selecione uma das seguintes:

  • ADPrep /RODCPrep

  • Netdom /RODCPrep

  • Netsh /RODCPrep

  • Ntdsutil /RODCPrep

Explicação

Questão 88 de 170

1

What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory controllers and objects?

Selecione uma das seguintes:

  • The Active Directory Recycling Bin

  • The Active Directory Lost and Found Folder

  • The Active Directory Undelete utility

  • Active Directory Snapshots

Explicação

Questão 89 de 170

1

How should you assign Password Settings Object(PSOs) to users?

Selecione uma das seguintes:

  • Assign the PSOs to a global security group and add users to the group

  • Assign the PSOs to a new group and add the users to the new group

  • Assign the PSOs directly to individual users

  • Assign the PSOs to various Active Directory groups as needed

Explicação

Questão 90 de 170

1

What is the default timeout value for GPOs to process on system startup?

Selecione uma das seguintes:

  • 600 seconds

  • 300 seconds

  • 120 seconds

  • 60 seconds

Explicação

Questão 91 de 170

1

Which of the following are legitimate Administrative Template Property Filters? Select all that apply?

Selecione uma ou mais das seguintes:

  • Keyword Filters

  • Requirements Filters

  • Security Filters

  • Operating System Filters

Explicação

Questão 92 de 170

1

Selecione da lista do Menu para completar o texto.

21. To give someone permission to manage to particular GPO, you use the ( Delegation, Security, Settings, Permissions ) tab of the individual GPO?

Explicação

Questão 93 de 170

1

To copy, replace, upload, or delete files, you can use wildcard characters. Which wildcard characters can you use?

Selecione uma ou mais das seguintes:

  • ?

  • X

  • $

  • *

Explicação

Questão 94 de 170

1

Which feature allows you to add driver packages to WDS and then deploy them?

Selecione uma das seguintes:

  • dynamic driver provisioning

  • dynamic image provisioning

  • dynamic package provisioning

  • dynamic service provisioning

Explicação

Questão 95 de 170

1

Other than the default computer group, how many other groups may a computer be assigned to in WSUS?

Selecione uma das seguintes:

  • One

  • Two

  • Four

  • Sixteen

Explicação

Questão 96 de 170

1

Resource Monitor is a powerful tool for understanding how your system resources are used by what two system consumers?

Selecione uma das seguintes:

  • services and processes

  • handles and services

  • files and processes

  • processes and handles

Explicação

Questão 97 de 170

1

Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration?

Selecione uma das seguintes:

  • meshless

  • hub/spoke

  • token ring

  • collective mesh

Explicação

Questão 98 de 170

1

When using File System Resource Manager, which group must you be a member of to enable SMTP?

Selecione uma das seguintes:

  • Administrators

  • Domain Users

  • Schema Admins

  • Power Users

Explicação

Questão 99 de 170

1

Where can you view audit events?

Selecione uma das seguintes:

  • In security logs in Event Viewer

  • In the C:\Temp\Logs folder as text file

  • In System logs in Event Viewer

  • By using audit /logs at the command line

Explicação

Questão 100 de 170

1

What is one of the primary advantages to using Active Directory to store DNS information?

Selecione uma das seguintes:

  • Fault tolerance

  • Zero configuration

  • Low maintenance

  • Reverse zone lookups

Explicação

Questão 101 de 170

1

Which command do you use to verify local DNS settings?

Selecione uma das seguintes:

  • ipconfig /all

  • ping localhost

  • tracert <dns_servername>

  • nslookup <dns_servername>

Explicação

Questão 102 de 170

1

Of the four VPN tunneling protocols, which has the weakest encryption?

Selecione uma das seguintes:

  • PPTP

  • SSTP

  • IKEv2

  • L2TP

Explicação

Questão 103 de 170

1

What does the acronym ISATAP stand for?

Selecione uma das seguintes:

  • Intra-Site Automatic Tunneling Address Protocol

  • Industry Standard Architecture Tunnel Access Protocol

  • Industry Standard Architecture Tunnel Addressing Protocol

  • Inter-Site Automated Tunnel Addressing Protocol

Explicação

Questão 104 de 170

1

Which system is the destination for Accounting-Start messages?

Selecione uma das seguintes:

  • The RADIUS accounting server

  • The RADIUS relay server

  • The RADIUS proxy server

  • The RADIUS web server

Explicação

Questão 105 de 170

1

Which two of the following are Routing and Remote Access IP settings?

Selecione uma ou mais das seguintes:

  • Client May Request an IP Address

  • Server Must Supply an IP Address

  • Server Must Request an IP address

  • Client Must Supply an IP address

Explicação

Questão 106 de 170

1

Which of the following is the format for a virtual account used with Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

Selecione uma das seguintes:

  • NT Service\servicename

  • Domainname\servicename

  • Computername\servicename

  • NT Servie\servicename$

Explicação

Questão 107 de 170

1

What utility must you run on a cloned system to ensure that the clone receives its own SID?

Selecione uma das seguintes:

  • sysprep

  • adprep /renew

  • dcpromo

  • ntconfig

Explicação

Questão 108 de 170

1

What is a GUID?

Selecione uma das seguintes:

  • A unique identifier for a snapshot

  • A special file permission

  • An Active Directory object ID

  • A group-user ID in Active Directory

Explicação

Questão 109 de 170

1

By default, who has read/write capability to the Default Domain Policy?

Selecione uma das seguintes:

  • Domain administrators

  • Domain users

  • Power users

  • Local administrators

Explicação

Questão 110 de 170

1

The downward flow of group policies is known as what feature of GPOs?

Selecione uma das seguintes:

  • Cumulative processing

  • Inherent processing

  • Inheritance

  • Control

Explicação

Questão 111 de 170

1

Where is the default location for ADMX files?

Selecione uma das seguintes:

  • C:\Windows\PolicyDefinitions

  • C:\Windows\Inf

  • C:\Windows\System32\XML\ADMX

  • C:\Windows\SYSVOL\ADMX

Explicação

Questão 112 de 170

1

How do you stop processing a preference if an error occurs?

Selecione uma das seguintes:

  • Select the Stop processing items option on the Common tab

  • Select the Remove this item option on the Common tab

  • Select the Stop on any error option in the CPP Wizard

  • Select the Stop on all errors option in the GPP Wizard

Explicação

Questão 113 de 170

1

Where in a system do you configure PXE?

Selecione uma das seguintes:

  • BIOS

  • Windows PE

  • Dism

  • Sysprep

Explicação

Questão 114 de 170

1

What critical steps you should perform before applying patches or updates?

Selecione uma das seguintes:

  • Select all critical updates for installation

  • Be sure that you have a good backup

Explicação

Questão 115 de 170

1

If you install SQL Server and third-party backup service on the same system, what rule should you follow when creating service accounts?

Selecione uma das seguintes:

  • Use separate accounts for both services

  • create difficult-to-guess usernames and passwords

  • add the service accounts to the local administrator groups

  • Use a single account for both services

Explicação

Questão 116 de 170

1

What type of special cache folder does each replication folder use to hold files ready to be replicated?

Selecione uma das seguintes:

  • Staging folder

  • Replication folder

  • Upload folder

  • Cache folder

Explicação

Questão 117 de 170

1

What is the purpose of setting soft quotas?

Selecione uma das seguintes:

  • To notify users when they have reached the quota limits

  • To list files that need to be deleted

  • To identify users who violate quotas

  • To determine where hard quotas need to be set

Explicação

Questão 118 de 170

1

Encryption is the process of converting data into what kind of format?

Selecione uma das seguintes:

  • Unreadable

  • Compiled

  • Hidden

  • Non-functional

Explicação

Questão 119 de 170

1

Why should you avoid using basic audit policy settings and advanced audit policy settings together?

Selecione uma das seguintes:

  • Audit policies might cause conflicts or erratic behaviour

  • Setting too many policies can put your system in an “out of compliance” state

  • The two audit settings ranges have too much redundancy or overlap between them

  • The amount of auditing will fill up event logs to quickly

Explicação

Questão 120 de 170

1

A specific, individual computer or other network device in a domain is known as what?

Selecione uma das seguintes:

  • Host

  • Top-level system

  • Entity

  • Server

Explicação

Questão 121 de 170

1

You can use the dnscmd command to create zones. What other tasks can you perform with it?

Selecione uma das seguintes:

  • Delete resource records

  • start/stop the DNS service

  • perform name service queries

  • install DNS services

Explicação

Questão 122 de 170

1

You would create a RADIUS template so that you can do what with it?

Selecione uma das seguintes:

  • Easily create multiple RADIUS servers from it

  • Consistently create multiple RADIUS servers from it

  • Create RADIUS servers without affecting the functionality of NPS

  • Apply it to the select servers

Explicação

Questão 123 de 170

1

What is the last setting in the Routing and Remote Access IP Settings?

Selecione uma das seguintes:

  • How IP addresses are assigned

  • The number of assigned IP Addresses

  • Which DHCP server will supply the requests

  • Which NPS server to connect to

Explicação

Questão 124 de 170

1

What type of protocol is Kerberos?

Selecione uma das seguintes:

  • A secure network authentication protocol

  • A simple Microsoft-only protocol

  • A uni-directional authentication protocol

  • A certification-based authentication protocol

Explicação

Questão 125 de 170

1

What version of Windows Server introduced incremental universal group membership replication?

Selecione uma das seguintes:

  • 2003

  • 2000

  • 2008

  • 2012

Explicação

Questão 126 de 170

1

What is the purpose procedure for removing a domain controller from active directory?

Selecione uma das seguintes:

  • Shut down the domain controller and manually remove it from AD

  • Uninstall Active Directory Domain Services

  • Use dcpromo to demote the domain controller

  • Enter the DSRM and delete Active Directory

Explicação

Questão 127 de 170

1

Account Policies contain various subnets. Which one of the following are legitimate subnet of account policies. Choose all that apply?

Selecione uma ou mais das seguintes:

  • Password Policy

  • Account Lockout Policy

  • Kerberos Policy

  • Username Policy

Explicação

Questão 128 de 170

1

What is the best method of dealing with slow-link processing?

Selecione uma das seguintes:

  • Changing the slow-link policy processing behaviour

  • Placing a read-only domain controller at the slow-link site

  • Disabling GPO processing for slow-link systems

  • Increasing the link bandwidth above 5000 kbps

Explicação

Questão 129 de 170

1

The security template allows you to configure which of the following settings? Choose all that apply

Selecione uma ou mais das seguintes:

  • System Services

  • Registry Permissions

  • File System Permissions

  • Registry Entries

Explicação

Questão 130 de 170

1

If you don’t want a GPO to apply, which group policy permission do you apply to a group or user?

Selecione uma das seguintes:

  • Disallow Apply

  • Disallow Modify

  • Disallow Write

  • Disallow Read

Explicação

Questão 131 de 170

1

Windows Settings has multiple preference extensions. Identify all that apply.

Selecione uma ou mais das seguintes:

  • Registry

  • Shortcuts

  • Folders

  • Storage

Explicação

Questão 132 de 170

1

What Microsoft tool do you use to create and manage Windows setup answer files?

Selecione uma das seguintes:

  • System Image Manager (SIM)

  • Deployment Image Servicing and Managing (Dism.exe)

  • System Preparation utility (Sysprep.exe)

  • Windows Preinstallation Environment (Windows PE)

Explicação

Questão 133 de 170

1

Which of the following is the proper method of starting the Windows Update service?

Selecione uma das seguintes:

  • net start wuauserv

  • net start wsusrv

  • service start suauserv

  • service start wsusrv

Explicação

Questão 134 de 170

1

When you set a service to start automatically with delayed start, how long is the delay?

Selecione uma das seguintes:

  • Two minutes

  • One minute

  • Five minutes

  • Delayed until all other services start

Explicação

Questão 135 de 170

1

What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?

Selecione uma das seguintes:

  • File Screening

  • Windows Defender

  • Quotas

  • Windows Firewall

Explicação

Questão 136 de 170

1

From a security standpoint, which BitLocker operational mode is most secure?

Selecione uma das seguintes:

  • TPM + startup key

  • TPM + startup PIN

  • Startup key only

  • TPM only

Explicação

Questão 137 de 170

1

Auditing is used for what purpose?

Selecione uma das seguintes:

  • Recording user's actions

  • Authenticating users

  • Authorizing users

  • Assessing a user’s permissions

Explicação

Questão 138 de 170

1

What type of structure does DNS have?

Selecione uma das seguintes:

  • Hierarchical distributed

  • Flat distributed

  • Top-down distributed

  • Wheel-spoke distributed

Explicação

Questão 139 de 170

1

What does Time to Live (TTL) mean in DNS parlance?

Selecione uma das seguintes:

  • The length of time a record remains in DNS cache

  • The length of time it takes a DNS query to process

  • The length of time required to process an iterative query

  • The length of time between zone updates

Explicação

Questão 140 de 170

1

DirectAccess was introduced with which workstation/server pair?

Selecione uma das seguintes:

  • Windows 7/Windows Server 2008 R2

  • Windows XP/Windows Server 2003

  • Windows Vista/Windows Server 2008

  • Windows 8/Windows Server 2012

Explicação

Questão 141 de 170

1

Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?

Selecione uma das seguintes:

  • Priority

  • Relay link number

  • Weight

  • Precedence

Explicação

Questão 142 de 170

1

To which type of file do you export an NPS configuration?

Selecione uma das seguintes:

  • XML

  • TXT

  • DOC

  • NPS

Explicação

Questão 143 de 170

1

Which two components must a NAP client have enabled in order to use NAP?

Selecione uma ou mais das seguintes:

  • Security Centre

  • NAP Agent

  • Windows Update

  • DHCP client

Explicação

Questão 144 de 170

1

What is the name by which a client uniquely identifies an instance of a service?

Selecione uma das seguintes:

  • service principal name

  • service instance name

  • service account name

  • service provider name

Explicação

Questão 145 de 170

1

Where are you most likely to see a Read-Only Domain Controller (RODC)?

Selecione uma das seguintes:

  • In a remote site

  • In a small network instead of an enterprise

  • In an enterprise network

  • In the place of a standard domain controller

Explicação

Questão 146 de 170

1

By default, how often does Active Directory “garbage collection” occur?

Selecione uma das seguintes:

  • Every 12 hours

  • Every 45 mins

  • Every 2 hours

  • Every 6 hours

Explicação

Questão 147 de 170

1

What is an easy method of creating a strong password?

Selecione uma das seguintes:

  • Start with a sentence and then add numbers and special characters

  • As a friend for some ideas for good passwords and then add your own number and characters

  • Use your favorite football team name with numbers and special characters

  • Use your username and add numbers and special characters.

Explicação

Questão 148 de 170

1

What is the primary purpose of running the Group Policy Results Wizard? Select all that apply.

Selecione uma ou mais das seguintes:

  • To analyze the cumulative effect of GPOs

  • For GPO troubleshooting

  • To guarantee that GPOs are enforced in full

  • To ensure that you have administrative rights to the client computer

Explicação

Questão 149 de 170

1

Which of the following are legitimate Administrative Template Property Filters? Select all that apply.

Selecione uma ou mais das seguintes:

  • Keyword Filters

  • Requirements Filters

  • Security Filters

  • Operating System Files

Explicação

Questão 150 de 170

1

GPPs are divided into which two sections?

Selecione uma ou mais das seguintes:

  • Windows and Control Panel

  • Applications and Control Panel

  • Applications and Registry

  • Windows and Registry

Explicação

Questão 151 de 170

1

Why would you use multicasting for WDS?

Selecione uma das seguintes:

  • It minimizes network traffic

  • It requires less space on the client system

  • It decrease deployment time

  • It supports IPV6 and DHCPv6

Explicação

Questão 152 de 170

1

WSUS can retrieve updates directly from Microsoft or from what other sources?

Selecione uma das seguintes:

  • Another WSUS server on your network

  • a secondary Microsoft Windows Update location

  • the original Windows installation media

  • a public FTP site

Explicação

Questão 153 de 170

1

When troubleshooting services on your system, why might you want you want to start up in Safe mode?

Selecione uma das seguintes:

  • Because the system starts only the core services

  • Because the system gives you limited rights

  • Because the system loads a minimal set of drivers

  • Because the system boots with a lower screen resolution

Explicação

Questão 154 de 170

1

What is the default quota size of the conflict and deleted folder?

Selecione uma das seguintes:

  • 660 MB

  • 500 MB

  • 800 MB

  • 1250(1.25 GB)

Explicação

Questão 155 de 170

1

When storage space is at a premium, what should you do to ensure that everyone has enough space?

Selecione uma das seguintes:

  • Set up hard quota limits with email notification

  • Set up very restricted soft quota for users with email notification

  • Set up file groups so that users can’t save very large files

  • Set up a soft quota limits with no notification

Explicação

Questão 156 de 170

1

What key length is considered to be minimally strong for encryption algorithms?

Selecione uma das seguintes:

  • 80

  • 56

  • 120

  • 256

Explicação

Questão 157 de 170

1

By using what type of policy can you track, limit or deny a user’s ability to use removable storage devices such as a USB in Windows 2012?

Selecione uma das seguintes:

  • Removable Device Access

  • Storage Device Audit

  • Removable Storage Access

  • USB Storage Access

Explicação

Questão 158 de 170

1

Which TCP/UPD port does the DNS Server use to communicate?

Selecione uma das seguintes:

  • 25

  • 53

  • 80

  • 443

Explicação

Questão 159 de 170

1

What term is defined as private data placed in a packet with a header containing routing information that allows the data to traverse a transit network, such as the Internet?

Selecione uma das seguintes:

  • Encapsulation

  • Routing

  • VPN

  • Tunneling

Explicação

Questão 160 de 170

1

What utility do you use to configure DirectAccess?

Selecione uma das seguintes:

  • Remote Access Management Console

  • DNS Console

  • Active Directory Console

  • DirectAccess Console

Explicação

Questão 161 de 170

1

What information does the Accounting-Start message contain?

Selecione uma das seguintes:

  • The type of service and the users it is delivered to

  • The RADIUS server name and IP address

  • The list of permissions granted to the user

  • The list of service provided to RADIUS access servers

Explicação

Questão 162 de 170

1

What command-line utility is used to import and export NPS templates?

Selecione uma das seguintes:

  • Netsh

  • Dnscmd

  • Msconfig

  • Net

Explicação

Questão 163 de 170

1

Why do you need a web server as part of your NAP remediation infrastructure?

Selecione uma das seguintes:

  • To provide internet access to users who fail compliance

  • To provide user information in case of a compliance failure

  • To redirect user request for restored network access

  • To further access how far out of compliance a user system is

Explicação

Questão 164 de 170

1

When creating accounts for operating systems, processes, and services, you should always configure them with?

Selecione uma ou mais das seguintes:

  • Using strong passwords

  • Grand the least rights possible

  • Using cryptic user names

  • Using built-in accounts

Explicação

Questão 165 de 170

1

How many global catalogs are recommended for every organization?

Selecione uma das seguintes:

  • At least two

  • At least one

  • At least three

  • No fewer than four

Explicação

Questão 166 de 170

1

Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature?

Selecione uma das seguintes:

  • Restartable AD DS

  • The DSRM console

  • The ntdsutil comman0line utility

  • Active Directory Maintenance Mode

Explicação

Questão 167 de 170

1

Which aspect of passwords is a key component of their strength?

Selecione uma das seguintes:

  • Number of characters

  • Easy to remember

  • Dictionary basis

  • Keyboard complexity

Explicação

Questão 168 de 170

1

What is an ADMX file?

Selecione uma das seguintes:

  • An ADM file translator

  • The ADM format for newer operating systems

  • A template buffer

  • The protocol that deploys ADM files across networks

Explicação

Questão 169 de 170

1

When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the chance?

Selecione uma das seguintes:

  • That all User Rights Assignments will be replaced

  • That you’re about to reset policies to their defaults

  • That all security for all the domain will be overwritten

  • That you’re about to restore all security to the default

Explicação

Questão 170 de 170

1

Which Windows extension allows you to copy registry settings and apply them to other computers create, replace, or delete registry settings?

Selecione uma das seguintes:

  • Registry

  • Applications

  • Environment

  • Files

Explicação