4_5965320806589271654

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1. Which terminology is being described below?

A ___ trust allows resources in your domain (the domain that you are logged on to at the time
that you run the New Trust Wizard) to be accessed more quickly by users in another domain
(which is nested within another domain tree) in your forest
a. two-way, incoming, shortcut
b. one-way, outgoing, shortcut
c. two-way, incoming, forest
d. one-way, outgoing, forest
2. Which terminology is being described below?
Time synchronization is critical for the proper operation of many Windows services and line-of-
business applications. The ___ uses the Network Time Protocol (NTP) to synchronize computer
clocks on the network so that an accurate clock value, or time stamp, can be assigned to network
validation requests and resource access requests
a. Network Services Shell (Netsh)
b. Windows Time service (W32time)
c. Listsvc
d. Fixmbr
3. You have decided to install Windows Server 2012 by choosing the Service Core Installation
option. If you want to install, configure or uninstall server roles remotely, what tool would you
use?

a. Windows PowerShell
b. Any of these
c. Server Manager
d. Remote Server Administration Tools (RSAT)
4. Virtual Network Manager (available from the Hyper-V Manager snap-in) offers three types of
virtual networks that you can use to define various networking topologies for virtual machines
and the virtualization server.

Which type of virtual network is isolated from all external network traffic on the virtualization
server, as well any network traffic between the management operating system and the external
network.

a. Internal virtual network


b. Private virtual network
c. External
D All of the above
5. Which of the following features is available when Windows Server 2012 is installed using the
GUI option but without the desktop experience feature installed?

a. Metro-style Start screen


b. Built-in help system
c. All of these
d. Windows Media Player
6. Server manager is a great tool for managing most of your server settings and configuration all in
one central place. Which one of the following Server manager Features is used for Storage
management, replication and searching?
a. Dynamic Host Configuration Server
b. Terminal Services
c. Domain Name Service
d. File Services
7. Server manager is a great tool for managing most of your server settings and configuration all in
one central place. Which one of the following Server manager Features is used for management
of Public Key Infrastructure?

a. Dynamic Host Configuration Server


b. WINS Server
c. Domain Name Service
d. Active Directory Certificate Services
8. Your IT manager is concerned that someone is trying to gain access to your company's
computers by logging on with valid domain user names and various password attempts. Which
audit policy should you monitor for these activities?

a. Policy Change
b. Account Logon
c. Privilege Use
d. Directory Service Access
9. Which terminology is being described below:

This trust is a manually created trust that shortens the trust path to improve the speed at which
authentications, which occur between domain trees, are processed

a. Quick Trust
b. Simple Trust
c. Easy Trust
d. Shortcut Trust
10. Is the following statement about Hyper-V true or false?
Hyper-V does not support wireless networks

a. True
b. False
sometime
11. When you install Windows Server 2012, you can choose between Server Core Installation and
Server with a GUI..
Which option would reduce the potential attack surface and servicing requirements?

a. Server Core Installation


b. Server with a GUI
c. Itanium based
d. None of the above
12. Managing Group Policy objects is a tiresome task. Which of the following Windows Server 2012
features could you use to save time when creating GPO’s with similar settings?

a. UAC
b. PXE boot
c. IFM
d. Starter GPO
13. RODC comes with a number of features that focus on heightened security with limited
functionality to remote office users. Which of the following are features of RODC?

a. Filtered Attribute Sets


b. All of these
c. Read-only DNS
d. Unidirectional Replication
14. In Windows Server 2012, you can remove the Server Graphical Shell, resulting in the “Minimal
Server Interface.” This is similar to a Server with a GUI installation except that some features are
not installed.

Which of the following features is not installed in this scenario?

a. MMC
b. Windows Explorer
c. Control Panel (subset)
d. Server Manager
15. You have just finished installing Windows Server 2012 on a new server. Your colleague has
informed you that its essential that you must activate Windows Server. Which of the following
command line tools can be used to Activate Windows Server?

a. Cscript C:\windows\system32\slmgr.vbs –ato


b. Netdom C:\windows\system32\slmgr.vbs –ato
c. Ocsetup C:\windows\system32\slmgr.vbs –ato
d. Netsh C:\windows\system32\slmgr.vbs –ato

16. 16. An IPv4 address consists of _______ bits.


a. 4
b. 8
c. 32
d. 64
17. 17. The number of addresses in a class C block is ?
a. 10000
b. 12000
c. 256
d. 100
18. 18. Loopback address in IPV6?
a. 00:11
b. ::1
c. 1
d. 127.0.0.1

19. 19. Which of the following data center type provide maximum uptime?
a. Tier0
b. Tier1
c. Tier2
d. Tier4
20. 20. Which two RAID types use parity for data protection?
a. RAID 1
b. RAID 2
c. RAID 3
d. RAID 5
21. 21. What is the minimum number of disks required for RAID1?
a. 1
b. 2
c. 4
d. 5
22. 22. Which statement(s) about IPv6 addresses are true?
Leading zeroes are requited
Two colons (::) are used to represent successive hexadecimal fields of zeros.
Two colons (::) are used to separate fields.
None of the above
23. Which file system provides you quota and security?
a. NTFS
b. FST
c. FAT
d. FAT32

24. 23. DHCP (dynamic host configuration protocol) provides _____ to the client.
a) IP address
b) MAC address
c) url
d) none of the mentioned
25. 24. DHCP is used for
a) IPv6
b) IPv4
c) both (a) and (b)
d) none of the mentioned
26. 25. Which of the following server is require to resolve server name into ip and vice-versa?
WDS
DNS
FTP
IP SERVER
27. 26. Which of the following disc type will be used for 10TB HDD drive?
MBR
GPT
SSD
SCSI
28. 27. What must be installed before you install the DFS service on a server to create a domain
based DFS namespace?

A. WSUS
B. File Services
C. WSRM
D. WDS
29. 28. Which of the following local groups is added on a file server to enable a user at a remote site
to take manual backups of a file server once a week to a removable USB 2.0 device, that will be
then transported by courier to your organization’s head office location?

A. Remote Desktop Users


B. Administrators
C. Backup Operators
D. Power Users
30. 29. Mukesh works in a company that has an AD DS forest that consists of a forest root domain
plus five domains. He should create a group that contains 70 users who require access to
resources in all six domains. All the user accounts are located in the forest root domain. Which of
the following group scope he should use?

A. Universal
B. Domain local
C. Local
D. Global

31. 30. IIS stands for?


a. Internet Information Services
b. International internet service
c. Inter information service
d. Information internet server

You might also like