Sei sulla pagina 1di 14

Qus 71 :Which of the following is a software restriction rule that can be used to govern which programs can or cannot

run on your network? A. hash rule B. certificate rule C. Path rule D. all of the above Ans: D Qus 72 :What policies are designed to identify software and control its execution? A. Software Restriction B. Software Execution Prevention C. Malicious Software Detection D. Malicious Software Removal Policies Ans: A Qus 73 : What is the sum of the policies applied to a user or computer after all filters, securitygroup permissions, and inheritance settings, such as Block Policy Inheritance andEnforce, have finished processing? A. Effective Permissions B. Resultant Set of Policy C. Effective Set of Policy D. Applied Policy Ans: B Qus 74 :Rather than simulating policy effects like the Group Policy Modeling Wizard, whatobtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment? A. Group Policy Simulator B. Group Policy Planning C. Group Policy Modeling D. Group Policy Results Ans: D

Qus 75 :What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO? A. Block Policy Inheritance B. Policy Delegation C. Group Based Filtering D. Security Group Filtering Ans: D Qus 76 :What manual process defragments the Active Directory database in addition to reducingits size? A. online defragmentation B. local defragmentation C. remote defragmentation D. offline defragmentation Ans: D Qus 77 :The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored. A. objects B. countersC. Items D. classes Ans: A Qus 78 :What is the command-line component of the Windows Server Backup snap-in? A. wbadm B. wbadmin C. backadm D. ntbackup Ans: B

Qus 79 :Server Backup does not support the use of which type of backup media? A. CD drives B. DVD drives C. hard drives D. magnetic tape Ans: D Qus 80 :What is the name resolution mechanism that computers use for all Internetcommunications and for private networks that use the Active Directory domain servicesincluded with Microsoft Windows Server 2008, Windows Server 2003, and Windows2000 Server? A. DNS B. DHCP C. NetBIOS D. ADFS Ans: A Qus 81 :What type of zone contains the master copy of the zone database in which administratorsmake all changes to the zones resource records? A. secondary zone B. stub zoneC. primary zone D. forwarder zone Ans: C Qus 82 :What are the highest-level DNS servers in the entire namespace? A. top-level name server B. root name server C. authoritative name server D. upstream name server Ans: B Qus 83 : In terms of AD FS, what organizations contain the user accounts that are accessing theresources controlled by resource organizations, similar to a trusted domain in a traditionalWindows trust relationship?

A. user organizations B. account organizations C. computer organizations D. resource organizations Ans: B

B. 3389C. 3268D. 3232Ans: CQus 99 :What is the process of confirming a users identity by using a known value, such as a password, pin number on a smart card, or users fingerprint or handprint in the Qus of biometric authentication? A. authorization B. authentication C. administration D. allocation Ans: B Qus 100 :What signifies an objects relative location within an Active Directory OU structure? A. common name B. distinguished name C. SAM account name D. AD name Ans: B Qus 101 :The two built-in user accounts that are created on a Windows Server 2008 computer arethe Administrator account and the __________ account. A. Network B. Interactive C. Power User D. Guest Ans: D

Qus 102: __________ groups are a collection of user accounts that are local to one specificworkstation or member server. A. Distribution B. Local C. Built-in D. Security Ans: B Qus 103:What special identity group is used as a reduced-privilege account to allow applicationsto run on a server without requiring administrative access? A. Network B. Dialup C. Network Service D. Restricted Ans: C Qus 104 :What is a credit cardsized or token-style device, such as a USB device, that is used witha PIN to enable logon to the enterprise? A. RSA SecureID B. password token C. smart chip D. smart cardAns: D Qus 105 :What command-line tool can be used with a standard user account to reduce the risksassociated with the Administrator account? A. runas B. su C. runadmin D. launchas Ans: A

Qus 106 :Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated __________ attack. A. brute force B. dictionary C. cracking D. work Ans: B Qus 107 :What policies can be used to ensure that users always have the latest versions of applications? A. registry-based B. software installation C. folder redirection D. offline file storage Ans: B Qus 108 :What Microsoft Management Console (MMC) snap-in is used to create and modifyGroup Policies and their settings? A. Group Policy Management Editor B. Group Policy Control Console C. Group Policy GPO D. Group Policy Management Console Ans: D Qus 109:Which of the following is not a type of GPO? A. local GPO B. advanced GPO C. domain GPO D. starter GPO Ans: B Qus 110:What term refers to tracking events that take place on the local computer?

A. tracking B. tracing C. spying D. auditing Ans: D Qus 111 :What category is used to configure the startup and security settings for services runningon a computer? A. Workstation Services B. System Services C. Account Services D. Domain Services Ans: B Qus 112 :What command-line tool can be used to manually refresh group policy? A. gprefresh.exe B. adrefresh.exe C. adupdate.exe D. gpupdate.exe Ans: D Qus 113:Before deploying software using Group Policy, what must you create? A. deployment share B. deployment point C. distribution share D. mount point Ans: C Qus 114: What identifies software by specifying the directory path where the application is storedin the file system?

A. hash rule B. certificate rule C. path rule D. network zone rules Ans: C Qus 115 :What type of file can be written to allow nonWindows Installercompliant applicationsto be deployed? A. .msiB. .exe C. .zap D. .ini Ans: C Qus 116 :What Software Restriction Policy properties allow you to determine whether the policiesapply to all files or whether library files, such as Dynamic Link Library (DLL), areexcluded? A. enforcement B. designated file types C. security settings D. trusted publishers Ans: A Qus 117 :Group Policy __________ is used to simulate the effect of a policy on the user environment. A. Simulator B. Planning C. Modeling D. Results Ans: C Qus 118 :When a GPO is selected in Group Policy Management, which tab allows administratorsto view the locations to which the policy is linked? A. Scope

B. Details C. Settings D. Delegation Ans: A Qus 119 : What would the syntax of the GPResult command be if you want to obtain RSoPinformation on computer and user policies that will affect a user named jsmith? A. gpresult /user jsmith B. gpresult jsmith C. gpresult /user jsmith /v D. gpresult /user jsmith /v /x Ans: C Qus 120 :What is responsible for managing changes to the Active Directory database? A. Extensible Storage Engine B. Extended Storage Engine C. Extensible Change Engine D. Stringent Change Manager Ans: A Qus 121 :What are the specific processes or events that you want to track in the Reliability andPerformance Monitor? A. performance objects B. performance counters C. performance items D. performance classes Ans: B Qus 122 :What new command-line and task-based scripting technology is included with WindowsServer 2008? A. Windows Enhanced Shell B. Windows Advanced Shell

C. Windows Ultimate Shell D. Windows PowerShell Ans: D Qus 123:Which backup type will update each files backup history and clear the Application logfiles? A. Copy backup B. VSS full backup C. Incremental backup D. Differential backup Ans: B Qus 124 :What resource record identifies which name server is the authoritative source of information for data within this domain? A. Start of Authority (SOA) B. Name Server (NS) C. Host (A) D. Mail Exchange (MX) Ans: A Qus 125 :What resource record is the functional opposite of the A record, providing an IP address-toname mapping for the system identified in the Name field using the in-addr.arpadomain name? A. Service Record (SRV) B. Name Server (NS) C. Pointer (PTR) D. Mail Exchange (MX) Ans: C Qus 126:What consists of a number of elements that allow two parties to communicate securely,without any previous communication, through the use of a mathematical algorithm called public key cryptography? A. security certificates

B. public key infrastructure C. WEP codes D. passwords Ans: B Qus 127 :What type of CA is not integrated with Active Directory and relies on administrator intervention to respond to certificate requests? A. standalone CA B. static CA C. enterprise CA D. dynamic CA Ans: A Qus 128 :Interoperability with prior versions of Microsoft Windows is available in WindowsServer 2008 through the use of __________. A. domain controllers B. functional levels C. global catalogs D. DNS servers Ans: B

Qus 129 : Active Directory uses __________ relationships to allow access between multipledomains and/or forests, either within a single forest or across multiple enterprisenetworks. A. trust B. domain C. forest D. global Ans: A

Qus 130 :Which functional level only allows Windows Server 2003 and Windows 2008 domaincontrollers? A. Windows 2000 Native B. Windows Server 2003 C. Windows Server 2008 D. Windows 2003 Mixed Ans: B Qus 131 :If the domains within a forest are separated by slow WAN links and the tree-walking process takes an exceedingly long time to allow user authentication across domains, youcan configure a __________ trust. A. two-way transitive B. cross-forest C. shortcut D. parent-child Ans: C Qus 132:What processes can be used by Windows Server 2008 DNS to clean up the DNS databaseafter DNS records become stale or out of date? A. searching and destroying B. aging and scavenging C. seeking and removing D. finding and deleting Ans: B Qus 133:Read-Only Domain Controllers provide added security in the way passwords are storedthrough what feature? A. Password Integration Policy B. Password Caching Policy C. Password Storage Policy D. Password Replication Policy Ans: D

Qus 134:When configuring a site link object, which attribute allows the administrator to define the path that replication will take? A. cost B. schedule C. frequency D. none of the above Ans: A Qus 135:How often does intersite replication occur by default? A. 5 minutes B. 10 minutes C. 15 minutes D. 1 hour Ans: C Qus 136:For both intrasite and intersite replication, what protocol does Active Directory use for allreplication traffic? A. RPC over SMTP B. RPC over TCP C. RPC over IP D. RPC over ARP Ans: C Qus 137:Active Directory creates a __________ with the idea that all writeable domain controllersin a domain should communicate Active Directory information to each other, in additionto communicating forest-wide information with other domains. A. replication topology B. domain topology C. replication strategy D. domain strategy

Ans: A Qus 138 :What holds a subset of forest-wide Active Directory objects and acts as a centralrepository by holding a complete copy of all objects from the host servers local domainwith a partial copy of all objects from other domains within the same forest? A. domain controller B. global catalog C. DNS server D. DHCP server Ans.B

Potrebbero piacerti anche