Sunteți pe pagina 1din 11

Final: 70-411 Chapter: Chapters 1-22

Study online at quizlet.com/_u1t2v


1.

? AND *

To copy, replace, update, or delete files, you can use


wildcard characters. Which wildcard characters
can you use? Select all that apply.

2.

.ini files

Which Windows extension allows you to add,


replace, or delete sections or properties in
configuration settings or setup information files?

the access
server

Which system, in a RADIUS infrastructure,


handles the switchboard duties of relaying
requests to the RADIUS server and back to
the client?

an AccountingResponse to the
access server

What is the final step in the


authentication, authorization, and
accounting scenario between an access
client and the RADIUS server?

Active

Which screening technique prevents a user


from saving defined unauthorized files?

Active
Directory
database

The domain controllers are the computers


that store and run the
_______________.

the Active
Directory
Recycle Bin

What utility first appeared in Windows


Server 2008 R2 that allows you to undelete
Active Directory containers and objects?

25.

an AD domain

In addition to meeting operating system


requirements, a DirectAccess client must be
a member of what?

26.

AD server

Which of the following is an example of an


SRV record?

additional
storage space
required

What is the primary disadvantage of DFS


Replication?

the ADM
format for
newer
operating
systems

What is an ADMX file?

20.

21.

3.

.msi

What is the filename extension for the files in


which installation information is stored?

4.

.net

Which of the following is an example of a top-level


domain?

22.

5.

What setting can you give for account lockout


duration that requires an administrator to
manually unlock the account?

23.

6.

0 to 24

What is the range of password history settings?

24.

5
minutes

What is the default maximum allowable time lapse


between domain controllers and client systems for
Kerberos to work correctly?

5,000

The default namespace mode is Windows Server


2008, which supports up to 50,000 folders. How
many folders does using non-Windows Server
2008 provide?

7.

8.

27.

9.

What is the default minimum password length in


characters?

10.

24

What is the default setting for password history?

11.

53

Which TCP/UDP port does the DNS service use to


communicate?

12.

56

Before Windows 2008 R2, only nine basic audit


settings existed. Windows Server 2012 introduces a
total of how many audit subsettings?

29.

Administrators

What key length is considered to be minimally


strong for encryption algorithms?

What group must you be a member of to


enable SMTP?

30.

ADSI Edit

600
seconds

What is the default timeout value for GPOs to


process on system startup?

Which tool can you use to add SPNs to an


account?

31.

All Computers

660 MB

What is the default quota size of the Conflict and


Deleted folder?

By default, to which computer group are


computers assigned in WSUS?

32.

Allow Read
AND Allow
Apply

A user must have which two existing


permissions for new permissions to be
applied to their accounts for GPO
delegation?

Allow Read
AND Allow
Apply

For users to receive GPO settings, they


must have which two permissions to the
GPO?

another WSUS
server on your
network

WSUS can retrieve updates directly from


Microsoft or from what other source?

answer files

What type of XML file do you need to create


and add information to when performing
an unattended operating system
installation via WDS?

13.

14.

15.

16.

17.

18.

19.

80

1812 and
1813

Which ports do Microsoft RADIUS servers use


officially?

2003

To use WMI filters, you must have one domain


controller running which version of Windows
Server or higher?

2008
AND
2008 R2
AND
2012

GPP can be configured on domain controllers


running which version of Windows Server? Select
all that apply.

8530

What is the default port number for WSUS


synchronization?

28.

33.

34.

35.

36.

37.

38.

Anti-virus/antimalware servers AND


Software update servers

Identify two remediation server


types.

Apply Group

By default, which GPO


permissions are all authenticated
users given?

apply the template to all


derived file screens

When you change a file template


and save the changes, you have
the option to do which one of the
following?

Assign the PSOs to a


global security group
and add users to the
group.

How should you assign


Password Settings objects (PSOs)
to users?

40.

at least two

How many global catalogs are


recommended for every
organization?

41.

attribute

EFS encryption is what type of


feature that can be enabled or
disabled at will, similar in effect
to read-only, compression, or
hidden?

39.

42.

43.

44.

45.

46.

47.

48.

49.

Audit policies might


cause conflicts or
erratic behavior.

Why should you avoid using


basic audit policy settings and
advanced audit policy settings
together?

audit.csv

When resetting audit settings


back to basic mode, what file
must you remove as part of the
process?

AuditPol.exe

authorization

Which command do you use to


manage auditing at the command
prompt?
What process determines what a
user is permitted to do on a
computer or on a network?

automated networkbased installations


based on network-based
boot and installation
media

Windows Deployment Services


(WDS) is a software platform and
technology that allows you to
perform which function?

automatic password
management AND
simplified SPN
management

Name two benefits to using


Managed Service Accounts
(MSAs).

balanced

Round-robin DNS is a term that


refers to what kind of distribution
mechanism for DNS responses to
queries?

Be sure that you have a


good backup.

What critical step you should


perform before applying patches
or updates?

because administrator
accounts carry more security
sensitivity than users do

Why should
administrator passwords
change more often than
user passwords?

51.

bi-directional

What kind of connectivity


does DirectAccess
establish between
workstation and server?

52.

BIOS

Where in a system do you


configure PXE?

53.

blah.com

Which of the following is


an example of a secondlevel domain?

54.

boot.wim

What is the name of the


Windows Server 2012
installation DVD boot
image file?

55.

by cryptographic checksum

How is data verified


when transferred through
the Internet?

56.

by precedence

If a site, domain, or OU
has multiple GPOs, how
are the group policies
processed?

57.

C:\StorageReports\Scheduled

By default, where are


storage reports saved?

58.

C:\Windows\PolicyDefinitions

Where is the default


location for ADMX files?

59.

canonical name or CNAME

What is another
designation for an Alias?

60.

centralized management

What is the primary


advantage of using Group
Policies in a domain
environment?

61.

certificate

What type of NPS


authentication is
recommended over
password
authentication?

62.

a certificate authority

Where do you get


certificates for
authentication purposes?

Change share permissions.


AND Disable one of the
connections.

What can you do to


change bidirectional
replication into
unidirectional? (Choose
two.)

cipher.exe

If you're a command-line
user, what command will
encrypt files and folders?

50.

63.

64.

65.

66.

67.

68.

69.

70.

71.

72.

73.

74.

75.

76.

Client May
Request an IP
Address AND
Server Must
Supply an IP
Address

Which two of the following are Routing


and Remote Access IP settings?

The client
receives an
access denied
error.

What happens if a client submits a service


ticket request for an SPN that does not exist
in the identity store?

Client-side and
Server-side
targeting

What two ways can you assign computers


to groups in WSUS?

a CNAME
record

If you have a server named


server1.blah.com, want to use it as your
web server, and have requests point to
www.blah.com, what kind of DNS record
would you create?

computer and
user
credentials

How do the DirectAccess server and


DirectAccess client authenticate each
other?

The computer
establishes a
secure link to
the domain
controller.

What is the first step in the GPO processing


order?

The computer
is isolated.

What happens to a computer that isn't


running Windows Firewall?

computer
name AND
CPU speed

Which of the following are possible targets


for individual preferences? Select all that
apply.

a computer's
overall health

Network Access Protection (NAP) is


Microsoft's software for controlling
network access of computers based on
what?

78.

79.

80.

81.

82.

83.

the computers
are running
Windows
Update

You should restrict access only for clients


that don't have all available security
updates installed if what situation exists?

constraints

When the Remote Access server finds an


NPS network policy with conditions that
match the incoming connection attempt,
the server checks any _______________
that have been configured for the policy.

Convert it to an
MSI file

77.

Windows Installer cannot install .exe files.


To distribute a software package that
installs with an .exe file, what must you do
to it?

84.

85.

86.

87.
88.

89.

Create and
distribute an
executable file that
contains all the
settings.

What is the most efficient way to deploy


VPN (virtual private network)
configurations to hundreds of users?

decryption

An encrypted file can be converted back


to its original format by a process
known as what?

Default Domain
Policy

Which feature affects all users in the


domain, including domain controllers?

delete resource
records

You can use the dnscmd command to


create zones. What other tasks can you
perform with it?

denies

If a remote connection attempt does not


match any configured constraints, what
does the Remote Access server do to the
connection?

determines the
results of network
location detection
and the IPv6
addresses of the
intranet DNS
servers

What does the netsh namespace show


effectivepolicy command do?

DHCP

The initial configuration of WDS


includes setup of what other server?

The DirectAccess
server must be
part of an Active
Directory domain.

What is the most basic requirement for


a DirectAccess implementation?

Disallow Apply

If you don't want a GPO to apply, which


group policy permission do you apply to
a user or group?

Distributed and
Central

You can configure Windows Server


Update Service (WSUS) in one of two
modes: Autonomous or Replica.
Autonomous provides one type of
management and Replica provides
another. What are the two management
types?

DNS resolver

What is another term for DNS client?

Domain
Administrator
privileges AND the
editor runs from
the domain
controller

What are the two restrictions for adding


SPNs to an account?

domain
administrators

By default, who has read/write


capability to the Default Domain
Policy?

90.

91.

92.

93.

94.

domain
administrators

Which domain users are automatically


granted permissions to perform Group
Policy Management tasks?

domain local
groups, global
groups, and
universal
groups

What are the three types of groups in a


domain?

DSRM

To perform an authoritative restore, into


what mode must you reboot the domain
controller?

during normal
usage

To examine performance correctly, you


must establish a performance baseline.
When do you perform this task?

dynamic driver
provisioning

Which feature of Windows Server allows


you to add driver packages to WDS and
then deploy them?

editing local
security
policies

What is the secpol.msc utility used for?

Enable the
Reliability
Monitor.

What do you need to do if you run the


Reliability Monitor but it is blank?

97.

encapsulation

What term is defined as private data placed


in a packet with a header containing
routing information that allows the data to
traverse a transit network, such as the
Internet?

98.

encrypted

After a file has been encrypted, it is stored


in what format?

the entire
folder and its
subtree

Placing a quota limit on a folder applies


that limit to what part of the folder?

event receiving

What function does a computer perform


when it's issued the command wecutil qc?

event
subscription

Microsoft's new Event Viewer allows you


to collect events from remote computers
and store them locally. By what name is
this collection of events known?

95.

96.

99.

100.

101.

By default, how often does Active Directory


"garbage collection" occur?

Execute
ipconfig
/registerdns.

How can you force a system to update its


DNS record?

104.

F6

For GPP editing states, which key do you


use to toggle Enable Current?

105.

fault tolerance

What is one of the primary advantages to


using Active Directory to store DNS
information?

103.

Some exemptions might be required for


certain groups to store otherwise restricted
file types. What type of exemption can you
set up on folders?

107.

File Screening

What technology did Microsoft develop to


combat the storage of storage-using and
potentially illegal files on corporate
servers?

108.

folder

You can encrypt individual files, but


Microsoft recommends encrypting at what
level?

for enhanced
security

Why would you set Verify Caller ID on a


remote dial-up connection for a user?

for light traffic


on small
networks

When is it appropriate to use Windows


Server 2012 as a router between two
networks?

forward lookup
zone

Which type of DNS zone resolves host


names to IP addresses?

full mesh

By default, replication groups use what


type of topology to replicate to all members
of the group?

Fully Qualified
Domain Name

What does the acronym FQDN stand for?

Global Object
Access
Auditing

Which auditing feature allows you to


define computer-wide system access
control lists for the file system or the
registry?

GPP Client-Side
Extensions

To support GPPs on older Windows


versions (Server and Workstation), you
have to install what component from
Microsoft?

group
membership

Which variable can be set to authorize or


deny a remote connection?

group MSAs

By default, which service accounts will the


Windows PowerShell cmdlets manage?

Group Policy
Editor

Which utility do you use to access


advanced audit policy settings?

Group Policy
Management
Editor

Which utility do you use to create GPO


preferences?

hierarchical
distributed

What type of structure does DNS have?

High levels of
auditing can
affect system
performance.

Why is choosing what to audit, instead of


auditing everything that a user does, a
good idea?

history AND
length AND
complexity
AND age

What are examples of password policies?


Select all that apply.

109.

110.

111.

112.

every 12 hours

102.

file screen
exception

106.

113.

114.

115.

116.

117.

118.

119.

120.

121.

122.

host

A specific, individual computer or


other network device in a domain is
known as what?

how IP addresses are


assigned

What is the last setting in the


Routing and Remote Access IP
settings?

how many days a


user must wait
before a password
reset

What does the minimum password


age setting control?

hub/spoke

Which replication topology is more


efficient than the default replication
topology and allows you to set
bandwidth, timing, and
directionality to your configuration?

if they've become
corrupted AND if
someone deleted one
of the policies

Why would you ever want or need to


reset the domain policy and the
domain controller policy to the
default settings? Select all that
apply.

if your users have


laptop computers
and work from home
or office

When would you want to use a split


tunnel for users?

129.

IKEv2

Which VPN protocol provides


constant connectivity?

130.

in a remote site

Where are you most likely to see a


Read-Only Domain Controller
(RODC)?

131.

in individual GPOs

Unlike ADM files, ADMX files are


not stored where?

in Security logs in
Event Viewer

Where can you view audit events?

in the SYSVOL
directory

Where is the Central Store located?

inheritance

The downward flow of group


policies is known as what feature of
GPOs?

123.

124.

125.

126.

127.

128.

Intra-Site Automatic Tunnel


Addressing Protocol

What does the


acronym ISATAP
stand for?

139.

IP addresses

The Domain Name


System (DNS) works
much like a phone
book to associate
URLs (names) with
what kinds of
numbers?

140.

IP-HTTPS

If the client cannot


reach the
DirectAccess server
using 6to4 or Teredo
tunneling, the client
tries to connect using
what protocol?

141.

ipconfig /all

Which command do
you use to verify local
DNS settings?

142.

IPv6

DHCP enforcement is
not available for what
kind of clients?

143.

isolation

When you fully


engage NAP for
remediation
enforcement, what
mode do you place the
policy in?

It exports/imports Active
Directory information.

What function does


the CSVDE tool
perform?

It is a tested, cumulative set of


hotfixes, security updates,
critical updates, and updates, as
well as additional fixes for
problems found internally since
the release of the product.

What is the definition


of a service pack?

It limits the number of gigabytes


allocated to a volume or folder.

What effect does using


quotas in File Server
Resource Manager
have?

It means that passwords never


expire, which is a major security
problem. AND It means that
you've disabled password aging.

Why is a setting of 0
for maximum
password age not a
good idea? Check all
that apply.

It places you into nslookup's


interactive mode.

What does issuing the


nslookup command
with no parameters do
on your system?

138.

144.

132.

133.

134.

135.

136.

137.

Install Active
Directory Domain
Services (AD DS).
AND Execute
dcpromo from
Server Manager.

What two things must you do to a


Windows Server to convert it to a
domain controller?

Internet

DirectAccess is for clients


connected to which network?

Internet Explorer
proxy settings

If Windows Update fails to retrieve


updates, what should you check
first?

145.

146.

147.

148.

149.

150.

151.

152.

153.

154.

155.

It presents the
Windows Welcome
Wizard on the next
boot.

When using sysprep on the master


computer, why do you include the
/oobe parameter?

It removes a
system's name and
SID.

What function does the System


Preparation Utility (Sysprep.exe)
perform on a system?

It replicates
deleted, changed,
and corrupted
files.

DFS Replication does not replace the


need for backups because of what
feature of replication?

It speeds DNS
queries by building
a DNS request
cache.

What is the primary advantage of a


caching-only DNS server?

It's used to boot to a


WDS Server to
install a
preinstallation
environment.

What role does preboot execution


environment (PXE) play in WDS?

item-level targeting

Which term describes changing the


scope of individual preference items
so that the preference items apply
only to selected users or computers?

its distinguished
name

To perform an authoritative restore of


an object or subtree, what bit of
information do you need to know
about the object?

Keyword Filters
AND Requirements
Filters

Which of the following are legitimate


Administrative Template Property
Filters? Select all that apply.

last-writer wins

What type of resolution model does


DFS Replication use to resolve
simultaneous-write conflicts?

164.

Logon/Logoff

What type of audit event notifies you


that an account failed to log on?

165.

loopback

What kind of group policies should you


enable for student computers?

low-level database
corruption

In interactive mode, what aspect of AD


can you check with the ntdsutil
integrity command?

maps a host name


to a single IPv6
address

If an A record maps a host name to an


IP address, what does an AAAA record
do?

168.

metadata cleanup

Which of the following ntdsutil


commands cleans up metadata?

169.

minimal

When creating service accounts, you


should follow the rule of what type of
rights and permissions?

170.

MPPE 128-Bit

Which of the following is the strongest


type of encryption?

171.

MS-CHAPv2

Which authentication protocol allows


you to change an expired password
during the connection process?

172.

multi-master

By using the Active Directory's


integrated zone, DNS follows what
kind of model?

the NAP Server


Event Viewer

Where do you look to find out which


computers are blocked and which are
granted access via NAP?

NAP-compliant
AND NAPnoncompliant

Health policies are in pairs. What are


the members of the pair? Select two.

necessary
resource entries

A stub zone is a zone copy that


contains only what type of records?

net start
wuauserv

Which of the following is the proper


method of starting the Windows
Update service?

netsh

What command-line utility is used to


import and export NPS templates?

netsh nap client


show state

To verify a NAP client's configuration,


which command would you run?

network policies
AND connection
request policies

Health policies are connected to what


two other policies?

Network Policy
Server

What is a RADIUS server known as in


Microsoft parlance?

The new files


become
encrypted.

What happens if you move unencrypted


files into an encrypted folder?

nonauthoritative

If a single domain controller's AD


database becomes corrupt, which type
of restore should you perform on it?

166.

167.

173.

174.
156.

175.
157.

158.

159.

160.

161.

162.

163.

the length of time a


record remains in
DNS cache

What does Time to Live (TTL) mean


in DNS parlance?

Local group policy,


Site, Domain, OU

In which order are Group Policy


objects (GPOs) processed?

locally

Where is the default connection


policy set to process all
authentication requests?

176.

177.

178.

179.

locally connected
computers

Which computers are not affected by


VPN enforcement?

180.

log viewer

The Event Viewer is essentially what


kind of tool?

181.

The global catalog stores a partial


copy of all objects in the forest. What
are the reasons for keeping that
partial copy? Select all that apply.

182.

logon AND object


searches AND
universal group
membership

Not Configured
AND Enabled
AND Disabled

Identify all possible states of an


Administrative Template.

184.

the NPS server

When an access client contacts a VPN


server or wireless access point, a
connection request is sent to what system?

185.

NPS, NPS

Because NAP is provided by _________,


you need to install _________ to install
NAP.

183.

201.

PPTP

Of the four VPN tunneling protocols, which has


the weakest encryption?

202.

priority

Which parameter specifies the order of


importance of the RADIUS server to the NPS
proxy server?

Privilege
Use

Shutting down the system is an example of


what kind of audit event?

process

What term describes an instance of a program


being executed?

Processing
is hidden
from the
user.

GPOs are processed on computer startup and


after logon. Why is the user never aware of the
processing?

The PTR
record
doesn't
exist.

If you issue the command nslookup


192.168.1.50 and get no response, but then
issue nslookup server1 and receive 192.168.1.50
as a response, what do you know is wrong?

quick
glance

Task Manager is not a definitive performance


tool because it gives you what kind of look at
computer performance?

quota
template

When you create quotas, you are recommended


to use what built-in feature to assist you?

RADIUS

The default connection request policy uses NPS


as what kind of server?

the
RADIUS
accounting
server

Which system is the destination for


Accounting-Start messages?

a RADIUS
proxy
server

What kind of RADIUS server is placed between


the RADIUS server and RADIUS clients?

RADIUS
server

To configure RADIUS service load balancing,


you must have more than one kind of what
system per remote RADIUS server group?

read-only

What type of Active Directory domain controller


is recommended to minimize security risks for
remediation servers?

recording
user's
actions

Auditing is used for what purpose?

a reference
to an
attribute
within
another
object

When you do an authoritative restore process, a


back-links file is created. What is a back-links
file?

referral

What term is defined as "an ordered list of


servers or targets that a client computer receives
from a domain controller or namespace server
when the user accesses a namespace root or a
DFS folder with targets"?

203.

204.

nslookup
192.168.1.50

Which one of the following is correct for


querying a PTR record?

NT LAN
Manager

What does the acronym NTLM stand for?

ntdsutil

Which utility do you use to defragment


Active Directory?

NTFS and
shared folder
permissions

How do you secure DFS Namespaces?

190.

NTLM

What is the default authentication


protocol for non-domain computers?

191.

offline

How do you mount a Windows image


using Dism.exe so that you can update it?

208.

on bootable
media

Where do you place a discover image to


ensure proper deployment?

209.

193.

one

How many WMI filters can be configured


for a GPO?

210.

194.

one

How many PDC Emulators are required, if


needed, in a domain?

195.

one

Other than the default computer group,


how many other groups may a computer be
assigned to in WSUS?

Operations
Master

Which Active Directory object is defined as


a specialized domain controller that
performs certain tasks so that multimaster domain controllers can operate
and synchronize properly?

186.

187.

188.

189.

192.

205.

206.

207.

211.

212.
196.

197.

198.

199.

200.

out-of-band
patches

What kind of updates are released on an


as-required basis and are not part of the
standard release cycle?

PAP

Which authentication method is weakest


(least secure)?

pass all SHV


checks

To use the NAP-compliant policy, the


client must do what?

Password
Policy AND
Account
Lockout Policy
AND Kerberos
Policy

Account policies contain various subsets.


Which of the following are legitimate
subsets of account policies? Check all that
apply.

213.

214.

215.

216.

217.

218.

219.

220.

221.

222.

223.

224.

225.

226.

227.

228.

229.

Registry

Which Windows extension allows


you to copy registry settings and
apply them to other computers?
create, replace, or delete registry
settings?

Registry AND
Shortcuts AND
Folders

Windows Settings has multiple


preference extensions. Identify all
that apply.

the Registry Wizard

Which component allows you to


create multiple Registry preference
items based on registry settings that
you select?

Remote Access
Management
Console

What utility do you use to configure


DirectAccess?

remote differential
compression (RDC)

What compression algorithm does


Microsoft use to limit the amount of
bandwidth used in DFS Replication?

remote differential
compression (RDC)

If you want to save on CPU and disk


I/O but consume more network
bandwidth for replication, which
DFS feature can you disable?

Removable Storage
Access

Replace AND Delete

Save useful
event filters as
custom views
that can be
reused.

Which of the following tasks does the


Event Viewer MMC snap-in allow you to
perform?

233.

the SCCM agent

To get the full capability of SCCM, which


component must you install on each
system on your network?

234.

schema

When you add attributes to an Active


Directory object, what part of the domain
database are you actually changing?

seamless and
always on

What kind of connectivity does


DirectAccess provide between client
computers and network resources?

secret key

Kerberos security and authentication are


based on what type of technology?

a secure
network
authentication
protocol

What type of protocol is Kerberos?

security

Why primarily are account lockout policies


put into place?

Security Center
AND NAP
Agent

Which two components must a NAP client


have enabled in order to use NAP?

security group
filter AND
WMI filter

Which two filters can you use to control


who or what receives a group policy?

seize schema
master AND
seize PDC

Which of the following commands issued


at the fsmo maintenance prompt would
successfully seize the role of an Operations
Master Holder? Select all that apply.

Select the Stop


processing
items option on
the Common
tab.

How do you stop processing a preference if


an error occurs?

Send an email,
start a
program, and
display a
message.

What types of tasks can you add to events?

sending a
password to
the server

NTLM uses a challenge-response


mechanism for authentication without
doing what?

Server Settings
Determine IP
Address
Assignment

Which Routing and Remote Access IP


setting is the default setting?

servers

On what type of computer is BitLocker not


commonly used?

232.

235.

236.

By using what type of policy can you


track, limit, or deny a user's ability to
use removable storage devices such
as USB drives in Windows Server
2012?
When working with Network Drive
Mapping Preferences, which
preference behaviors delete drive
mappings? Select all that apply.

a repository for
Administrative
Templates

What is the Central Store?

Reset the user's


password.

After you undelete a user account


with the LDP utility, what action do
you need to perform?

Restartable Active
Directory Domain
Services

Windows Server 2012 introduces a


new time-saving feature when
performing tasks such as AD
defragmentation. What is that
feature?

reverse lookup
zones

Before creating PTR records, what


DNS objects must you create?

role

What type of service is the Windows


File Server Resource Manager?

237.

238.

239.

240.

241.

242.

230.

safe

What's the status of your data if


someone has your public key?

231.

sales.microsoft.com

Which one of the following is an


example of an FQDN?

243.

244.

245.

246.

247.

248.

249.

250.

251.

252.

253.

254.

255.

256.

257.

258.

259.

260.

261.

service

What type of account is an account


under which an operating system,
process, or service runs?

service class, host


name, and port
number

Which three components make up a


service principal name (SPN)?

services and
processes

Resource Monitor is a powerful tool for


understanding how your system
resources are used by what two system
consumers?

setspn

Identify another utility that you can use


to add SPNs to an account.

Shared Secrets
AND Health
Policies AND
RADIUS Clients

Identify the correct NPS templates.


Select all that apply.

Shortcut AND
Drive Maps

If you need to provide users access to a


common network location, which GPP
would you use? Select all that apply.

shows the NRPT


rules as
configured on the
group policy

What does the netsh namespace show


policy command do?

Simple Mail
Transfer Protocol

What does the acronym SMTP stand


for?

small

Windows Updates, especially the


Automatic Updates feature of Windows
Updates, are for what kind of
environments?

so that you can


focus on
important audit
items

What is the purpose of implementing


new audit subsettings?

SOA record

Which DNS record contains the serial


number for the zone?

speed and load


between sites and
the number of
clients

The number of WSUS servers you need


is determined by the number of sites
you have and what two other factors?

Stability Index

The Reliability Monitor provides a


range of numbers to help you evaluate
the reliability of a computer. What is
the name of this range of numbers?

staging folder

Start with a
sentence and then
add numbers and
special
characters.

What type of special cache folder does


each replication folder use to hold files
ready to be replicated?
What is an easy method of creating a
strong password?

262.

Storage Reports

What FSRM feature can you use to show


the state of file server volumes, quotas,
and disallowed files?

263.

symmetric

Single-key encryption is also known as


what kind of encryption?

264.

sysprep

What utility must you run on a cloned


system to ensure that the clone receives
its own SID?

System Image
Manager (SIM)

What Microsoft tool do you use to create


and manage Windows setup answer
files?

System Services
AND Registry
Permissions
AND File System
Permissions

The Security template allows you to


configure which of the following
settings? Select all that apply.

267.

targets

What are DFS Namespace shared


folders referred to in relation to the
virtual folders?

268.

templates

What feature can you use to simplify the


management of file screens?

269.

templates

Using what feature can streamline the


creation and setup of RADIUS servers?

Test the updates


on your own
systems before
approving for
rollout.

WSUS allows you to automatically


approve every update, but you shouldn't
necessarily do that. What should you do
before approving updates to be installed?

that all User


Rights
Assignments will
be replaced

When you're about to reset domain


policy and domain controllers policy
back to default with the dcgpofix.exe
command, what final warning are you
given before you accept the change?

that you might


have a bottleneck

What can Task Manager tell you about


performance?

They allow you to


break up larger
domains into
smaller, more
manageable
ones.

What is one advantage of subdomains?

They deploy
customized
software
installation files

What are MST files used for?

They no longer
supply
acceptable
bandwidth.

Why are phone lines and ISDN not used


today for remote access services (RAS)?

265.

266.

270.

271.

272.

273.

274.

275.

276.

277.

278.

279.

280.

281.

282.

283.

284.

285.

286.

287.

288.

289.

290.

They're encrypted
with the parent
folder.

What happens to files and subfolders


within an EFS encrypted folder?

through the use


of RIP

How are routing tables created


dynamically?

To allow you to
archive unused
files

You can generate several different


reports from FSRM. One of them gives
you a list of Least Recently Accessed
Files. What would be the purpose of
that report?

to analyze the
cumulative effect
of GPOs AND for
GPO
troubleshooting

What is the primary purpose of running


the Group Policy Results Wizard? Check
all that apply.

to grant access to
a user

Authorization is used for what purpose?

to notify users
that they have
reached the quota
limit

What is the purpose of setting soft


quotas?

to provide user
information in
case of a
compliance
failure

Why do you need a web server as part of


your NAP remediation infrastructure?

to store
passwords in a
non-readable
format

What is one purpose of using hash


function encryption?

to verify a user's
identity

Authentication is used for what


purpose?

Transport Server
and Deployment
Server

Which two role services does the WDS


Role include?

Trusted Platform
Module

What built-in computer hardware


feature makes BitLocker Drive
Encryption far more secure than other
forms of folder or file-based encryption?

What information does the


Accounting-Start message
contain?

Uninstall Active Directory


Domain Services.

What is the proper procedure


for removing a domain
controller from Active
Directory?

a unique identifier for a


snapshot

What is a GUID?

unreadable

Encryption is the process of


converting data into what
kind of format?

Use separate accounts for


both services.

If you install SQL Server and a


third-party backup service on
the same system, what rule
should you follow when
creating service accounts?

Usernames and
passwords are sent in
plain text.

Why is password-based
authentication not
recommended?

using Active Directory


GPOs AND using the
Security Configuration
and Analysis snap-in

Which two of the following


methods can you use to deploy
security templates?

using strong passwords


AND granting the least
rights possible

When creating accounts for


operating systems, processes,
and services, you should
always configure them with
what two things in mind?

299.

VPN traffic is encrypted.

Why use a VPN for client-toserver connections over the


Internet?

300.

web

What type of server is the


network location server
(NLS)?

when the policy is


processed

At what point are WMI filters


evaluated?

when the source NPS


database has a higher
version number than the
version number of the
destination NPS database

When should you not use the


command-line method of
exporting and importing the
NPS configuration?

where the namespaces are


stored

What is the primary difference


between domain-based
namespace and stand-alone
namespace?

who is authorized to
connect AND the
connection circumstances
for connectivity

Network policies determine


what two important
connectivity constraints?

292.

293.

294.

295.

296.

297.

298.

two

Public-key cryptography uses how many


keys?

two consecutive
public IP
addresses

Windows Server 2012 varies from the


Windows Server 2008 R2
implementation in that it does not
require which one of the following?

Two minutes

When you set a service to start


automatically with delayed start, how
long is the delay?

two network
interface cards

the type of service and the


user it's delivered to

291.

What special hardware configuration


should a RAS server have?

301.

302.

303.

304.

who, when, and how

An NPS policy is a set of


permissions or restrictions that
determine what three aspects of
network connectivity?

Windows 7 AND
Windows 8

Which of the following operating


systems can have its security
settings managed by using
security templates? Select all that
apply.

Windows 7/Windows
Server 2008 R2

DirectAccess was introduced with


which workstation/server pair?

Windows 8

Windows PE 4.0 is based on


which operating system?

Windows Assessment
and Deployment Kit
(ADK)

To convert a discover image to a


bootable ISO image, what nonincluded component do you need
to download and install?

Windows Firewall
applet AND
Documents folder
AND Microsoft Excel
AND Printer

Which items can you configure


shortcuts to in performing GPP
deployments? Select all that apply.

311.

Windows Installer

What is the name of the software


component used for installation,
maintenance, and removal of
software on Windows?

312.

Windows Server 2003

Which version of Windows Server


introduced incremental universal
group membership replication?

313.

Windows Server 2008

Which one of the following


operating systems may not act as a
DirectAccess client?

314.

Windows Server 2012

Beginning with which server


version can you safely deploy
domain controllers in a virtual
machine?

writable domain
controller

Which type of system must you


connect to and use to make
changes to Active Directory?

316.

XML

What language are ADMX files


based on?

317.

XML

To which type of file do you export


an NPS configuration?

You can't ping that


interface.

What is the result of enabling


security on the RRAS interface in
your RAS server?

You have a single


domain.

You do not place the infrastructure


master on a global catalog server
unless what situation exists?

305.

306.

307.

308.

309.

310.

315.

318.

319.

320.

321.

You have to enable the AD


Recycle Bin. AND You have to
set the AD forest to Windows
Server 2008 R2 or higher.

Before you can use the


Active Directory Recycle
Bin, what two actions do
you have to perform?

the zone serial number

A Start of Authority
record specifies what
kind of information
about a zone?

S-ar putea să vă placă și