Sunteți pe pagina 1din 14

Engineer exam 2019


You have 40 minutes to complete the following 55 questions

Question 1

Which of the following cables would not be used to connect a printer to a workstation?

Ethernet
Parallel
Serial
USB

Question 2

You notice that the antivirus icon in the systray of a workstation is flashing. Do you...

Restart the workstation


Open the antivirus, attempt to update it’s definitions and check it’s logs
Ignore it; this is the expected behaviour
Close and re-open the antivirus application

Question 3

Ned cannot print to the network printer HOMER-01. All other users are able to to print. Do you...

Remove and re-add the printer for Ned


Restart the Print Spooler on the server
Restart the printer
Ask Ned to use a different machine
Question 4

Which of the following logs would help to identify why Word keeps crashing?

Setup Log
System Log
Security Log
Application Log

Question 5

You are unable to resolve FQDNs and hostnames, but pinging an IP (e.g. 8.8.8.8) works. Do you...

Remove the Default Gateway


Run an AV scan on the machine
Change the adapter subnet
Check the DNS server is accessible

Question 6

Which of the following is a valid MAC address?

22-443-33898443
24:BC:13/FA:36:9A/A1:2F:DD
52:54:00:29:5D:24
IPv4:127.0.0.1

Question 7

What does NAT stand for?

Network Address Translation


Network Access Tunnel
Network Authentication Tunnel
Network Address Topology

Question 8
Which of the following is not a protocol used for email receipt or delivery?

IMAP
SMTP
ICMP
POP3

Question 9

Which of the following roles would you need to install on a server to provide guest machines an IP?

MAPI
DNS
DHCP
IPPS

Question 10

What port is traditionally used for HTTPS connections?

443
80
8080
4443

Question 11

What is email phishing?

When you search another user’s mailbox


Email from malicious user A pretending to be legitimate user B
When an email is sent to 5,000+ users at once
When all emails in a folder are deleted

Question 12

How would you boot a Windows machine into Safe Mode?

ESC
F8
F6
F2

Question 13

Which port would you need to allow through a firewall to allow access via RDP?

3389
143
389
5900

Question 14

You need to add and remove users from a Distribution group. Where could you not do this?

OWA
Active Directory
EMC
ECP

Question 15

Which of these commands would you use to identify the hops between hosts A and B?

arp
route
tracert
ping

Question 16

What is the full-path to the HOSTS file on a Windows machine?

c:\windows\system32\etc\hosts
c:\windows\system32\drivers\etc\hosts
c:\windows\system32\hosts
c:\windows\system32\etc\drivers\hosts
Question 17

What is the difference between a virus and a trojan?

A virus is from an infected attachment; a trojan is from an infected website


A trojan is a virus that only one user is affected by
None of the above
Whilst both malicious, a trojan masquerades as something it is not

Question 18

Which of the following services can interfere with scheduled backups?

DCDIAG
DFS
CHKDSK
VSS

Question 19

Which of the following system folders contains files and folders that can be safely deleted?

c:\windows\installer
c:\windows\winsxs
c:\windows\policydefinitions
c:\windows\system32\winevt\logs

Question 20

How would you check which Domain Controller a user has authenticated against via CMD?

echo %logon_dc%
echo %domaincontroller%
echo %dc%
echo %logonserver%
Question 21

Which format must a software binary be in order to allow it’s deployment via GPO?

EXE
GPO
ZIP
MSI

Question 22

As an administrator, how would you check which Group Policies had been applied to a workstation?

You need to check via the server


gpresult /r /scope computer
Event Viewer > System
gpresult /r /computer

Question 23

What service would you first restart on an Exchange server if the mail queue is not processing?

Exchange Transport Service


Exchange System Attendant
Exchange Processing Service
Exchange SMTP Delivery Service

Question 24

How would you determine which ports are listening on a server?

netstat -ab | findstr LISTEN


netsh winsock listen
netsh -list | findstr LISTEN
netstat -ab | findstr WAITING

Question 25
How would you check the routing table on a Windows machine?

echo route
route print
route -l
show route

Question 26

How would you change the resolution of an RDP session?

Disconnect, change via mstsc and reconnect


Via Registry
Via Display Adapter properties
Via Control Panel

Question 27

Which of the following technologies would NOT create a HTTP listener?

Postfix
Apache
Tomcat
Microsoft IIS

Question 28

Which of the following VPN solutions would be used to connect Company A’s various offices?

IPsec
IPSSL
LLTP
PPTP

Question 29

Which port would you need to allow through a firewall to allow access via LDAP?

3389
143
389
5900

Question 30

How would you test if port 22 is open on IP 10.30.40.90?

telnet 22 10.30.40.90
telnet 10.30.40.90:22
telnet 10.30.40.90 22
telnet -p 22 10.30.40.90

Question 31

What is the Active Directory object attribute for a user’s account name?

name
samaccountname
username
ad-username

Question 32

Which of the following would stop functioning if you stopped IIS on Exchange 2013?

ECP
All of the above
EMS
ActiveSync

Question 33

A file-server from a new company has been introduced to the network and users need to access both old and new data via one URL (i.e.
\\company\data). Which role would you configure and install to achieve this?

DFS (Distributed File System)


NETBIOS
VSS (Volume Shadow State / Copy)
FRS (File Replication Service)

Question 34

Which of these commands would resolve an IP to it’s physical address?

netstat -a
dig -a
arp -a
nslookup +a

Question 35

How many usable IPs are in the subnet range for 172.16.1.0/16?

256
14
16
65536

Question 36

How would you check the replication state between all Domain Controllers?

repadmin /repl
dcinfo /showrepl
repadmin /showrepl *
repadmin /dcrep *

Question 37

Which of the following DNS records is a necessary requirement for email delivery?

SPF
CNAME
A
MX
Question 38

Which command would you use to check where a server is querying it’s time?

w32tm /config /query


w32tm /show /source
w32tm /show /configuration
w32tm /query /configuration

Question 39

The log drive for Exchange has run out of space and databases have dismounted. What is the most likely cause?

The backups have failed


Somebody has sent a large file to all recipients
Somebody has logged off the Administrator account
Somebody has stopped a critical Exchange service

Question 40

Which of the following commands will show you logged on users on HOMER-01?

query /sessions:homer-01
query users /server:homer-01
query session /server:homer-01
query homer01 /sessions

Question 41

Which of the following commands will return a working, and valid, output? (n.b. telnet is enabled)

1..254 | ? { $n = "10.6.81.$_" ; ping $n -n 1 | findstr TTL | % { telnet $n 5900 } }


1..254 | % { $n = "10.6.81.$_" | ping $n -n 1 | findstr TTL | ? { telnet $n 5900 } }
1..254 | % { $n = "10.6.81.$_" ; ping $n -n 1 | findstr TTL | % { telnet $n 5900 } }
1..254 | % { $n = "10.6.81.$n" ; ping $_ -n 1 | findstr TTL | % { telnet $n 5900 } }

Question 42
How would you perform an offline integrity check for an Exchange database?

eseutil /dl
eseutil /mh
eseutil /dq
eseutil /ic

Question 43

Which of these is not a distance vector protocol?

BGP
EIGRP
OSPF
RIPv2

Question 44

In a VMware cluster, what service manages automatic migration of VMs in a DR incident?

vMDR
DRS
vM-NLB
vMotion

Question 45

What is the fault tolerance of 24x360GB SAS drives configured in RAID6 (double-parity)?

3 drives
2 drives
8 drives
6 drives

Question 46

Which of the following is a correct SPF record?

"v=spf1 include(_netblocks.mimecast.com) ip(50.18.126.196/32) -all"


"v=spf1 dns:_netblocks.mimecast.com ip:50.18.126.196/32 -all"
"v=spf1 include(_netblocks.mimecast.com) ip(50.18.126.196/32) -noall"
"v=spf1 include:_netblocks.mimecast.com ip4:50.18.126.196/32 -all"

Question 47

Which of the following is considered a deprecated cipher suite?

ECDHE
DH (2048)
RC4
3DES

Question 48

Which of the following configurations would benefit from having Jumbo Frames enabled?

SAN connected to an ESX cluster via Fibre-Channel


NFS connected to an ESX cluster via Fibre-Channel
SAN connected to an ESX cluster via iSCSI
SAN connected to an ESX cluster (directly-attached)

Question 49

Which of the following protocols would help indicate a Broadcast Storm?

FLA
DPD
STP
LDP

Question 50

For ‘DNS scavenging’ to operate correctly, how many Domains Controllers should have it enabled?

At least two
One
Only RW DCs
All of them
Question 51

In ESXi, which of these commands would show available storage adapters on the host?

esxcli storage adapter device list


esxcli storage device adapter list
esxcli storage core adapter list
esxcli storage adapter list

Question 52

In ESXi, which of these commands would effectively enable jumbo frames on vSwitch0?

esxcfg-vswitch --device vSwitch0 --mtu 9000


esxcfg-vswitch --mtu 9000 vSwitch0
esxcfg-vswitch --vSwitch0 --jumbo
esxcfg-vswitch --enable jumboframes vSwitch0

Question 53

In ESXi, which of the following tools would you use to convert an RDM to a flat VMDK file?

vmkfstools
vmdktools
vmkfs-convert
vmkfs-rdm-convert

Question 54

In a Hyper-V cluster, what is the purpose of a File Share Witness?

It is required in addition to a Witness Disk for quorum


Independent ’tie-breaker’ to establish quorum
It is the centralised configuration path for clustered nodes
Location of a ‘cluster-lock’ file for quorum
Question 55

In Hyper-V, which of these commands would migrate VM01 within a cluster?

move-vm -name VM01 -node MN01 -migrationtype quick


move-vm -name VM01 -node MN01 -migrationtype quick
move-clustervirtualmachinerole -vm VM01 -host MN01 -migration quick
move-clustervirtualmachinerole -name VM01 -node MN01 -migrationtype quick

When you're done, click finish. You can't go back and try again though!

Finish

© 2019 IT Lab Ltd

S-ar putea să vă placă și