https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos
1. Which terminology is being described below?
A ___ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest
a. two-way, incoming, shortcut
b. one-way, outgoing, shortcut
c. two-way, incoming, forest
d. one-way, outgoing, forest
2. Which terminology is being described below?
Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The ___ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests
Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The ___ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests
a. Network Services Shell (Netsh)
b. Windows Time service
(W32time)
c. Listsvc
d. Fixmbr
3. You have decided to install Windows Server 2012 by choosing the
Service Core Installation option. If you want to install, configure or
uninstall server roles remotely, what tool would you use?
a. Windows PowerShell
|
b. Any of these
|
c. Server Manager
|
d. Remote Server
Administration Tools (RSAT)
|
4. Virtual Network Manager (available from the Hyper-V Manager
snap-in) offers three types of virtual networks that you can use to define
various networking topologies for virtual machines and the virtualization
server.
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network?
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network?
a. Internal virtual
network
|
b. Private virtual
network
c. External
d. All of the above
|
5. Which of the following features is available when Windows Server
2012 is installed using the GUI option but without the desktop experience feature
installed?
a. Metro-style Start
screen
|
b. Built-in help system
|
c. All of these
|
d. Windows Media
Player
|
6. Server manager is a great tool for managing most of your server
settings and configuration all in one central place. Which one of the following
Server manager Features is used for Storage management, replication and
searching?
a. Dynamic Host
Configuration Server
|
b. Terminal Services
|
c. Domain Name Service
|
d. File Services
|
7. Server manager is a great tool for managing most of your server
settings and configuration all in one central place. Which one of the following
Server manager Features is used for management of Public Key Infrastructure?
a.
Dynamic
Host Configuration Server
|
b.
WINS
Server
|
c.
Domain
Name Service
|
d. Active Directory Certificate Services
|
8. Your IT manager is concerned that someone is trying to gain access
to your company's computers by logging on with valid domain user names and
various password attempts. Which audit policy should you monitor for these
activities?
a. Policy Change
|
b. Account Logon
|
c. Privilege Use
|
d. Directory Service
Access
|
|
9. Which terminology is being described below:
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
a. Quick Trust
|
b. Simple Trust
|
c. Easy Trust
|
d.
Shortcut Trust
|
10.
Is the following statement about
Hyper-V true or false?
Hyper-V does not support wireless networks
Hyper-V does not support wireless networks
a.
True
|
b. False
|
11.
When you install Windows Server 2012,
you can choose between Server Core Installation and Server with a GUI..
Which option would reduce the potential attack surface and servicing requirements?
Which option would reduce the potential attack surface and servicing requirements?
a. Server Core Installation
|
b. Server with a GUI
c. Itanium based
d. None of the above
|
12.
Managing Group Policy objects is a
tiresome task. Which of the following Windows Server 2012 features could you
use to save time when creating GPO’s with similar settings?
a. UAC
|
b. PXE boot
|
c. IFM
|
d.
Starter GPO
|
13.
RODC comes with a number of features
that focus on heightened security with limited functionality to remote office
users. Which of the following are features of RODC?
a. Filtered Attribute
Sets
|
b. All of these
|
c. Read-only DNS
|
d. Unidirectional
Replication
|
14.
In Windows Server 2012, you can remove
the Server Graphical Shell, resulting in the “Minimal Server Interface.” This
is similar to a Server with a GUI installation except that some features are
not installed.
Which of the following features is not installed in this scenario?
Which of the following features is not installed in this scenario?
a. MMC
|
b. Windows Explorer
|
c. Control Panel
(subset)
|
d. Server Manager
|
15.
You have just finished installing
Windows Server 2012 on a new server. Your colleague has informed you that its
essential that you must activate Windows Server. Which of the following command
line tools can be used to Activate Windows Server?
a. Cscript C:\windows\system32\slmgr.vbs
–ato
|
b. Netdom
C:\windows\system32\slmgr.vbs –ato
|
c. Ocsetup
C:\windows\system32\slmgr.vbs –ato
|
d. Netsh
C:\windows\system32\slmgr.vbs –ato
16.
An
IPv4 address consists of _______ bits.
a. 4
b. 8
c. 32
d. 64
17.
The
number of addresses in a class C block is?
a. 10000
b. 12000
c. 256
d. 100
18.
Loopback
address in IPV6?
a. 00:11
b. ::1
c. 1
d. 127.0.0.1
19.
Which
of the following data center type provide maximum uptime?
a. Tier0
b. Tier1
c. Tier2
d. Tier4
20.
Which
RAID types use parity for data protection?
a. RAID 11 b. RAID 0 c. RAID 12 d. RAID 5
21.
What
is the minimum number of disks required for RAID1?
a. 1 b. 2 c. 4 d. 5
22.
Which
statement(s) about IPv6 addresses are true?
a.
Leading
zeroes are required
b.
Two colons (::) are used to represent successive
hexadecimal fields of zeros.
c.
Two
colons (::) are used to separate fields.
d.
None
of the above
23.
Which
file system provides you quota and security?
a.
NTFS
b. FST
c. FAT
d. FAT32
24.
DHCP
(dynamic host configuration protocol) provides _____ to the client.
a) IP address b) MAC address c) url d) none of the mentioned
25.
DHCP
is used for
a) IPv6 b) IPv4 c) both (a) and (b) d) none of the mentioned
26.
Which
of the following server is required to resolve Server name into IP and
vice-versa?
a. WDS
b. DNS
c. FTP
d. IP SERVER
27.
Which
of the following disc type will be used for 10TB HDD drive?
a. MBR
b.
GPT
c. SSD
d. SCSI
28.
What
must be installed before you install the DFS service on a server to create a
domain based DFS namespace?
A.
WSUS
B.
File Services
C.
WSRM
D.
WDS
29.
Which
of the following local groups is added on a file server to enable a user at a
remote site to take manual backups of a file server once a week to a
removable USB 2.0 device, that will be then transported by courier to your
organization’s head office location?
A.
Remote Desktop Users
B.
Administrators
C.
Backup Operators
D.
Power Users
30.
Mukesh
works in a company that has an AD DS forest that consists of a forest root
domain plus five domains. He should create a group that contains 70 users who
require access to resources in all six domains. All the user accounts are
located in the forest root domain. Which of the following group scope he
should use?
A. Universal
B. Domain local
C. Local
D. Global
31.
Logical components of Active Directory Domain
Services (AD DS) :
a)
Domain controllers
b)
Read‑only domain controllers (RODC)
c)
Domains
d)
folder
32.
What is FSMO :
a)
Flexible
single master operations .
b)
Flexible single master output .
c)
Flexible source master operation.
d)
None.
33.
Worm is program or algorithm that :
a)
Replicates
itself automatically.
b)
Does not replicate itself.
c)
Does not infect computer programs.
d)
All
34.
Application
that monitor activity with express permission :
a)
Spyware
b)
Adware
c)
Malware
d)
Spam
35.
Outgoing mail server
:
a)
SMTP
b)
POP3
c)
IMAP
d)
All
36.
Incoming mail servers are (choose two) :
a)
SMTP
b)
POP3
c)
IMAP
d)
exchange
37.
What is FQDN
a)
The DNS Tree structure.
b)
Active Directory replication method.
c)
The complete
domain name.
d)
DNS servers outside of that network.
38.
Forward Lookup Zones:
a)
Resolves
names to IP addresses
b)
Resolves IP Addresses into name
c)
None
d)
All
39.
A firewall is :
a)
The firewall is resistant to attacks
b)
The firewall is the only transit point between
networks
c)
The firewall enforces the access control policy
d)
All
40.
A Proxy Server is a computer program that :
a)
acts as an intermediary between a web browser and a
web server
b)
To give users rapid access to popular web
destinations
c)
to store frequently requested pages
d)
All
41.
IPv4 Minimum packet size:
a)
576 bytes
b)
1280 bytes
c)
1024 bytes
d)
None
42.
IPv6 Allocate __ bits for internal subnetting :
a)
45
b)
48
c)
16
d)
64
43.
In RODC the changes to Active Directory objects are
a)
Possible
b)
Not possible
44.
The data link layer consists of two sub-layers which
are (choose2):
a)
Media Access
Control (MAC)
b)
Logical Link
Control (LLC)
c)
Transmission Control Protocol (TCP)
d)
User Datagram Protocol (UDP)
45.
Ethernet (IEEE 802.3) and Wireless networks (IEEE
802.11) are the commonly used ___ technologies
a)
LAN
b)
WAN
c)
MAN
d)
None
46.
A dynamic disk does not have a partition table
a)
True
b)
False
47.
You cannot convert Dynamic back to basic without
erasing all the data
a)
True
b)
False
48.
POST is used for testing, identifying, initialising the RAM, CPU, DMA controllers,
and various components of the chipset.
a)
True
b)
False
49.
User limit in Windows Server 2012 Essentials
Edition :
a)
25
b)
15
c)
30
d)
0
50.
Windows Server 2012 Foundation Edition supports
Active Directory Certificate Services
a)
True
b)
False
|