https://www.youtube.com/channel/UCQECTKWf3phX5McZIyPM0Mw/videos
8. Your IT manager is concerned that someone is trying to gain access to your company's computers by logging on with valid domain user names and various password attempts. Which audit policy should you monitor for these activities?
1.
Which terminology is being described below?
A ___ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest
A ___ trust allows resources in your domain (the domain that you are logged on to at the time that you run the New Trust Wizard) to be accessed more quickly by users in another domain (which is nested within another domain tree) in your forest
a.
two-way, incoming,
shortcut
b.
one-way, outgoing, shortcut
c.
two-way, incoming,
forest
d.
one-way, outgoing,
forest
2.
Which terminology is
being described below?
Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The ___ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests
Time synchronization is critical for the proper operation of many Windows services and line-of-business applications. The ___ uses the Network Time Protocol (NTP) to synchronize computer clocks on the network so that an accurate clock value, or time stamp, can be assigned to network validation requests and resource access requests
a.
Network Services Shell
(Netsh)
b.
Windows Time service (W32time)
c.
Listsvc
d.
Fixmbr
3. You have decided to install Windows Server 2012
by choosing the Service Core Installation option. If you want to install,
configure or uninstall server roles remotely, what tool would you use?
a.
Windows
PowerShell
|
b.
Any of these
|
c.
Server
Manager
|
d.
Remote
Server Administration Tools (RSAT)
|
4. Virtual Network Manager (available from the
Hyper-V Manager snap-in) offers three types of virtual networks that you can
use to define various networking topologies for virtual machines and the
virtualization server.
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network.
Which type of virtual network is isolated from all external network traffic on the virtualization server, as well any network traffic between the management operating system and the external network.
a.
Internal
virtual network
|
b.
Private
virtual network
c.
External
d.
All of
the above
|
5. Which of the following features is available
when Windows Server 2012 is installed using the GUI option but without the
desktop experience feature installed?
a.
Metro-style
Start screen
|
b.
Built-in help system
|
c.
All of
these
|
d.
Windows
Media Player
|
6. Server manager is a great tool for managing most
of your server settings and configuration all in one central place. Which one
of the following Server manager Features is used for Storage management,
replication and searching?
a.
Dynamic
Host Configuration Server
|
b.
Terminal
Services
|
c.
Domain
Name Service
|
d.
File Services
|
7. Server manager is a great tool for managing most
of your server settings and configuration all in one central place. Which one
of the following Server manager Features is used for management of Public Key
Infrastructure?
a.
Dynamic
Host Configuration Server
|
b.
WINS
Server
|
c.
Domain
Name Service
|
d. Active
Directory Certificate Services
|
8. Your IT manager is concerned that someone is trying to gain access to your company's computers by logging on with valid domain user names and various password attempts. Which audit policy should you monitor for these activities?
a.
Policy
Change
|
b.
Account Logon
|
c.
Privilege
Use
|
d.
Directory
Service Access
|
|
9. Which terminology is being described below:
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
This trust is a manually created trust that shortens the trust path to improve the speed at which authentications, which occur between domain trees, are processed
a.
Quick
Trust
|
b.
Simple
Trust
|
c.
Easy
Trust
|
d.
Shortcut Trust
|
10. Is the following statement about Hyper-V true or
false?
Hyper-V does not support wireless networks
Hyper-V does not support wireless networks
a.
True
|
b.
False
c.
sometime
|
11. When you install Windows Server 2012, you can
choose between Server Core Installation and Server with a GUI..
Which option would reduce the potential attack surface and servicing requirements?
Which option would reduce the potential attack surface and servicing requirements?
a.
Server
Core Installation
|
b.
Server
with a GUI
c.
Itanium
based
d.
None of
the above
|
12. Managing Group Policy objects is a tiresome
task. Which of the following Windows Server 2012 features could you use to save
time when creating GPO’s with similar settings?
a.
UAC
|
b.
PXE boot
|
c.
IFM
|
d.
Starter GPO
|
13. RODC comes with a number of features that focus
on heightened security with limited functionality to remote office users. Which
of the following are features of RODC?
a.
Filtered
Attribute Sets
|
b.
All of these
|
c.
Read-only
DNS
|
d.
Unidirectional
Replication
|
14. In Windows Server 2012, you can remove the
Server Graphical Shell, resulting in the “Minimal Server Interface.” This is similar
to a Server with a GUI installation except that some features are not
installed.
Which of the following features is not installed in this scenario?
Which of the following features is not installed in this scenario?
a.
MMC
|
b.
Windows Explorer
|
c.
Control
Panel (subset)
|
d.
Server
Manager
|
15. You have just finished installing Windows Server
2012 on a new server. Your colleague has informed you that its essential that
you must activate Windows Server. Which of the following command line tools can
be used to Activate Windows Server?
a.
Cscript C:\windows\system32\slmgr.vbs –ato
|
b.
Netdom
C:\windows\system32\slmgr.vbs –ato
|
c.
Ocsetup
C:\windows\system32\slmgr.vbs –ato
|
d.
Netsh
C:\windows\system32\slmgr.vbs –ato
16. An IPv4 address consists of _______ bits.
a.
4
b.
8
c.
32
d.
64
17.
The number
of addresses in a class C block is ?
a.
10000
b.
12000
c.
256
d.
100
18. Loopback address in IPV6?
a.
00:11
b.
::1
c.
1
d.
127.0.0.1
19. Which of the following data center type provide maximum
uptime?
a.
Tier0
b.
Tier1
c.
Tier2
d.
Tier4
20. Which two RAID types use parity for data protection?
a. RAID 1 b. RAID 2 c. RAID 3 d. RAID 5
21. What is the minimum number of disks required for RAID1?
a. 1 b. 2 c. 4 d. 5
22. Which statement(s) about IPv6 addresses are true?
a.
Leading
zeroes are requited
b. Two
colons (::) are used to represent successive hexadecimal fields of zeros.
c.
Two
colons (::) are used to separate fields.
d.
None of
the above
23. Which file system provides you quota and security?
a.
NTFS
b.
FST
c.
FAT
d.
FAT32
24. DHCP (dynamic host configuration protocol) provides _____
to the client.
a) IP address b) MAC address c) url d) none of the mentioned
25. DHCP is used for
a) IPv6 b) IPv4 c) both (a) and (b) d) none of the mentioned
26. Which of the following server is require to resolve server
name into ip and vice-versa?
a.
WDS
b.
DNS
c.
FTP
d.
IP
SERVER
27. Which of the following disc type will be used for 10TB HDD
drive?
a.
MBR
b.
GPT
c.
SSD
d.
SCSI
28. What must be installed before you install the DFS service
on a server to create a domain based DFS namespace?
A.
WSUS
B.
File Services
C.
WSRM
D.
WDS
29. Which of the following local groups is added on a file
server to enable a user at a remote site to take manual backups of a file
server once a week to a removable USB 2.0 device, that will be then
transported by courier to your organization’s head office location?
A.
Remote Desktop Users
B.
Administrators
C.
Backup Operators
D.
Power Users
30. Mukesh works in a company that has an AD DS forest that
consists of a forest root domain plus five domains. He should create a group
that contains 70 users who require access to resources in all six domains.
All the user accounts are located in the forest root domain. Which of the
following group scope he should use?
A.
Universal
B.
Domain local
C.
Local
D. Global
31. IIS stands for?
a.
Internet
Information Services
b.
International
internet service
c.
Inter information service
d.
Information
internet server
32.
|
|
nice question bank for window server
ReplyDelete