You are on page 1of 85

secWhich of the following statements are true about group nesting?

03/11/2017 – by Mod_GuideK 0
Which of the following statements are true about group nesting? Each correct answer represents a complete
solution. Choose all that apply.
A. Windows allows group nesting is where an administrator can place a group as a member of another
group.
B. While nesting, an administrator should always keep in mind that the level of nesting should be
maximized, as this will minimize the permission structure.
C. It is the process of nesting a group within other groups.
D. The main advantage of group nesting is that it requires less work when assigning privileges and
permissions.

HIDE ANSWERS
Correct Answer: ACD

Which of the following will you use to accomplish the task?


03/11/2017 – by Mod_GuideK 0
You work as a System Administrator for company Inc. You have to set up five servers and ten workstations
per specification. Your organization uses Windows Deployment Services whenever a new workstation or
server is set up. You want to automate the installations with as little human interaction as possible. Which of
the following will you use to accomplish the task?
A. ImageX
B. System Preparation Tool 3.14
C. Setup Manager
D. Windows System Image Manager

HIDE ANSWERS
Correct Answer: D

Which of the following tabs will John use to identify the program which uses
most of the CPU time?
03/11/2017 – by Mod_GuideK 0
John works as a Consumer Support Technician for Web Tech Inc. The company provides troubleshooting
support to users. A user named Peter is working with Windows Vista. He reports that when he installs a new
application on his computer, Windows Task Manager displays that the CPU use is constantly at 100 percent.
However, when he checks the desktop and Task Manager, he finds that no program is currently open. Which of
the following tabs will John use to identify the program which uses most of the CPU time?
A. Performance tab
B. Networking tab
C. Applications tab
D. Processes tab

HIDE ANSWERS
Correct Answer: D
Which of the following statements are true about Distributed File System
Replication (DFSR)?
03/11/2017 – by Mod_GuideK 0
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network
environment. The network is configured as a Windows Active Directory-based single forest single domain
network. You use Distributed File System Replication (DFSR) to replicate SYSVOL. Which of the following
statements are true about Distributed File System Replication (DFSR)? Each correct answer represents a
complete solution. Choose all that apply.
A. It makes use of a staging folder for staging the file before the file is send or received.
B. It can detect insertions, removals, and rearrangement of data in files.
C. It is considered a statebased, multimaster replication engine that is used in replication scheduling and
bandwidth throttling.
D. It replicates the entire file when a file is changed.

HIDE ANSWERS
Correct Answer: ABC

Which of the following server roles will you define?


03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. While designing Windows Server 2008 R2 for your
organization, you need to define a server role that allows a user to run more than one operating system
simultaneously. Which of the following server roles will you define?
A. Windows Deployment Services
B. Active Directory Rights Management Services
C. Active Directory Federation Services
D. Windows Server Virtualization

HIDE ANSWERS
Correct Answer: D

How will you accomplish this?


03/11/2017 – by Mod_GuideK 0
You work as a Network Administrator for McNeil Inc. You have a Windows 2000 Professional computer. You
install Windows XP Professional on this computer and configure it for dual-boot. After configuring the
computer successfully, you take a full backup using the NTBACKUP.EXE utility and create a new Emergency
Repair Disk (ERD). Accidentally, you delete the BOOT.INI file from your computer. When you restart the
computer, you receive an error message and the computer stops responding. You want to restore the computer
to its previous state with the least amount of effort. How will you accomplish this?
A. Use ERD to create a new BOOT.INI.
B. Format the hard disk using FAT32 file system.
Reinstall Windows 2000 Professional.
Reinstall Windows XP Professional.
C. Go to Recovery Console.
Copy the BOOT.INI file from a Windows XP Professional installation CD-ROM.
D. Go to Recovery Console.
Copy the BOOT.INI file from a Windows 2000 Professional installation CD-ROM.
HIDE ANSWERS
Correct Answer: A

What are the advantages of Dfs?


03/11/2017 – by Mod_GuideK 0
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 R2
domain-based network. The network consists of Windows Server 2008 R2 member servers and Windows 7,
and Windows Vista client computers. The company has distributed network shares. All shares are distributed
over numerous servers, due to which employees face problems in accessing shares from different locations. To
resolve this issue, Mark implements Distributed file system (Dfs). What are the advantages of Dfs? Each
correct answer represents a complete solution. Choose two.
A. It improves system performance.
B. It provides faster data recovery.
C. It provides availability of the network files and folders.
D. It provides server load sharing.

HIDE ANSWERS
Correct Answer: CD

Which of the following methods will you use to automate the deployment of
Windows Server 2008 R2 and NLB cluster hosts?
03/11/2017 – by Mod_GuideK 0
Which of the following methods will you use to automate the deployment of Windows Server 2008 R2 and
NLB cluster hosts? Each correct answer represents a complete solution. Choose three.
A. Windows SIM
B. Windows DS
C. Sysprep
D. Unattended installation

HIDE ANSWERS
Correct Answer: BCD

Which of the following boot.ini parameters will you use to accomplish the
task?
03/11/2017 – by Mod_GuideK 0
You are working on a system with Windows Server 2008 R2 installed on it. You want to enable Data
Execution Prevention, which is a set of hardware and software technologies for preventing harmful code from
running in protected memory locations. Which of the following boot.ini parameters will you use to accomplish
the task?
A. /pae
B. /noexecute
C. /3GB
D. /fastdetect

HIDE ANSWERS
Correct Answer: B
What are the changes to DFS Namespaces available with Windows Server
2008 Release 2?
03/11/2017 – by Mod_GuideK 0
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2008 domain-based
network. Mark has recently installed Windows Server 2008 R2 on a computer. He wants to implement
Distributed File system on the network using Windows Server 2008 R2. What are the changes to DFS
Namespaces available with Windows Server 2008 Release 2? Each correct answer represents a complete
solution. Choose three.
A. Performance improvements for large namespaces
B. Performance counters
C. DFS management support for enabling access-based enumeration
D. Failover cluster support

HIDE ANSWERS
Correct Answer: ABC

Which of the following will you deploy to accomplish the task?


03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has an Active Directory Domain Services
(ADDS) domain. All servers of the company run Windows Server 2008 R2 and all client side computers run
Windows 7. You want to facilitate authorized remote users to connect to resources on an internal network from
any Internet-connected device that is used to run the Remote Desktop Connection (RDC) client. Which of the
following will you deploy to accomplish the task?
A. RD Connection Broker
B. RD Licensing
C. RD Web Access
D. RD Gateway

HIDE ANSWERS
Correct Answer: D

Which of the following statements are true about the Information Technology
Infrastructure Library?
03/11/2017 – by Mod_GuideK 0
Which of the following statements are true about the Information Technology Infrastructure Library? Each
correct answer represents a complete solution. Choose all that apply.
A. It illustrates organization-specific tasks and checklists that are used by an organization for
establishing a maximum level of competency.
B. It mainly focuses on aligning IT services with the needs of business.
C. It is a set of good practices for IT service management (ITSM)
D. It is used to demonstrate compliance and to measure improvement.

HIDE ANSWERS
Correct Answer: BCD
Which of the following server roles will you configure on the server used in
your organization?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows-based network
environment with client computers running Windows 7 and a Windows Server 2008 server. The company uses
an order-processing application that accesses customer records stored in a database. The application accesses
customer information through a set of WCF Web services. Which of the following server roles will you
configure on the server used in your organization?
A. Windows Server Virtualization
B. Network Policy and Access Services
C. Application Server
D. DHCP Server

Which of the following alerts gets generated when any server or client
computer in the network has low disk space, which is less than 10% available
across all volumes?
03/11/2017 – by Mod_GuideK 0
Which of the following alerts gets generated when any server or client computer in the network has low disk
space, which is less than 10% available across all volumes?
A. Network Services Alerts
B. Server Event Log Alerts
C. User Performance Alerts
D. Performance Counter Alerts

HIDE ANSWERS
Correct Answer: D

Which of the following is a web server application and set of feature


extension modules created by Microsoft for use with Microsoft Windows?
03/11/2017 – by Mod_GuideK 0
Which of the following is a web server application and set of feature extension modules created by Microsoft
for use with Microsoft Windows?
A. Secure Sockets Layer
B. File Transfer Protocol
C. Internet Information Services
D. World Wide Web

HIDE ANSWERS
Correct Answer: C

Which of the following statements are true about the graphics card?
03/11/2017 – by Mod_GuideK 0
Which of the following statements are true about the graphics card? Each correct answer represents a complete
solution. Choose all that apply.
A. It is used to virtualize the desktop environment delivering enterprise-class control and to increase the
manageability.
B. It contains a graphics processor, a memory chip for graphics operations, and a RAMDAC to show the
output.
C. It is defined as a vital performance component of the computer used to play 3D games or to work
with graphics and video content.
D. It is used to calculate the image appearance and render it to the screen.

HIDE ANSWERS
Correct Answer: BCD

Which of the following computers should you install WDS?


03/11/2017 – by Mod_GuideK 0
You work as Desktop Support Technician in company Inc. You are planning to deploy a Windows 7 Image to
a computer. You want to deploy the image using WDS. On which of the following computers should you
install WDS? Each correct answer represents a complete solution. Choose all that apply.
A. Windows Server 2008
B. Windows Server 2008 R2
C. Windows Vista
D. Windows 7

HIDE ANSWERS
Correct Answer: AB

Which of the following RAID levels will you use to implement a RAID
system for providing fault tolerance to a database?
03/11/2017 – by Mod_GuideK 0
Which of the following RAID levels will you use to implement a RAID system for providing fault tolerance to
a database?
A. RAID 1
B. RAID 10
C. RAID 5
D. RAID 0

HIDE ANSWERS
Correct Answer: B
Explanation/Reference:
RAID 1 (answer A), RAID 10 (answer B) and RAID 5 (Answer C) all provide the required redundancy so all
could be valid answers. RAID 10 offers the best performance though and is commonly used for databases

Which of the following steps will you take to accomplish the task?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. You need to make a computer running Windows Server
2008 a domain controller. Which of the following steps will you take to accomplish the task? Each correct
answer represents a part of the solution. Choose two.
A. Install Active Directory Domain Services.
B. Create an MX resource record.
C. Run the nslookup command.
D. Execute the dcpromo command.

HIDE ANSWERS
Correct Answer: AD

Which of the following protocols do iSCSI fabrics use to provide


discoverability and partitioning of resources?
03/11/2017 – by Mod_GuideK 0
Which of the following protocols do iSCSI fabrics use to provide discoverability and partitioning of resources?
A. SCSI
B. SSL
C. TLS
D. iSNS

HIDE ANSWERS
Correct Answer: D

Which of the following commands will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0
You work as a System Administrator for company Inc. The company has a Windows 2008 Active Directory
network. The company purchases twenty new computers. The management instructs you to deploy Windows
2008 on all the new computers. You install Windows PE on all the computers. You want to set language
settings and initialize a new network. Which of the following commands will you use to accomplish the task?
A. Drvload
B. Oscdimg
C. BCDEdit
D. Wpeutil

HIDE ANSWERS
Correct Answer: D

Which of the following errors refers to this POST beep code?


03/11/2017 – by Mod_GuideK 0
Sandra, an expert computer user, hears five beeps while booting her computer, which has AMI BIOS; and after
that, her computer stops responding. Sandra knows that during the booting process, POST produces different
beep codes for different types of errors. Which of the following errors refers to this POST beep code?
A. Processor failure
B. Display memory error
C. Motherboard timer not operational
D. Cache memory test failed

HIDE ANSWERS
Correct Answer: A
https://www.computerhope.com/beep.htm

Which of the following editions of Windows Server 2008 R2 can act as a


member of a DFS Replication group?
03/11/2017 – by Mod_GuideK 0
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2008 domain-based
network. The network contains five Windows Server 2008 servers and 200 Windows 7 client computers. Mark
has implemented Distributed File System on the network. The network also contains Windows Server 2008 R2
namespace servers. Mark wants to configure DFS Replication group on Windows Server 2008 R2 computers.
Which of the following editions of Windows Server 2008 R2 can act as a member of a DFS Replication
group? Each correct answer represents a complete solution. Choose all that apply.
A. Windows Server 2008 R2 Standard
B. Windows Server 2008 R2 Datacenter
C. Windows Server 2008 R2 Enterprise
D. Windows Server 2008 R2 for Itanium-Based System

HIDE ANSWERS
Correct Answer: ABC

What will you do?


03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows Active Directory-based
multiple domain single forest network. The functional level of the forest is Windows Server 2008 R2. You
want to allow some groups to take more control of their local network resources by delegating administrative
control to a level of a domain tree. What will you do? Each correct answer represents a part of the solution.
Choose two.
A. Configure the Demilitarized zone (DMZ).
B. Create organizational units within a domain.
C. Provide administrative privileges to particular groups.
D. Delegate administrative control for specific organizational units to particular groups.

HIDE ANSWERS
Correct Answer: BD

Which of the following tools will you use to quickly diagnose potential
causes of instability of your system so that you can apply updates in a
targeted manner, rather than attempting a reconfiguration after the occurrence
of unexpected changes in system behavior?
03/11/2017 – by Mod_GuideK 0
Which of the following tools will you use to quickly diagnose potential causes of instability of your system so
that you can apply updates in a targeted manner, rather than attempting a reconfiguration after the occurrence
of unexpected changes in system behavior?
A. Server Manager
B. Task Manager
C. Windows Server Update Services
D. Windows Reliability and Performance Monitor

HIDE ANSWERS
Correct Answer: D

Which of the following characteristics does the universal group have?


03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows Active Directory-based
single domain single forest network. The functional level of the forest is Windows Server 2008 R2. You are
planning to create groups for assigning permissions. Which of the following characteristics does the universal
group have? Each correct answer represents a complete solution. Choose all that apply.
A. It consists of global groups from multiple domains.
B. Members can only come from the local domain.
C. It has its memberships listed in the global catalog database.
D. Its members can access resources only from the local domain.

HIDE ANSWERS
Correct Answer: AC

Which of the following administrative tools will you use to set up recovery
actions that take place when a service fails and to create custom names and
descriptions for services so that they can be easily identified?
03/11/2017 – by Mod_GuideK 0
Which of the following administrative tools will you use to set up recovery actions that take place when a
service fails and to create custom names and descriptions for services so that they can be easily identified?
A. Component Services
B. Services
C. Computer Management
D. System Configuration

HIDE ANSWERS
Correct Answer: B

Which of the following files does the virtual machine use in Hyper-V?
03/11/2017 – by Mod_GuideK 0
You work as a System Administrator for company Inc. The company has a Windows Server 2008 network
environment. All client computers run Windows 7 Ultimate and all servers run Windows Server 2008 R2. You
have configured a computer for virtualization using Hyper-V. Which of the following files does the virtual
machine use in Hyper-V? Each correct answer represents a complete solution. Choose all that apply.
A. .vsv
B. .vhd
C. .vcv
D. .vmc

HIDE ANSWERS
Correct Answer: AB
Explanation/Reference:
.vmc is used by MS Virtual PC not Hyper-V

Which of the following is the disaster recovery site option that provides the
least expensive disaster recovery solution?
03/11/2017 – by Mod_GuideK 0
Which of the following is the disaster recovery site option that provides the least expensive disaster recovery
solution?
A. Hot site
B. Cold site
C. Strong site
D. Warm site

HIDE ANSWERS
Correct Answer: B

Which of the following are the reasons for defining an OU?


03/11/2017 – by Mod_GuideK 0
You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 Active
Directory-based network. The company has three departments named Sales, Purchase, and Marketing. You are
required to create organizational units (OU) structure for each department in the network. Which of the
following are the reasons for defining an OU? Each correct answer represents a complete solution. Choose all
that apply.
A. To delegate administration.
B. To administer domain controllers.
C. To hide objects.
D. To administer group policy.

HIDE ANSWERS
Correct Answer: ACD

Which of the following tools will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows Server 2008 R2 network
environment. All client computers on the network run the Windows 7 Ultimate operating system. All servers
of the company run Windows Server 2008 R2. You want to create a VHD file on Windows Server 2008 R2 in
order to specify a virtual machine hard disk. Which of the following tools will you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
A. DiskPart
B. Disk Management MMC snap-in
C. FDISK
D. BCDEdit

HIDE ANSWERS
Correct Answer: AB
How will you select file shares for effective protection in this scenario?
03/11/2017 – by Mod_GuideK 0
You work as a System Administrator in SunInfo Inc. The company uses System Center Data Protection
Manager 2007 for data protection. You want to protect data that is part of a Distributed File System (DFS)
namespace hierarchy. How will you select file shares for effective protection in this scenario?
A. By their server-specific local paths.
B. Through DNS namespace.
C. Through DFS namespace paths.
D. By selecting multiple targets.

HIDE ANSWERS
Correct Answer: A

Which of the following are the types of disk partitioning styles supported by
Windows Server 2008?
03/11/2017 – by Mod_GuideK 0
Which of the following are the types of disk partitioning styles supported by Windows Server 2008? Each
correct answer represents a complete solution. Choose two.
A. Interactive Partition
B. Master Boot Record
C. GUID Partition Table
D. Server Core Partition

HIDE ANSWERS
Correct Answer: BC

Which of these system resources do not involve the processor?


03/11/2017 – by Mod_GuideK 0
As part of the configuration process, Windows assigns a number of system resources to the device being
installed to ensure that the device operates simultaneously with the other expansion cards. Which of these
system resources do not involve the processor?
A. Input/output (I/O) port addresses
B. Direct memory access (DMA) channels
C. Memory address ranges
D. Interrupt request (IRQ) line numbers

HIDE ANSWERS
Correct Answer: B

What is the data transfer rate of Serial ATA (SATA) interface?


03/11/2017 – by Mod_GuideK 0
What is the data transfer rate of Serial ATA (SATA) interface?
A. 150 to 300 MBps
B. 100 to 200 MBps
C. 400 to 800 MBps
D. 50 to 100 MBps

HIDE ANSWERS
Correct Answer: A

Which of the following tabs of Task Manager is used to show the current
status of programs running on Windows Server 2008 R2?
03/11/2017 – by Mod_GuideK 0
Which of the following tabs of Task Manager is used to show the current status of programs running on
Windows Server 2008 R2?
A. Performance
B. Applications
C. Processes
D. Services

HIDE ANSWERS
Correct Answer: B

Which of the following commands will you execute to accomplish the task?
03/11/2017 – by Mod_GuideK 0
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network
environment. The network is configured as a Windows Active Directory-based single forest network. You
have installed Windows Server 2008 on a computer that already has Windows Server 2003 installed. The
computer will dual-boot with Windows Server 2003. When you boot the server, by default, it boots to
Windows Server 2003. You want the computer to boot to Windows Server 2008 by default. Which of the
following commands will you execute to accomplish the task?
A. BCDEdit /displayorder
B. BootCfg /default
C. BCDEdit /default
D. BootCfg /bootsequence
E. BCDEdit /bootsequence

HIDE ANSWERS
Correct Answer: C
You work as a Server Administrator for company Inc. The company has a Windows-based network
environment. All client computers on the network run Windows 7 Ultimate and all servers run Windows
Server 2008 R2. You want to remove some applications and registry entries of the server. For this, you edit the
registry and restart the system. You find that the system stops responding even before the logon screen
appears. You want to restore the system to its previous configuration. What will you do?
A. Restart the system using the Last Known Good Configuration option.
B. Restart the system using the Repair Your Computer option.
C. Restart the system using the Enable Boot Logging option.
D. Restart the system using the Directory Services Restore Mode option.

HIDE ANSWERS
Correct Answer: A
Which of the following services provide network access over the Internet
using a virtual private network so that a user can access his internal network
resources, such as e-mails and data files?
03/11/2017 – by Mod_GuideK 0
Which of the following services provide network access over the Internet using a virtual private network so
that a user can access his internal network resources, such as e-mails and data files?
A. Remote access services
B. Application services
C. Monitoring services
D. File services

HIDE ANSWERS
Correct Answer: A

Which of the following is a command-line tool that is used to describe the


boot application and boot application settings such as the boot menu?
03/11/2017 – by Mod_GuideK 0
Which of the following is a command-line tool that is used to describe the boot application and boot
application settings such as the boot menu?
A. DrvLoad
B. BootSect
C. BCDBoot
D. BCDEdit

HIDE ANSWERS
Correct Answer: D

Which of the following factors will you use to determine effective


permissions?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows 2008-based Active
Directory network. You are assigning effective permissions to the Tasks folder. Which of the following factors
will you use to determine effective permissions? Each correct answer represents a complete solution. Choose
all that apply.
A. Local privileges
B. Anonymous logon
C. Global group membership
D. Local permissions
E. Enterprise domain controllers

HIDE ANSWERS
Correct Answer: ACD

What will you do?


03/11/2017 – by Mod_GuideK 0
You work as a System Administrator for company Inc. The task of setting up ten servers and twenty
workstations per specification is assigned to you. If you set up each individually, it will take approximately
one week to accomplish the task. You do not want to waste so much time for this. What will you do?
A. Use Windows PowerShell.
B. Use Server Manager.
C. Use Windows Deployment Services.
D. Use Computer Management console.

HIDE ANSWERS
Correct Answer: C

How much free space will you get after configuring the RAID 5 solution?
03/11/2017 – by Mod_GuideK 0
You are configuring a RAID 5 solution on a server running Windows Server 2008 R2. You are using five
750GB hard drives in the RAID array. How much free space will you get after configuring the RAID 5
solution?
A. 2,250
B. 1,500
C. 3,000
D. 3,750

HIDE ANSWERS
Correct Answer: C

Which of the following tools will you use to determine the time and type of
the problem occurred in a particular system?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. You are responsible for troubleshooting various issues
that come in on a day-to-day basis from the local and remote locations. Which of the following tools will you
use to determine the time and type of the problem occurred in a particular system?
A. Task Manager
B. Performance Monitor
C. Event Viewer
D. Resource Monitor

HIDE ANSWERS
Correct Answer: C

Which of the following editions of Windows Server 2008 R2 include


Network Policy Server?
03/11/2017 – by Mod_GuideK 0
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-
based network. Mark wants to implement Network Policy Server as a role service on the Windows Server
2008 R2 computer in the network. Which of the following editions of Windows Server 2008 R2 include
Network Policy Server? Each correct answer represents a complete solution. Choose three.
A. Windows Server 2008 R2 Datacenter
B. Windows Web Server 2008 R2
C. Windows Server 2008 R2 Standard
D. Windows Server 2008 R2 Enterprise

HIDE ANSWERS
Correct Answer: ACD

Which of the following statements are true about application virtualization?


03/11/2017 – by Mod_GuideK 0
Application virtualization is also referred to as application portability or application service virtualization.
Which of the following statements are true about application virtualization? Each correct answer represents a
complete solution. Choose all that apply.
A. It can be defined as a combustion process used for generating the useful byproducts, such as heat,
steam, and electricity.
B. It does not make any changes to the local computer’s operating system (OS), file system, or registry.
C. It allocates computer resources on the basis of changing requirements.
D. It uses dynamic link library (DLL) programs for redirecting all the virtualized application’s calls to
the server’s file system.

HIDE ANSWERS
Correct Answer: BCD

Which of the following steps will you take to accomplish the task?
03/11/2017 – by Mod_GuideK 0
You work as a Server Administrator for company Inc. The company has a Windows 2008 R2 Active
Directory-based single forest network. The functional level of the forest is Windows Server 2008 R2. All client
computers in the network run Windows 7. You want to create a failover cluster in Windows Server 2008 R2 in
order to provide seamless easy-to-deploy high availability for important databases, messaging servers, file and
print services, and virtualized workloads. Which of the following steps will you take to accomplish the task?
Each correct answer represents a part of the solution. Choose three.
A. Validate the hardware configuration.
B. Create a cluster using Failover Cluster Manager.
C. Assign a unique set of IP addresses to each node.
D. Install the Failover Cluster feature.

HIDE ANSWERS
Correct Answer: ABD

What should you do?


03/11/2017 – by Mod_GuideK 0
You need to centralize management of network printers. You also need to enable users to choose a printer
based on location. What should you do?
A. Create multiple print servers
B. Publish the printers in Active Directory
C. Set up Web printing
D. Create a printer pool

HIDE ANSWERS
Correct Answer: B

Which of the following actions will you take to accomplish the task?
03/11/2017 – by Mod_GuideK 0

You have a desktop computer that runs Windows Vista Ultimate. Windows Update is configured as shown in
the image below:

Windows Update is prompting you that an optional update is available. However, you do not want to install
this update. When you view Windows Update, you get the following message:

You are required to configure Windows Update in such a manner that it does not notify you every now and
then about its optional update. Which of the following actions will you take to accomplish the task?
A. In the Windows Update configuration, select the Never check for updates option.
B. Delete the optional update.
C. Hide the optional update.
D. In the Windows Update configuration, select the Check for updates but let me choose whether to
download and install them.

HIDE ANSWERS
Correct Answer: C

Which of the following steps will you take to remove that update from her
computer?
03/11/2017 – by Mod_GuideK 0

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network
environment. The network is configured as a Windows Active Directory-based single forest single domain
network. All client computers run Windows Vista Ultimate. Martha, a Sales Manager, needs your help. She
has installed a Windows update recently. After installing the update, she finds that the performance of her
laptop has deteriorated. She has rebooted her laptop twice, but the performance issue is still there. Which of the
following steps will you take to remove that update from her computer?
A. Restart her computer by using the Last Known Good Configuration option.
B. Remove the update from the Control Panel > Add or Remove Program.
C. Use the Device Manager utility to remove the update.
D. Uninstall the update from the Installed Updates list.

HIDE ANSWERS

Correct Answer: D

Which of the following methods will John use to provide these facilities to
his company?
03/11/2017 – by Mod_GuideK 0

John works as a Voice Technologies Administrator at company.com. His company wants a phone system that
can work with a single uninterrupted power supply (UPS) instead of placing a UPS at the location of each IP
phone. The company needs an uninterrupted and centralized power distribution for the IP phones without using
many cords. Which of the following methods will John use to provide these facilities to his company?
A. Supply power the IP phones through an Ethernet cable (PoE).
B. Install an extension board to distribute power.
C. Place the IP phones close to UPS.
D. Install a UPS with extra ports for distribution.

HIDE ANSWERS

Correct Answer: A

Which of the following root keys consists of subkeys corresponding to the


HKEY_CURRENT_USER keys for each user profile actively loaded on the
machine?
03/11/2017 – by Mod_GuideK 0

Which of the following root keys consists of subkeys corresponding to the HKEY_CURRENT_USER keys for
each user profile actively loaded on the machine?
A. HKEY_CURRENT_CONFIG
B. HKEY_USERS
C. HKEY_LOCAL_MACHINE
D. HKEY_CLASSES_ROOT
HIDE ANSWERS

Correct Answer: B

Which of the following tools comprehensively assesses, deploys, and updates


servers, client computers, and devices across the physical, virtual, distributed,
and mobile environments?
03/11/2017 – by Mod_GuideK 0

Which of the following tools comprehensively assesses, deploys, and updates servers, client computers, and
devices across the physical, virtual, distributed, and mobile environments?
A. SCCM
B. DISM
C. SCOM
D. EMS

HIDE ANSWERS

Correct Answer: A

Which of the following will you use to accomplish the task?


03/11/2017 – by Mod_GuideK 0

You are working on a system with Windows Server 2008 R2 installed on it. Many services and applications
automatically start running when you start the system. You want to remove the services and applications that
are not required to run. Which of the following will you use to accomplish the task?
A. Msinfo32.exe
B. Gpresult.exe
C. msconfig.exe
D. gpedit.msc

HIDE ANSWERS

Correct Answer: C

Which of the following tools comprehensively assesses, deploys, and updates


servers, client computers, and devices across the physical, virtual, distributed,
and mobile environments?
03/11/2017 – by Mod_GuideK 0

Which of the following tools comprehensively assesses, deploys, and updates servers, client computers, and
devices across the physical, virtual, distributed, and mobile environments?
A. SCCM
B. DISM
C. SCOM
D. EMS

HIDE ANSWERS
Correct Answer: A

What is this process called?


03/11/2017 – by Mod_GuideK 0

You are the Microsoft Project Server administrator for your company. You have recently upgraded the
hardware of your Microsoft Project Server farm. You and the project managers in your company believe that it
will be much faster. You have now created performance logs to measure the throughput of the new server
configuration to compare to past performance. What is this process called?
A. Performance baseline creation
B. Step funding
C. Before and after snapshot
D. Performance measurement

HIDE ANSWERS

Correct Answer: A

Which of the following statements best describe the benefits of using the
Sysprep tool in Windows Server 2008 R2?
03/11/2017 – by Mod_GuideK 0

Which of the following statements best describe the benefits of using the Sysprep tool in Windows Server
2008 R2? Each correct answer represents a complete solution. Choose three.
A. It configures Windows Server 2008 R2 to boot to Audit mode.
B. It removes system-specific data from Windows Server 2008 R2.
C. It resets Windows Server 2008 R2 Product Activation.
D. It verifies that an unattended answer file actually produces the desired result.

HIDE ANSWERS

Correct Answer: ABC

Which Windows mechanism can be used by 32-bit applications to allocate up


to 64GB of physical memory and to map views into its 2GB virtual address
space?
03/11/2017 – by Mod_GuideK 0

On 32-bit x86 systems, the total virtual address space is of 4GB. By default, Windows allocates half of this
address space to processes for their unique private storage and the other half for its own protected system
memory utilization. Since 2GB is not enough virtual address space to map very large databases, which
Windows mechanism can be used by 32-bit applications to allocate up to 64GB of physical memory and to
map views into its 2GB virtual address space?
A. Tracer
B. Driver signing mechanism
C. Address Windowing Extension
D. Trap dispatching

HIDE ANSWERS
Correct Answer: C

Which of the following tasks can you perform on Windows Server 2008 R2
using the Server Manager console when you log in to the server as an
administrator?
03/11/2017 – by Mod_GuideK 0

Which of the following tasks can you perform on Windows Server 2008 R2 using the Server Manager console
when you log in to the server as an administrator? Each correct answer represents a complete solution. Choose
three.
A. Accelerate automation of system administration tasks.
B. View the Event Viewer logs.
C. Install Windows Server roles and features.
D. Access performance monitoring tools.

HIDE ANSWERS

Correct Answer: BCD

Which of the following types of resource record is generally used with virtual
servers that point to several servers offering network load balancing to
distribute work?
03/11/2017 – by Mod_GuideK 0

Which of the following types of resource record is generally used with virtual servers that point to several
servers offering network load balancing to distribute work?
A. MX
B. SRV
C. SOA
D. CNAME

HIDE ANSWERS

Correct Answer: D
You are using Windows Reliability and Performance Monitor to monitor and assess system performance and
reliability of Windows Server 2008 R2. Windows Reliability and Performance Monitor combines the
functionality of which of the following stand-alone tools? Each correct answer represents a complete solution.
Choose all that apply.
A. Performance Logs and Alerts
B. System Monitor
C. Server Performance Advisor
D. Network Monitor

HIDE ANSWERS

Correct Answer: ABC


Which of the following is an application protocol for querying and modifying
data using directory services running over TCP/IP?
03/11/2017 – by Mod_GuideK 0

Which of the following is an application protocol for querying and modifying data using directory services
running over TCP/IP?
A. Kerberos
B. SNMP
C. UDP
D. LDAP

HIDE ANSWERS

Correct Answer: D

Which of the following file systems centralizes data and can be used to
replicate shared folders to other servers?
03/11/2017 – by Mod_GuideK 0

Which of the following file systems centralizes data and can be used to replicate shared folders to other
servers?
A. ADFS
B. FAT32
C. DFS
D. NTFS

HIDE ANSWERS

Correct Answer: C

Which of the following iSCSICLI commands will you use to accomplish the
task?
03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The Microsoft iSCSI initiator service is deployed in the
organization in order to allow Windows Server 2008 R2 to connect to SCSI devices that are attached to a
network. You want to remove all persistently bound volumes and devices for the iSCSI service. Which of the
following iSCSICLI commands will you use to accomplish the task?
A. iSCSICLI AddPersistentDevices
B. iSCSICLI AddTarget
C. iSCSICLI ClearPersistentDevices
D. iSCSICLI RemovePersistentDevices

HIDE ANSWERS

Correct Answer: C
Which of the following security protocols will you use to encrypt Web
traffic?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. You want all transactions to the storefront on the Web
server to be encrypted. Which of the following security protocols will you use to encrypt Web traffic?
A. L2TP
B. PPTP
C. SSL
D. IPSec

HIDE ANSWERS

Correct Answer: C

What is this process called?


03/11/2017 – by Mod_GuideK 0

You are the Microsoft Project Server administrator for your company. You have recently upgraded the
hardware of your Microsoft Project Server farm. You and the project managers in your company believe that it
will be much faster. You have now created performance logs to measure the throughput of the new server
configuration to compare to past performance. What is this process called?
A. Performance baseline creation
B. Step funding
C. Before and after snapshot
D. Performance measurement

HIDE ANSWERS

Correct Answer: A

Which Windows mechanism can be used by 32-bit applications to allocate up


to 64GB of physical memory and to map views into its 2GB virtual address
space?
03/11/2017 – by Mod_GuideK 0

On 32-bit x86 systems, the total virtual address space is of 4GB. By default, Windows allocates half of this
address space to processes for their unique private storage and the other half for its own protected system
memory utilization. Since 2GB is not enough virtual address space to map very large databases, which
Windows mechanism can be used by 32-bit applications to allocate up to 64GB of physical memory and to
map views into its 2GB virtual address space?
A. Tracer
B. Driver signing mechanism
C. Address Windowing Extension
D. Trap dispatching

HIDE ANSWERS
Correct Answer: C

Which of the following tasks can you perform on Windows Server 2008 R2
using the Server Manager console when you log in to the server as an
administrator?
03/11/2017 – by Mod_GuideK 0

Which of the following tasks can you perform on Windows Server 2008 R2 using the Server Manager console
when you log in to the server as an administrator? Each correct answer represents a complete solution. Choose
three.
A. Accelerate automation of system administration tasks.
B. View the Event Viewer logs.
C. Install Windows Server roles and features.
D. Access performance monitoring tools.

HIDE ANSWERS

Correct Answer: BCD

Which of the following types of resource record is generally used with virtual
servers that point to several servers offering network load balancing to
distribute work?
03/11/2017 – by Mod_GuideK 0

Which of the following types of resource record is generally used with virtual servers that point to several
servers offering network load balancing to distribute work?
A. MX
B. SRV
C. SOA
D. CNAME

HIDE ANSWERS

Correct Answer: D

Which of the following file systems centralizes data and can be used to
replicate shared folders to other servers?
03/11/2017 – by Mod_GuideK 0

Which of the following file systems centralizes data and can be used to replicate shared folders to other
servers?
A. ADFS
B. FAT32
C. DFS
D. NTFS

HIDE ANSWERS
Correct Answer: C

Which of the following is NOT a purpose of using a container?


03/11/2017 – by Mod_GuideK 0

Which of the following is NOT a purpose of using a container?


A. To group tasks as a unit so that if a task fails all other tasks can be rolled back.
B. To run all the tasks at a time until a condition becomes false.
C. To queue up the tasks so that if a task fails, the next task in the queue gets operated.
D. To run each task repeatedly.

HIDE ANSWERS

Correct Answer: C

Which of the following tools will Mark use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 single
Domain-based network. Mark wants to use scripting for managing Windows server roles, backing up and
restoring group policy objects (GPOs), and creating reports for the GPOs. Which of the following tools will
Mark use to accomplish the task?
A. Active Directory Sizer (ADSizer)
B. Windows PowerShell
C. GPUPDATE
D. Group Policy Management Console (GPMC)

HIDE ANSWERS

Correct Answer: B

What should she do after rebooting in safe mode?


03/11/2017 – by Mod_GuideK 0

Sasha installs an ISA sound card on her Windows 2000 Professional system. The driver fails and now the
computer is unable to start. What should she do after rebooting in safe mode?
A. Disable driver signing
B. Remove sound card before booting
C. Enable driver signing
D. Disable the driver

HIDE ANSWERS

Correct Answer: D

What are the two different ways of creating Group Policy Object (GPO) with
the help of Group Policy Management Console (GPMC)?
03/11/2017 – by Mod_GuideK 0
What are the two different ways of creating Group Policy Object (GPO) with the help of Group Policy
Management Console (GPMC)? Each correct answer represents a complete solution. Choose two.
A. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects
node. Right-click the Group Policy Objects node, and click Properties. Change the default name of the
GPO to your desired name, and then click OK.
B. Open the Group Policy Management Console (GPMC) and navigate to the container where you want
to apply the GPO. Right-click the container, and click Create A GPO In This Domain And Link It Here.
C. Open the Group Policy Management Console (GPMC) and navigate to the Domain Controller where
you want to apply the GPO. Right-click the controller, and click Create A GPO In This Domain And
Link It Here.
D. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects
node. Right-click the Group Policy Objects node, and click New. Enter a descriptive name for the new
GPO, and click OK.

HIDE ANSWERS

Correct Answer: BD

Which of the following groups will you create?


03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows Server 2008 Active
Directory-based single domain single forest network. The functional level of the forest is Windows Server
2008. You are planning to create a group that can be used only for non-security functions, such as distributing
e-mail messages. Which of the following groups will you create?
A. Application group
B. User group
C. Distribution group
D. Security group

HIDE ANSWERS

Correct Answer: C

Which of the following modifications will he be able to do in the image?


03/11/2017 – by Mod_GuideK 0

Mark works as a Network Administrator for Net Tech Inc. The company has a Windows Server 2008 domain-
based network. The network contains 3 Windows Server 2008 R2 and 100 Windows 7 client computers. Mark
wants to modify an online image using the DISM tool. Which of the following modifications will he be able to
do in the image? Each correct answer represents a complete solution. Choose two.
A. Change the currently active user interface language.
B. Disable an operating system feature.
C. Add a new device driver to the image.
D. Add a language pack to the image.

HIDE ANSWERS

Correct Answer: BD
Which of the following server roles offers various methods to provide users
with local and remote network connectivity, to connect network segments,
and to permit network administrators to centrally manage network access and
client health policies?
03/11/2017 – by Mod_GuideK 0

Which of the following server roles offers various methods to provide users with local and remote network
connectivity, to connect network segments, and to permit network administrators to centrally manage network
access and client health policies?
A. Active Directory Certificate Services
B. Network Policy and Access Services
C. Web Services
D. Terminal Services

HIDE ANSWERS

Correct Answer: B

Which of the following services allows a user to run specific programs and
tools with diverse permissions than the user’s current logon provides?
03/11/2017 – by Mod_GuideK 0

Which of the following services allows a user to run specific programs and tools with diverse permissions than
the user’s current logon provides?
A. WCF service
B. RunAs service
C. Web service
D. WMI service

HIDE ANSWERS

Correct Answer: B

What will Mark do to restore the RAID-5 volume?


03/11/2017 – by Mod_GuideK 0

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based
network. The network has a file server that uses a RAID-5 volume. The RAID-5 volume is configured with
five hard disk drives. Over the weekend, a drive in the RAID-5 volume fails. What will Mark do to restore the
RAID-5 volume?
A. Replace the failed drive with a new one, use FDISK, select a new area of free space, and then
regenerate the volume.
B. Replace the failed drive with a new one, use Disk Management, select a new area of free space, and
then regenerate the volume.
C. Use Disk Management, select the failed drive, and then regenerate the volume.
D. Use FDISK to delete the RAID-5 volume, and then restore data from the tape backup.

HIDE ANSWERS
Correct Answer: B

Which of the following master roles is used for synchronizing cross-domain


group membership changes?
03/11/2017 – by Mod_GuideK 0

Which of the following master roles is used for synchronizing cross-domain group membership changes?
A. Domain Naming Master role
B. Infrastructure Master role
C. Schema Master role
D. RID Master role

HIDE ANSWERS

Correct Answer: B

Which of the following steps will Adam take to resolve the problem?
03/11/2017 – by Mod_GuideK 0

Adam works as a Desktop Support Technician for Umbrella Inc. The company has a Windows-based network.
All client computers run Windows 7 Ultimate operating system. Andy, Managing Director of the company,
complains that his laptop is consuming battery very rapidly affecting the performance of the system. Adam
inspects his laptop and finds that appropriate power is implemented on the laptop but many USB devices are
attached to it. Which of the following steps will Adam take to resolve the problem?
A. Enable the USB selective suspend option from the Advanced Power Settings.
B. Connect all USB devices in one USB hub and then connect it to the laptop.
C. Ask Andy to disconnect all USB devices.
D. Remove the USB response from the Registry Editor.

HIDE ANSWERS

Correct Answer: A

Which of the following commands will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

You are working on Windows Server 2008. You want to specify the default entry that the boot manager selects
when the timeout expires. Which of the following commands will you use to accomplish the task?
A. /bootsequence
B. /default
C. /copy
D. /displayorder

HIDE ANSWERS

Correct Answer: B
Which of the following hardware devices will you connect to the server in order to resist power outages or
power fluctuations?
A. Hard disk
B. UPS
C. VHD
D. RAM

HIDE ANSWERS

Correct Answer: B

Which of the following built-in groups includes users who can create, delete,
and modify user accounts and groups?
03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows 2008 based network
environment. You have added all users to a different built-in group with specific rights and permissions.
Which of the following built-in groups includes users who can create, delete, and modify user accounts and
groups?
A. Domain Users
B. Authenticated Users
C. Account Operators
D. Backup Operators

HIDE ANSWERS

Correct Answer: C

Which of the following permissions will you apply?


03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows 2008-based Active
Directory network. You are assigning NTFS permissions to the E:Projects folder for the Marketing group. You
want to ensure that the members of the Marketing group can list the contents of the folder and read the data of
files contained in the folder, but none of them can change or delete data from the folder. Which of the
following permissions will you apply?
A. Write
B. Full control
C. Read
D. Modify

HIDE ANSWERS

Correct Answer: C

Which of the following will David use to accomplish the task?


03/11/2017 – by Mod_GuideK 0

David works as a System Administrator for company Inc. The company has a Windows Server 2008 domain-
based network. David uses Microsoft Deployment Toolkit (MDT) 2010 for preparing a deployment. He wants
to mount a virtual hard disk (.vhd) file offline and service it just like a Windows image file. Which of the
following will David use to accomplish the task?
A. Windows Preinstallation Environment (Windows PE)
B. ImageX
C. DiskPart
D. SYSPREP tool

HIDE ANSWERS

Correct Answer: C
Which of the following types of logs contains events such as valid or invalid log on attempts and access to
designated objects such as files, folders, printers, etc.?
A. Application logs
B. System logs
C. Security logs
D. Setup logs

HIDE ANSWERS

Correct Answer: C

Which of the following are functions of self-healing NTFS?


03/11/2017 – by Mod_GuideK 0

You are using self-healing NTFS in Microsoft Windows Server 2008 R2. Which of the following are functions
of self-healing NTFS? Each correct answer represents a complete solution. Choose all that apply.
A. It decreases failed file system mounting requests that occur due to inconsistencies during restart or
for an online volume.
B. It identifies and recovers an NTFS volume.
C. It provides continuous data availability.
D. It allows an authorized user to administer and monitor repair operations.

HIDE ANSWERS

Correct Answer: ACD

Which of the following server roles simplifies the process of deploying


applications that respond to requests sent over the network from remote
applications?
03/11/2017 – by Mod_GuideK 0

Which of the following server roles simplifies the process of deploying applications that respond to requests
sent over the network from remote applications?
A. Windows Server Virtualization
B. Network Policy and Access Services
C. Active Directory Certificate Services
D. Application Server

HIDE ANSWERS

Correct Answer: D
Which of the following server roles offers various methods to provide users
with local and remote network connectivity, to connect network segments,
and to permit network administrators to centrally manage network access and
client health policies?
03/11/2017 – by Mod_GuideK 0

Which of the following server roles offers various methods to provide users with local and remote network
connectivity, to connect network segments, and to permit network administrators to centrally manage network
access and client health policies?
A. Active Directory Certificate Services
B. Network Policy and Access Services
C. Web Services
D. Terminal Services

HIDE ANSWERS

Correct Answer: B

Which of the following are the ways to open the Task Manager utility on a
Windows computer?
03/11/2017 – by Mod_GuideK 0

Which of the following are the ways to open the Task Manager utility on a Windows computer? Each correct
answer represents a complete solution. Choose all that apply.
A. Press Ctrl + Alt + Del
B. Press Ctrl + Alt
C. Press Ctrl + Shift + Esc
D. Click on the Start button, choose Run, and type devmgmt.msc

HIDE ANSWERS

Correct Answer: AC

Which of the following will you configure to update the systems?


03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. Management has asked you to find a way to make sure
that all systems working in the network are updated on a regular basis. Which of the following will you
configure to update the systems?
A. SIM
B. WDS
C. SCOM
D. WSUS

HIDE ANSWERS
Correct Answer: D

Which of the following are the advantages of the NAS device?


03/11/2017 – by Mod_GuideK 0

The network-attached storage (NAS) device is a file server running on a dedicated device connected to the
network. Which of the following are the advantages of the NAS device? Each correct answer represents a
complete solution. Choose all that apply.
A. It enables the Windows, UNIX/Linux, Mac OS, and Novell clients to use the same storage and to
access the shared data.
B. It is easy to install, configure, and manage by using a web browser.
C. It is used when computer systems are retired and disk drives are required to be zeroed out.
D. It permits the addition of more hard disk storage space to a network without shutting them down for
maintenance and upgrades.

HIDE ANSWERS

Correct Answer: ABD

What are the two different ways of creating Group Policy Object (GPO) with
the help of Group Policy Management Console (GPMC)?
03/11/2017 – by Mod_GuideK 0

What are the two different ways of creating Group Policy Object (GPO) with the help of Group Policy
Management Console (GPMC)? Each correct answer represents a complete solution. Choose two.
A. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects
node. Right-click the Group Policy Objects node, and click Properties. Change the default name of the
GPO to your desired name, and then click OK.
B. Open the Group Policy Management Console (GPMC) and navigate to the container where you want
to apply the GPO. Right-click the container, and click Create A GPO In This Domain And Link It Here.
C. Open the Group Policy Management Console (GPMC) and navigate to the Domain Controller where
you want to apply the GPO. Right-click the controller, and click Create A GPO In This Domain And
Link It Here.
D. Open the Group Policy Management Console (GPMC) and navigate to the Group Policy Objects
node. Right-click the Group Policy Objects node, and click New. Enter a descriptive name for the new
GPO, and click OK.

HIDE ANSWERS

Correct Answer: BD

Which of the following RAID levels provides best performance because data
read and data write operations are not limited to a single disk, but to a set of
disks?
03/11/2017 – by Mod_GuideK 0

Which of the following RAID levels provides best performance because data read and data write operations
are not limited to a single disk, but to a set of disks?
A. RAID-1
B. RAID-10
C. RAID-0
D. RAID-3

HIDE ANSWERS

Correct Answer: C

What is the most likely conclusion of why your server went down and is not
powering on?
03/11/2017 – by Mod_GuideK 0

You work as a system administrator for a medium-sized company. You receive a call in the middle of the night
that people cannot access their mails. Your mail server’s name is mymail01. You log into the VMware service
console to see the status of the server and you see a little exclamation point over the virtual machines name.
You click edit settings and click on the hard disk to find out that your mail server is running off of mymail01-
000001.vmdk. What is the most likely conclusion of why your server went down and is not powering on?
A. Your mail server’s .vmdk file that stores system files has been deleted.
B. Your mail server was being updated and received a bad patch.
C. Your mail server did not properly release the snapshot and became unstable.
D. Your mail server was in the middle of a backup and the snapshot used up the rest of the storage space
on the LUN.

HIDE ANSWERS

Correct Answer: D

Which of the following statements are true about a boot sector?


03/11/2017 – by Mod_GuideK 0

Which of the following statements are true about a boot sector? Each correct answer represents a complete
solution. Choose all that apply.
A. It allows the boot process of a computer to load a program stored on the same storage device.
B. It is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains
machine code to be loaded into RAM by a computer system’s built-in firmware.
C. The location and size of the boot sector is specified by the design of the computing platform.
D. If multiple operating systems exist on a computer, it provides the choice of selecting an operating
system.

HIDE ANSWERS

Correct Answer: ABC

Which of the following steps will he take to determine the version of the
BIOS?
03/11/2017 – by Mod_GuideK 0

Andrew purchases a laptop that has the Windows 2000 Professional operating system. He wants to know about
the BIOS version of the computer. Which of the following steps will he take to determine the version of the
BIOS? Each correct answer represents a part of the solution. Choose two.
A. In the System Information window, click the Hardware Resources folder in the left pane.
B. Click the Start menu, choose Programs > Accessories > System Tools > System Information.
C. Click the Start menu, choose Programs > Accessories > Communications > System Information.
D. In the System Information window, click the System Summary folder in the left pane.

HIDE ANSWERS

Correct Answer: BD

Which of the following RAID level combinations makes RAID-10?


03/11/2017 – by Mod_GuideK 0

Which of the following RAID level combinations makes RAID-10? Each correct answer represents a part of
the solution. Choose two.
A. RAID-1
B. RAID-0
C. RAID-2
D. RAID-3

HIDE ANSWERS

Correct Answer: AB

Which of the following protocols will you use with iSCSI Initiator?
03/11/2017 – by Mod_GuideK 0

You have installed iSCSI Initiator to enable block-based storage area networks in the network infrastructure of
your organization. For security reasons, you need to configure authentication protocols in the network. Which
of the following protocols will you use with iSCSI Initiator? Each correct answer represents a complete
solution. Choose two.
A. CHAP
B. IPSec
C. PAP
D. MS-CHAP

HIDE ANSWERS

Correct Answer: AB

Which of the following commands will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows 2008 Active Directory
network. The company purchases twenty new computers. The management instructs you to deploy Windows
2008 on all the new computers. You install Windows PE on all computers. You want to control whether a
customized shell is loaded in Windows PE instead of the default Command Prompt window. Which of the
following commands will you use to accomplish the task?
A. Wpeinit
B. Winpeshl
C. Wpeutil
D. Oscdimg

HIDE ANSWERS

Correct Answer: B

Which of the following statements best describe the features of a network


printer?
03/11/2017 – by Mod_GuideK 0

Which of the following statements best describe the features of a network printer? Each correct answer
represents a complete solution. Choose two.
A. Anyone in the network can use it to print only if the machine to which the printer is connected is
switched on.
B. It is shared by more than one computer.
C. Print jobs can be sent only by the computer that is directly connected to the printer.
D. It is connected directly to a computer.

HIDE ANSWERS

Correct Answer: AB

Which of the following will you use?


03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows 2008 based network
environment. There are thirty client computers running Windows 7 and three servers running Windows Server
2008 R2. You need to implement a system in the network that provides data access to heterogeneous network
clients using SMB/CIFS. Which of the following will you use?
A. Storage area network
B. Failover clustering
C. Datafile striping
D. Network-attached storage

HIDE ANSWERS

Correct Answer: D

Which of the following benefits are provided by IIS?


03/11/2017 – by Mod_GuideK 0

You add Web Server support while installing the Application Server role on a computer running Windows
Server 2008 R2. Web Server support installs IIS (Internet Information Services) on the server. Which of the
following benefits are provided by IIS? Each correct answer represents a complete solution. Choose three.
A. It is used to support ASP.NET applications accessed from a Web browser.
B. It is used to support Web services built with ASP.NET or WCF (Windows Communication
Foundation).
C. It is used to disable Application Server to host external Websites with static or dynamic content.
D. It is used to enable Application Server to host internal Websites with static or dynamic content.
HIDE ANSWERS

Correct Answer: ABD

Which of the following are functions of self-healing NTFS?


03/11/2017 – by Mod_GuideK 0

You are using self-healing NTFS in Microsoft Windows Server 2008 R2. Which of the following are functions
of self-healing NTFS? Each correct answer represents a complete solution. Choose all that apply.
A. It decreases failed file system mounting requests that occur due to inconsistencies during restart or
for an online volume.
B. It identifies and recovers an NTFS volume.
C. It provides continuous data availability.
D. It allows an authorized user to administer and monitor repair operations.

HIDE ANSWERS

Correct Answer: ACD

Which of the following types of logs contains events such as valid or invalid
log on attempts and access to designated objects such as files, folders,
printers, etc.?
03/11/2017 – by Mod_GuideK 0

Which of the following types of logs contains events such as valid or invalid log on attempts and access to
designated objects such as files, folders, printers, etc.?
A. Application logs
B. System logs
C. Security logs
D. Setup logs

HIDE ANSWERS

Correct Answer: C

101Which of the following are the prerequisites for installing the Hyper-V
role?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows 2008 based network
environment. There is a domain controller with Windows Server 2008 R2 installed on it. You want to install
the Hyper-V role for production server consolidation and business continuity management. Which of the
following are the prerequisites for installing the Hyper-V role? Each correct answer represents a complete
solution. Choose all that apply.
A. x32-based processor
B. GUI accelerator
C. Hardware-assisted virtualization
D. Hardware-enforced Data Execution Prevention
E. x64-based processor

HIDE ANSWERS

Correct Answer: CDE

102You want to compare the performance reports that you have created during the initial deployment of
servers. Which of the following applications will you need to launch in order to create a comparison report?
A. Task manager
B. Performance Monitor
C. Resource Monitor
D. Server Manager

HIDE ANSWERS

Correct Answer: B

103Which of the following is a blank optical disk where you can save only
once, even while the whole space available is not used?
03/11/2017 – by Mod_GuideK 0

103Which of the following is a blank optical disk where you can save only once, even while the whole space
available is not used?
A. CD-MO
B. CD-ROM
C. CD-R
D. CD-RW

HIDE ANSWERS

Correct Answer: C

104Which of the following options can you add support on this server?
03/11/2017 – by Mod_GuideK 0

You have installed and configured the Application Server role on a server running Windows Server 2008 R2.
For which of the following options can you add support on this server? Each correct answer represents a
complete solution. Choose all that apply.
A. Web Server
B. COM+ Network Access
C. Windows Process Activation Service
D. DFS Management
E. File Server Resource Manager
F. TCP Port Sharing

HIDE ANSWERS

Correct Answer: ABCF


105Which of the following tools will he use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-
based network. The network contains 3 Windows Server 2008 R2 and 100 Windows 7 client computers. Mark
wants to add a device driver to the booted Windows PE image. Which of the following tools will he use to
accomplish the task?
A. Drvload
B. PEimg
C. LDIFDE
D. VSMT

HIDE ANSWERS

Correct Answer: A

106Which of the above stated goals will David accomplish?


03/11/2017 – by Mod_GuideK 0

David and Vivian work as Network Administrators for company Inc. David installs a printer on his Windows 7
Ultimate computer. The printer will be shared on the network and will be used only by the members of the
Developers local group.
David wants to accomplish the following goals:
1. Prevent all other members, except those of the Developers local group, from using the printer.
2. Members of the Developers local group will only manage print jobs sent by them.
3. Only he and Vivian will manage the printer and all print jobs.
David takes the following steps:
. Grant the Allow-Print permission to the Developers local group.
. Grant the Allow-Manage Documents and Allow-Manage Printers permissions to Vivian’s and his user
accounts.
Which of the above stated goals will David accomplish?
A. Only the second goal will be accomplished.
B. Only the third goal will be accomplished.
C. Only the first and third goals will be accomplished.
D. Only the second and third goals will be accomplished.
E. All the three goals will be accomplished.
F. Only the first goal will be accomplished.
G. Only the first and second goals will be accomplished.

HIDE ANSWERS

Correct Answer: D
Explanation/Reference:
Explanation:
By default, the Everyone group has print permission. This permission entry needs to be removed to meet the
first goal.
107Which of the following statements best describe the features of a
fixed-size VHD?
03/11/2017 – by Mod_GuideK 0

Which of the following statements best describe the features of a fixed-size VHD? Each correct answer
represents a complete solution. Choose two.
A. It offers better performance by eliminating the fragmentation associated with the growing file.
B. It has a set amount of hard disk space and that amount does not change.
C. It uses the space that is being used currently by the VHD.
D. It provides a way to set up the VHD if hard drive space is limited on the server.

HIDE ANSWERS

Correct Answer: AB

108Which of the following management methods will allow you to switch


to the backup site while repairing the primary site?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows-based network
environment. You need to make a balance between accessibility, security, and cost while planning for backup.
Which of the following management methods will allow you to switch to the backup site while repairing the
primary site?
A. Near-line
B. Backup site
C. Off-line
D. On-line

HIDE ANSWERS

Correct Answer: B

109What are the changes to DFS Replication available in Windows Server


2008 Release 2?
03/11/2017 – by Mod_GuideK 0

Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2008 domain-based
network. Mark has recently installed Windows Server 2008 R2 on a computer. He wants to implement
Distributed File system on the network using Windows Server 2008 R2. What are the changes to DFS
Replication available in Windows Server 2008 Release 2? Each correct answer represents a complete solution.
Choose three.
A. Read-only SYSVOL folders on Read-only Domain Controllers (RODCs)
B. Performance counters
C. Failover cluster support
D. Read-only replicated folder
HIDE ANSWERS

Correct Answer: ACD

110Which of the following refers to a digital storage system directly


attached to a server or workstation, without a storage network in between?
03/11/2017 – by Mod_GuideK 0

Which of the following refers to a digital storage system directly attached to a server or workstation, without a
storage network in between?
A. DAS
B. SAS
C. NAS
D. SAN

HIDE ANSWERS

Correct Answer: A

111Which of the following will you use to accomplish the task?


03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a virtual server hosted on a Windows
Server 2008 server with the Hyper-V role installed. You have upgraded an application on the virtual server.
You experience that this upgrade causes problems. Now, you want to quickly revert back to the point before
the changes are made. Which of the following will you use to accomplish the task?
A. Virtual Server Migration Toolkit
B. Snapshots
C. Windows System Resource Manager
D. Logical unit number

HIDE ANSWERS

Correct Answer: B

112Which of the following is described in the following statement:


03/11/2017 – by Mod_GuideK 0

Which of the following is described in the following statement:


"It is a 512 bytes long boot sector that is the first sector of a default boot drive. It is also known as Volume
Boot Sector, if the boot drive is un-partitioned.”
A. POST
B. BIOS
C. SBR
D. MBR
HIDE ANSWERS

Correct Answer: D

113Which of the following MMC snap-in consoles is used to administer


and publish information in the directory and to manage users, groups,
computers, domains, domain controllers, and organizational units?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows Active Directory-based
single domain single forest network. The functional level of the forest is Windows Server 2008 R2. Which of
the following MMC snap-in consoles is used to administer and publish information in the directory and to
manage users, groups, computers, domains, domain controllers, and organizational units?
A. Active Directory Administrative Center
B. Active Directory Users and Computers
C. Active Directory Sites and Services
D. Active Directory Domains and Trusts

HIDE ANSWERS

Correct Answer: A

114How will you use it?


03/11/2017 – by Mod_GuideK 0

You work as a Network Administrator for NetTech Inc. A server in the network is unable to load the network
operating system. You find that a POST error has occurred. You want to use a POST diagnostic hardware
adapter to diagnose the error. How will you use it?
A. Insert the card into an open bus slot. Boot the computer. The error codes will display on the adapter.
B. Connect the card to a serial port. Boot the computer. The error codes will be stored in a memory
buffer created by the card.
C. Insert the card into an open bus slot. Boot the computer. The error codes will print.
D. Insert the card into an open bus slot. Boot the computer using the floppy disk provided by the card
manufacturer. The error codes will be stored on a floppy disk.

HIDE ANSWERS

Correct Answer: A

115Which of the following booting options will you choose to accomplish


the task?
03/11/2017 – by Mod_GuideK 0

You are troubleshooting a system working on Windows Server 2008 R2. You need to create the ntbtlog.txt file
in order to list all the drivers that are installed during startup. Which of the following booting options will you
choose to accomplish the task?
A. Safe Mode
B. Repair Your Computer
C. Directory Services Restore Mode
D. Enable Boot Logging

HIDE ANSWERS

Correct Answer: D

116Which of the following will you use to diagnose and recover from
serious errors that may prevent Windows Server 2008 R2 operating systems
from booting successfully?
03/11/2017 – by Mod_GuideK 0

Which of the following will you use to diagnose and recover from serious errors that may prevent Windows
Server 2008 R2 operating systems from booting successfully?
A. Windows RE
B. Windows DS
C. Windows AIK
D. Windows SIM

HIDE ANSWERS

Correct Answer: A

117Which of the following statements are NOT true about the Volume
Boot Sector, commonly known as Master Boot Record?
03/11/2017 – by Mod_GuideK 0

Which of the following statements are NOT true about the Volume Boot Sector, commonly known as Master
Boot Record? Each correct answer represents a complete solution. Choose all that apply.
A. The actual program can be 512 bytes long.
B. Four 16-byte master partition records are present in MBR.
C. The end of MBR marker is h55CC.
D. The volume boot sector is present in cylinder 0, head 0, and sector 1 of the default boot drive.

HIDE ANSWERS

Correct Answer: AC

118Which of the following key combinations opens the Task Manager


window?
03/11/2017 – by Mod_GuideK 0
Which of the following key combinations opens the Task Manager window?
A. Ctrl + Shift + Esc
B. Ctrl + Alt + Esc
C. Ctrl + Alt + Del
D. Ctrl + Shift + Alt

HIDE ANSWERS

Correct Answer: A

119Which of the following tasks can you perform without requiring


administrative permissions or rights when you log in as a standard user in
Windows Server 2008 R2?
03/11/2017 – by Mod_GuideK 0

Which of the following tasks can you perform without requiring administrative permissions or rights when you
log in as a standard user in Windows Server 2008 R2? Each correct answer represents a complete solution.
Choose three.
A. Change Windows settings.
B. Connect Bluetooth devices to the computer.
C. Install updates from Windows Update.
D. Reset the network adapter and perform network diagnostic and repair tasks.

HIDE ANSWERS

Correct Answer: BCD

120Which of the following statements regarding the Secure Sockets Layer


(SSL) security model are true?
03/11/2017 – by Mod_GuideK 0

Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true? Each
correct answer represents a complete solution. Choose two.
A. The server always authenticates the client.
B. The client can optionally authenticate the server.
C. The server can optionally authenticate the client.
D. The client always authenticates the server.

HIDE ANSWERS

Correct Answer: CD

121What does the disaster recovery process include?


03/11/2017 – by Mod_GuideK 0
Disaster recovery is the process of resuming normal business operations as quickly as possible after the
disaster is over. What does the disaster recovery process include? Each correct answer represents a complete
solution. Choose all that apply.
A. Testing all hardware and software before resuming operations
B. Restoring data
C. Encrypting data
D. Executing a written disaster recovery plan
E. Replacing any damaged hardware

HIDE ANSWERS

Correct Answer: ABDE

122Which of the following utilities will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has a Windows Server 2008 R2 network
environment. The network is configured as a Windows Active Directory-based single forest single domain
network. A single domain controller is configured on the network. Some employees reported that they failed to
log on to the domain controller. You want to know IP addresses and other details of the accounts of the
employees. Which of the following utilities will you use to accomplish the task?
A. Server Manager
B. Resource Monitor
C. Event Viewer
D. Performance Monitor

HIDE ANSWERS

Correct Answer: C

123Which of the following statements are true about a device driver?


03/11/2017 – by Mod_GuideK 0

Which of the following statements are true about a device driver? Each correct answer represents a complete
solution. Choose all that apply.
A. Device drivers are software-dependent and do not depend on operating systems.
B. It allows higher-level computer programs to interact with a hardware device.
C. It is a program or software that controls a particular device.
D. It works as a translator between the device and the operating system and programs that use the
device.

HIDE ANSWERS

Correct Answer: BCD

124Which of the following tools will you use to accomplish the task?
03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has deployed Windows Server 2008 R2
for the deployment of workstations and servers. You need to service Windows images offline before the
deployment. Which of the following tools will you use to accomplish the task?
A. BootSect
B. DISM
C. BCDEdit
D. BCDBoot

HIDE ANSWERS

Correct Answer: B

125How many minimum hard drives can you use?


03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows 2008 based network
environment. There are twenty client computers running Windows 7 and three servers running Windows
Server 2008 R2. You have to ensure that customer service representatives can access the client’s information
whenever they need. For this, you want to configure a RAID 5 solution in Network Attached Storage (NAS).
How many minimum hard drives can you use?
A. 5
B. 6
C. 4
D. 3

HIDE ANSWERS

Correct Answer: D

Which of the following ports does FTP use for communication?


03/11/2017 – by Mod_GuideK 0

Web developers request FTP access to the Web server so that they can upload and download updated contents.
Which of the following ports does FTP use for communication? Each correct answer represents a complete
solution. Choose two.
A. 20
B. 80
C. 23
D. 21

HIDE ANSWERS

Correct Answer: AD
127Which of the following types of volumes supported by dynamic disk
uses a minimum of three disks for creating a fault-tolerant drive among the
drives?
03/11/2017 – by Mod_GuideK 0

Which of the following types of volumes supported by dynamic disk uses a minimum of three disks for
creating a fault-tolerant drive among the drives?
A. RAID-5 volume
B. Mirrored volume
C. Striped volume
D. Spanned volume

HIDE ANSWERS

Correct Answer: A

Which of the following servers is used to store and forward e-mail messages
using several protocols, including SMTP, POP3, and IMAP?
03/11/2017 – by Mod_GuideK 0

Which of the following servers is used to store and forward e-mail messages using several protocols, including
SMTP, POP3, and IMAP?
A. File server
B. Monitoring server
C. Database server
D. Mail server

HIDE ANSWERS

Correct Answer: D

129You work as a Network Administrator for company Inc. The network of the company contains Windows
Server 2008 R2 server and Windows 7 client computers. You have been assigned the task to connect printers
to the server. Which of the following ports (on the server) will you use to accomplish the task?
A. VGA port
B. DVI-I port
C. Parallel port
D. PS/2 port

HIDE ANSWERS

Correct Answer: C

130You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008
network environment. The network is configured as a Windows Active Directory-based single forest network.
You are configuring a new computer. You want to configure the computer’s hard disk as a dynamic disk.
Which of the following command-line tools will you use to convert a hard disk from basic to dynamic?
A. NTDSUTIL
B. DISKPART
C. FDISK
D. FSUTIL

HIDE ANSWERS

Correct Answer: B

131What will you do?


03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows Server 2008 domain-
based network. The network contains one Windows Server 2008 R2 and twelve Windows 7 client computers.
You want to centralize management and configuration of operating systems, applications, and user settings.
What will you do?
A. Apply NTFS permission.
B. Implement an account policy.
C. Apply an audit policy.
D. Implement a group policy.

HIDE ANSWERS

Correct Answer: D

132Which of the following tools will you use to create image files of an
existing system for duplicating or backup purposes?
03/11/2017 – by Mod_GuideK 0

Which of the following tools will you use to create image files of an existing system for duplicating or backup
purposes?
A. Windows System Image Manager
B. ImageX
C. BCDEdit
D. Setup Manager

HIDE ANSWERS

Correct Answer: B

133What will you do to accomplish the task?


03/11/2017 – by Mod_GuideK 0

You work as a Server Administrator for company Inc. The company has its main branch in London and two
sub-branches in Tokyo and Paris. The company has 1,500 clients and a number of servers that run Windows
Server 2008 R2. You need to distribute workload across the cluster nodes for supporting a larger number of
simultaneous clients. What will you do to accomplish the task?
A. Deploy Windows AIK.
B. Use Network Load Balancing.
C. Implement NIC teaming.
D. Create a failover cluster.

HIDE ANSWERS

Correct Answer: B

134Which of the following statements are true about Virtual Hard Disk
(VHD)?
03/11/2017 – by Mod_GuideK 0

Adam works as a Software Tester for SecureEnet Inc. He is required to test the software on different operating
systems. Adam installs Windows 7 on his laptop, which enables him to create, mount, and boot from VHD
files. Which of the following statements are true about Virtual Hard Disk (VHD)? Each correct answer
represents a complete solution. Choose all that apply.
A. VHD can be used to install a wide variety of operating systems.
B. VHD allows multiple operating systems to reside on a single host machine
C. VHDs are implemented as files that reside on the native host file system.
D. VHD is a file formatted to be structurally different to a physical Hard Disk Drive.

HIDE ANSWERS

Correct Answer: ABC

135Which of the following operations master roles are applied to the entire
forest?
03/11/2017 – by Mod_GuideK 0

You work as a Network Administrator for Perfect Solutions Inc. The company plans to establish a Windows
2008 Active Directory-based network. The network will be configured as a single forest and a multiple-domain
network. You are planning for the placement of operations master roles. In this context, which of the following
operations master roles are applied to the entire forest? Each correct answer represents a complete solution.
Choose all that apply.
A. Domain naming master
B. Schema master
C. PDC emulator master
D. Relative ID (RID) master

HIDE ANSWERS

Correct Answer: AB

136What will you do to accomplish the task?


03/11/2017 – by Mod_GuideK 0
You work as a System Administrator for company Inc. The company has a Windows 2008 domain-based
network. The network has 120 Windows 7 computers and two Windows Server 2008 R2 servers. You want to
ensure that when users log on to any client computer on the network, settings can be changed, but all settings
are reset back to their default values when they log on again. What will you do to accomplish the task?
A. Create a Group Policy Object.
B. Create a local user profile.
C. Create a roaming user profile.
D. Create a mandatory user profile.

HIDE ANSWERS

Correct Answer: D

137Which of the following are the levels of printer permissions provided


by Windows Server 2008?
03/11/2017 – by Mod_GuideK 0

Which of the following are the levels of printer permissions provided by Windows Server 2008? Each correct
answer represents a complete solution. Choose all that apply.
A. Manage documents
B. Print
C. Reload the printer
D. Manage this printer

HIDE ANSWERS

Correct Answer: ABD

138What will you do?


03/11/2017 – by Mod_GuideK 0

You work as a System Administrator for company Inc. The company has a Windows 2008 based network
environment. There are twenty client computers running Windows 7 and three servers running Windows server
2008 R2. You want to increase the data availability for these servers without rebuilding them and without
investing a large amount of money for purchasing array controllers. What will you do? Each correct answer
represents a part of the solution. Choose all that apply.
A. Add another physical drive to each server.
B. Convert the drives from basic disks to dynamic disks.
C. Implement the RAID 1 solution between the two drives.
D. Ensure that the backups are running smoothly.

HIDE ANSWERS

Correct Answer: ABC

139Which of the following statements are true about Resmon?


03/11/2017 – by Mod_GuideK 0

Which of the following statements are true about Resmon? Each correct answer represents a complete solution.
Choose all that apply.
A. It is used for parental control and filtering, and controls which Web sites can be visited and which
programs can have Internet access.
B. It is a system monitoring tool.
C. It enables users to view and monitor complete resource information about their computer.
D. It is a lightweight utility for local host monitoring that is queried by tools like nagios over http.

HIDE ANSWERS

Correct Answer: BCD

140Which of the following statements best describe the functions of RD


Connection Broker in network infrastructure?
03/11/2017 – by Mod_GuideK 0

Which of the following statements best describe the functions of RD Connection Broker in network
infrastructure? Each correct answer represents a complete solution. Choose two.
A. It is used to permit a user to reconnect to his existing session in a load-balanced RD Session Host
server farm.
B. It is used to integrate with Hyper-V to provide virtual machines by using RemoteApp and Desktop
Connection.
C. It is used to redirect users to a shared virtual machine pool where a virtual machine is dynamically
assigned.
D. It is used to enable a user to evenly distribute the session load among RD Session Host servers in a
load-balanced RD Session Host server farm.

HIDE ANSWERS

Correct Answer: AD
Explanation/Reference:
References:
https://technet.microsoft.com/en-gb/library/cc772245.aspx

141What will you do to accomplish the task?


03/11/2017 – by Mod_GuideK 0

You are working on a Windows 2008 environment. You find that some applications are not responding while
creating a project. You want to terminate these applications anyhow and start a new session. What will you do
to accomplish the task?
A. Use Device Manager.
B. Use Network Monitor.
C. Use System Monitor.
D. Use Task Manager.

HIDE ANSWERS
Correct Answer: D

142Which of the following are disaster recovery planning steps?


03/11/2017 – by Mod_GuideK 0

A disaster recovery plan should contain data, hardware, and software that are critical for a business. Which of
the following are disaster recovery planning steps? Each correct answer represents a complete solution. Choose
all that apply.
A. Prioritize business processes
B. Monitor the plan
C. Identify alternate sites
D. Identify and assess the risks

HIDE ANSWERS

Correct Answer: ACD

143Which includes managing users, groups, computers, domains, domain


controllers, and organizational units?
03/11/2017 – by Mod_GuideK 0

After the promotion of a computer to a domain controller, a user can use various MMC snap-in consoles to
manage Active Directory. Which of these consoles is used for administering and publishing information in the
directory, which includes managing users, groups, computers, domains, domain controllers, and organizational
units?
A. Active Directory Users and Computers
B. Active Directory Sites and Services
C. Active Directory Domains and Trusts
D. Active Directory Administrative Center

HIDE ANSWERS

Correct Answer: D

144What are two possible ways to provide the drivers to the installation
process?
03/11/2017 – by Mod_GuideK 1

A small law firm hires you to set up its first file server. You decide to install Windows Server 2008 R2 on a
custom-built computer purchased from a local computer supplier. Early in the process, the installation prompts
for storage drivers.
What are two possible ways to provide the drivers to the installation process? (Choose two.)
A. Download the drivers, save them to the original installation DVD disk, and restart the installation
process.
B. Point the installation to a URL on the manufacturer’s website.
C. Place them in the root directory of a USB flash drive and insert the flash drive into a USB port.
D. Burn them to a blank CD and insert it in place of the installation disk.

HIDE ANSWERS

Correct Answer: BD

145Which tool should you use?


03/11/2017 – by Mod_GuideK 0

You need to restart the print spooler on a Windows Server 2008 R2 server. Which tool should you use?
A. Devices and Printers
B. The Device Manager
C. Printer Properties
D. The Services console

HIDE ANSWERS

Correct Answer: D

146Where do you find detailed information about that error?


03/11/2017 – by Mod_GuideK 0

A system error window keeps displaying.


Where do you find detailed information about that error?
A. Event Viewer
B. Resource Monitor
C. Task Manager
D. Device Manager

HIDE ANSWERS

Correct Answer: A

147This question requires that you evaluate the underlined text to determine
if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
"Windows Deployment Services (WDS)” allows you to automate the installation of Windows Server 2008 on
several servers.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Microsoft Software Installer (MSI)
B. Unattendinstall.exe
C. Windows Installer Service
D. No change is needed
HIDE ANSWERS

Correct Answer: D

148What are two functions of the Group Policy loopback feature?


03/11/2017 – by Mod_GuideK 0

What are two functions of the Group Policy loopback feature? (Choose two.)
A. Apply Group Policy Objects for only the current site.
B. Apply Group Policy Objects that depend only on the computer the user logs on to.
C. Apply only the local computer Group Policy Object.
D. Give higher precedence to computer policy over user policy.

HIDE ANSWERS

Correct Answer: BD

149Which group policy object are processed first during logon?


03/11/2017 – by Mod_GuideK 0

Settings from which group policy object are processed first during logon?
A. Domain
B. Organizational Unit
C. Local
D. Site

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
Group Policy settings are processed in the following order:
1. Local Group Policy object — Each computer has exactly one Group Policy object that is stored locally. This
processes for both computer and user Group Policy processing.
2. Site — Any GPOs that have been linked to the site that the computer belongs to are processed next.
Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for
the site in Group Policy Management Console (GPMC). The GPO with the lowest link order is processed last,
and therefore has the highest precedence.
3. Domain — Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the
Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is processed
last, and therefore has the highest precedence.
4. Organizational units — GPOs that are linked to the organizational unit that is highest in the Active
Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on.
Finally, the GPOs that are linked to the organizational unit that contains the user or computer are processed.

150What are two possible ways to achieve this goal?


03/11/2017 – by Mod_GuideK 0
You are an IT technician for a company that has an environment consisting entirely of Windows 2008 Server
R2 and Windows 7 laptops.
You need to establish a secure method that allows employees to work remotely but still have access to the
internal network resources.
What are two possible ways to achieve this goal? (Choose two.)
A. Offline Files
B. DirectAccess
C. Network Access Protection (NAP)
D. Virtual Private Network (VPN)
E. DFS Namespace

HIDE ANSWERS

Correct Answer: BD

151What is one advantage of application virtualization?


03/11/2017 – by Mod_GuideK 0

What is one advantage of application virtualization?


A. Fewer operating system updates
B. Improved collaboration
C. Reduced network traffic
D. Hardware consolidation

HIDE ANSWERS

Correct Answer: B

152

153
154

155Which storage technology supports speeds up to 16 Gbps?


03/11/2017 – by Mod_GuideK 0

Which storage technology supports speeds up to 16 Gbps?


A. Network File System (NFS)
B. Small Computer System Interface (SCSI)
C. Serial Advanced Technology Attachment (SATA)
D. Fibre Channel (FC)

HIDE ANSWERS

Correct Answer: D
156What is the name for a stand-alone digital storage system connected
directly to a server or workstation HBA?
03/11/2017 – by Mod_GuideK 0

What is the name for a stand-alone digital storage system connected directly to a server or workstation HBA?
A. Small Computer System Interface (SCSI)
B. Direct Attached Storage (DAS)
C. Network Attached Storage (NAS)
D. Storage Area Network (SAN)

HIDE ANSWERS

Correct Answer: A

157What are three benefits of performing a Server Core installation of


Windows Server 2008 R2?
03/11/2017 – by Mod_GuideK 0

What are three benefits of performing a Server Core installation of Windows Server 2008 R2? (Choose three.)
A. Option to upgrade to a Full Server installation
B. Reduced maintenance
C. Reduced attack vulnerability
D. Enhanced installation GUI
E. Lower disk space requirement

HIDE ANSWERS

Correct Answer: BCE

158This question requires that you evaluate the underlined text to


determine if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
Active Directory user account names are not case sensitive.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct
A. Can be from 1 to 256 characters in length
B. Can contain numbers and letters but no special characters
C. Must be created with a first and last name
D. No change is needed.

HIDE ANSWERS

Correct Answer: D
159

160This question requires that you evaluate the underlined text to


determine if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
"Microsoft App-V” can make applications available to end user computers without having to install the
applications on those computers.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is
needed” if the underlined text makes the statement correct.
A. Microsoft Hyper-V
B. DirectAccess
C. Windows Deployment Services
D. No change is needed.

HIDE ANSWERS

Correct Answer: D

161This question requires that you evaluate the underlined text to


determine if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
The minimum permission needed to delete other users’ documents from a print queue is “Print”.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Manage Documents
B. Manage Printers
C. Deny
D. No change is needed

HIDE ANSWERS
Correct Answer: A
162

176This question requires that you evaluate the underlined text to determine
if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
Active Directory “Distribution groups” can only be assigned permissions to resources within the same domain
but can have members from other domains.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Global groups
B. Universal groups
C. Domain local groups
D. No change is needed

HIDE ANSWERS

Correct Answer: C
178

Explanation/Reference:
. Active Directory Domain Services (AD DS) defines five operations master roles: the schema master, domain
naming master, relative identifier (RID) master, primary domain controller (PDC) emulator, and
infrastructure master. The domain controllers that hold operations master roles are designated to perform
specific tasks to ensure consistency and to eliminate the potential for conflicting entries in the AD DS
database.
. A server can have more than one operations master role.
. Forestwide Operations Master Roles
The schema master and domain naming master are forestwide roles, meaning that there is only one schema
master and one domain naming master in the entire forest.
. Domainwide Operations Master Roles
The other operations master roles are domainwide roles, meaning that each domain in a forest has its own
RID master, PDC emulator, and infrastructure master.
Reference: What are Operations Masters?
https://technet.microsoft.com/en-us/library/cc779716%28v=ws.10%29.aspx
179

Explanation/Reference:
. A file server can very well be a member server.
. Active Directory group policies (GPOs) can be applied to groups.
. Local groups cannot be a member of a global groups in a domain.
. There are three different types of Active Directory domain groups (which does not include local groups):
Universal, Global, Domain Local

180This question requires that you evaluate the underlined text to determine if
it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
Settings from the “Local” Group Policy Object are processed last during logon.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Site
B. Organizational Unit
C. Domain
D. No change is needed.

HIDE ANSWERS

Correct Answer: B
Explanation/Reference:
Group Policy settings are processed in the following order:
1. Local Group Policy object
2. Site
3. Domain
4. Organizational Unit
Reference: Group Policy processing and precedence
https://technet.microsoft.com/en-us/library/cc785665%28v=ws.10%29.aspx
183You are an IT intern for Tailspin Toys.
Your manager attends a conference out of town and wants you to perform routine maintenance directly on a
Windows 2008 R2 server console.
Because you have restricted access, you need your manager to enter credentials at a UAC prompt in your
session.
What should you do?
A. Have your manager use Server Manager to connect to the server.
B. Have your manager use Remote Administration to connect to the server.
C. Send a Remote Assistance request to your manager.
D. Have your manager use Remote Desktop to connect to the server.

HIDE ANSWERS

Correct Answer: C

185This question requires that you evaluate the underlined text to


determine if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
The “Security” log in Event Viewer shows information regarding server reboots.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Application
B. Setup
C. System
D. No change is needed

HIDE ANSWERS

Correct Answer: C

186This question requires that you evaluate the underlined text to


determine if it is correct.
03/11/2017 – by Mod_GuideK 0

This question requires that you evaluate the underlined text to determine if it is correct.
The “Security” log in Event Viewer shows information regarding server reboots.
Select the correct answer if the underlined text does not make the statement correct. Select ‘No change is
needed” if the underlined text makes the statement correct.
A. Application
B. Setup
C. System
D. No change is needed

HIDE ANSWERS

Correct Answer: C

Which two tools should you use to diagnose the problem with this server?
03/11/2017 – by Mod_GuideK 0

You often stop by Fourth Coffee before class. The owner knows you are studying computer networking. One
morning, the owner asks for your help with a file server because it is running slower than usual.
Which two tools should you use to diagnose the problem with this server? (Choose two.)
A. Task Manager
B. Share & Storage Management
C. Device Manager
D. Perfmon
E. Profiler

HIDE ANSWERS

Correct Answer: AD

187The University Chess Club has a single Windows Server 2008 R2 server. The server has 12 GB of RAM
and 1TB of disk space on a RAID 5 array. Using this server, you need to install two separate instances of
Windows Server 2008 R2: one to act as a web server and one to act as a database server.
Which Windows Server 2008 R2 role or feature provides this capability?
A. Windows Deployment Services
B. Hyper-V
C. Windows System Resource Manager
D. Windows Internal Database

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
Hyper-V can create virtual machines on x86-64 systems.
Starting with Windows 8, Hyper-V supersedes Windows Virtual PC as the hardware virtualization component
of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose
individual virtual machines to one or more networks.

197

Explanation/Reference:
. iSCSI, which stands for Internet Small Computer System Interface, works on top of the Transport Control
Protocol (TCP) and allows the SCSI command to be sent end-to-end over local-area networks (LANs), wide-
area networks (WANs) or the Internet.
. Fibre Channel signaling can run on an electrical interface in addition to fiber-optic cables.
. The main protocols used for DAS connections are ATA, SATA, eSATA, SCSI, SAS, USB, USB_3.0,
IEEE_1394 and Fibre Channel

What should you use to prevent power spikes from harming a server?
03/11/2017 – by Mod_GuideK 0

What should you use to prevent power spikes from harming a server?
A. Power supply unit
B. Hot-swappable power supply
C. Dedicated surge protector
D. Line conditioner

HIDE ANSWERS

Correct Answer: C

Which component software issues this test?


03/11/2017 – by Mod_GuideK 0

Power On Self Test (POST) runs when a computer first boots.


Which component software issues this test?
A. Complementary Metal Oxide Semiconductor
B. Northbridge On Board Chip
C. Basic Input/Output System
D. Southbridge On Board Chip

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
The four main functions of a PC BIOS (Basic Input/Output System).
. POST – Test the computer hardware and make sure no errors exist before loading the operating system.
Additional information on the POST can be found on our POST and Beep Codes page.
. Bootstrap Loader – Locate the operating system. If a capable operating system is located, the BIOS will pass
control to it.
. BIOS drivers – Low level drivers that give the computer basic operational control over your computer’s
hardware.
. BIOS or CMOS Setup- – Configuration program that allows you to configure hardware settings including
system settings such as computer passwords, time, and date.
Reference: http://www.computerhope.com/jargon/b/bios.htm

198Which Hyper-V network type shares the host’s physical network adapter?
03/11/2017 – by Mod_GuideK 0

Which Hyper-V network type shares the host’s physical network adapter?
A. External
B. Public
C. Private
D. Internal

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
For Hyper-V host networking, the most common option is to create an external access virtual switch. This
allows VMs on the host to access other systems on a traditional VLAN or standard switched network.

199Which Hyper-V network type shares the host’s physical network


adapter?
03/11/2017 – by Mod_GuideK 0

Which Hyper-V network type shares the host’s physical network adapter?
A. External
B. Public
C. Private
D. Internal

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
For Hyper-V host networking, the most common option is to create an external access virtual switch. This
allows VMs on the host to access other systems on a traditional VLAN or standard switched network.

200Which Hyper-V network type shares the host’s physical network


adapter?
03/11/2017 – by Mod_GuideK 0

Which Hyper-V network type shares the host’s physical network adapter?
A. External
B. Public
C. Private
D. Internal

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
For Hyper-V host networking, the most common option is to create an external access virtual switch. This
allows VMs on the host to access other systems on a traditional VLAN or standard switched network.

201Which technology is used to create and manage relational databases?


03/11/2017 – by Mod_GuideK 0

Which technology is used to create and manage relational databases?


A. Microsoft Exchange Server
B. Microsoft Commerce Server
C. Microsoft Groove Server
D. Microsoft SQL Server

HIDE ANSWERS

Correct Answer: D

202What should you use?


03/11/2017 – by Mod_GuideK 0

You need to centralize administration of print servers and network printers. What should you use?
A. Print Management
B. Printers and Faxes
C. Device Manager
D. Print queue

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
There are two primary tools that you can use to administer a Windows print server in Windows Server 2008:
Server Manager and Print Management.

206What should you install on the client computer?


03/11/2017 – by Mod_GuideK 0

You need to manage a Windows Server 2008 server from a Windows client computer by using a Management
Console.
What should you install on the client computer?
A. Remote Assistance
B. Remote Server Administration Tools
C. Windows Server Resource Kit
D. Microsoft Office SharePoint Server

HIDE ANSWERS

Correct Answer: B

207Which group will be granted access by default?


03/11/2017 – by Mod_GuideK 0

You enable Remote Desktop. Which group will be granted access by default?
A. Domain users group
B. Remote access security group
C. Local administrators group
D. Local users group

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
Configure Remote Desktop Access on Windows 7 Systems
Remote Desktop is not enabled by default. You must specifically enable it to allow remote access to the
workstation. When it is enabled, any member of the [local] Administrators group can connect to the
workstation. Other users must be placed on a remote access list to gain access to the workstation

208Which tool enables an administrator to centralize the distribution of


Microsoft security updates?
03/11/2017 – by Mod_GuideK 0
Which tool enables an administrator to centralize the distribution of Microsoft security updates?
A. Microsoft Security Response Center (MSRC)
B. Windows Server Update Services (WSUS)
C. Windows Update
D. Microsoft Software Assurance
E. Microsoft Update

HIDE ANSWERS

Correct Answer: B

 209
 Question 204
 Question 205
 Question 206
 Question 207
 Question 208
 Question 209
 Question 210
 Question 211
 Question 212
 Question 213
 Question 214
 Question 215
 Question 216
 Question 217
 Question 218
 Question 219
 Question 220
 Question 221
 Question 222
 Question 223
 Question 224
 Question 225
 Question 226
 Question 227
 Question 228
 Question 229
 Question 230
 Question 231
 Question 232
 Question 233
 Question 234
 Question 235
 Question 236
 Question 237
 Question 238
 Question 239
 Question 240
 Question 241
 Question 242
 Question 243
 Question 244
 Question 245
 Question 246
 Question 247
 Question 248
 Question 249
 Question 250
 Question 251
 Question 252
 Question 253
 Question 254
 Question 255
 Question 256
 Question 257
 Question 258
 Question 259
 Question 260
 Question 261
 Question 262
 Question 263
 Question 264
 Question 265
 Question 266
 Question 267
 Question 268
 Question 269
 Question 270
 Question 271
 Question 272(1)
 Question 273
 Question 274
 Question 275
 Question 276
 Question 277
 Question 278
 Question 279
 Question 280
 Question 281(1)
 Question 282
 Question 283
 Question 284
 Question 285
 Question 286
 Question 287
 Question 288(3)
 Question 289
 Question 290

 Home
 Microsoft
 98-365
 What happens first?

What happens first?


03/11/2017 – by Mod_GuideK 0

You turn on a computer.


What happens first?
A. The operating system is loaded.
B. The boot sector is accessed.
C. The BIOS is loaded.
D. The Master Boot Record (MBR) is accessed.

HIDE ANSWERS

Correct Answer: C

 210
 Question 204
 Question 205
 Question 206
 Question 207
 Question 208
 Question 209
 Question 210
 Question 211
 Question 212
 Question 213
 Question 214
 Question 215
 Question 216
 Question 217
 Question 218
 Question 219
 Question 220
 Question 221
 Question 222
 Question 223
 Question 224
 Question 225
 Question 226
 Question 227
 Question 228
 Question 229
 Question 230
 Question 231
 Question 232
 Question 233
 Question 234
 Question 235
 Question 236
 Question 237
 Question 238
 Question 239
 Question 240
 Question 241
 Question 242
 Question 243
 Question 244
 Question 245
 Question 246
 Question 247
 Question 248
 Question 249
 Question 250
 Question 251
 Question 252
 Question 253
 Question 254
 Question 255
 Question 256
 Question 257
 Question 258
 Question 259
 Question 260
 Question 261
 Question 262
 Question 263
 Question 264
 Question 265
 Question 266
 Question 267
 Question 268
 Question 269
 Question 270
 Question 271
 Question 272(1)
 Question 273
 Question 274
 Question 275
 Question 276
 Question 277
 Question 278
 Question 279
 Question 280
 Question 281(1)
 Question 282
 Question 283
 Question 284
 Question 285
 Question 286
 Question 287
 Question 288(3)
 Question 289
 Question 290

 Home
 Microsoft
 98-365
 What happens first?
What happens first?
03/11/2017 – by Mod_GuideK 0

You turn on a computer.


What happens first?
A. The operating system is loaded.
B. The boot sector is accessed.
C. The BIOS is loaded.
D. The Master Boot Record (MBR) is accessed.

HIDE ANSWERS

Correct Answer: C

211When should you do this?


03/11/2017 – by Mod_GuideK 0

You need to install storage device drivers for a Windows boot partition. When should you do this?
A. After you have started Windows for the first time
B. Before creation of the RAID array
C. During the post-boot phase
D. During the installation phase

HIDE ANSWERS

Correct Answer: D

212What should you do?


03/11/2017 – by Mod_GuideK 0

You need to secure a server that you have been working on without disrupting the work of other employees in
your company. What should you do?
A. Log off the server
B. Hibernate the server
C. Restart the server
D. Shut down the server

HIDE ANSWERS

Correct Answer: A

213How many forests can you have without creating any trusts?
03/11/2017 – by Mod_GuideK 0

You have an Active Directory infrastructure that contains one domain and seven domain controllers. How
many forests can you have without creating any trusts?
A. 0
B. 1
C. 7
D. 8

HIDE ANSWERS

Correct Answer: B
Explanation/Reference:
In a Windows Server 2003 forest, you can link two disjoined Windows Server 2003 forests together to form a
one-way or two-way, transitive trust relationships. A two-way, forest trust is used to form a transitive trust
relationship between every domain in both forests

214To convert a disk from dynamic to basic, you must first:


03/11/2017 – by Mod_GuideK 0

To convert a disk from dynamic to basic, you must first:


A. Mirror all disk volumes.
B. Connect the disk to a different controller.
C. Delete all disk volumes.
D. Format all disk volumes in the NTFS file system.

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
To change a dynamic disk back to a basic disk using the Windows interface
1. Back up all volumes on the disk you want to convert from dynamic to basic.
2. In Disk Management, right-click each volume on the dynamic disk you want to convert to a basic disk, and
then click Delete Volume for each volume on the disk.
3. When all volumes on the disk have been deleted, right-click the disk, and then click Convert to Basic Disk.

215Which RAID level uses parity information to recover data from a


failed disk?
03/11/2017 – by Mod_GuideK 0

Which RAID level uses parity information to recover data from a failed disk?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10

HIDE ANSWERS

Correct Answer: C

216Which disk types can be used for internal storage?


03/11/2017 – by Mod_GuideK 0

Which disk types can be used for internal storage?


A. SAN/iSCSI
B. NFS/Distributed File System (DFS)
C. PATA/SATA/SCSI
D. NAS/Fiber-channel

HIDE ANSWERS

Correct Answer: C

217You need to ensure that Active Directory can be recovered in case of a


server failure. Your backup must include the:
03/11/2017 – by Mod_GuideK 0

You need to ensure that Active Directory can be recovered in case of a server failure. Your backup must
include the:
A. Shared drives
B. Page File
C. System State
D. Computer name

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
The System State data includes Active Directory and all other system components and services on which Active
Directory is dependent.

218What should you do?


03/11/2017 – by Mod_GuideK 0

You need to find a list of specific events.


What should you do?
A. Export the events to a .doc file.
B. Clear the log by saving it.
C. Filter by creating a custom view.
D. Use the Search menu option.

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
Quickly Filter Event Logs in Windows Server 2008
The Event Viewer automatically creates several filtered views of the event logs. Filtered views are listed under
the Custom Views node.
219Which tool should you use on the client computer?
03/11/2017 – by Mod_GuideK 0

Your network includes Windows Server 2003 and Windows Server 2008 domain controllers. You need to
ensure that group policy change are applied immediately.
Which tool should you use on the client computer?
A. Groupware
B. Windows update
C. GPUpdate
D. Policy Editor

HIDE ANSWERS

Correct Answer: C
Explanation/Reference:
GPUpdate refreshes local and Active Directory-based Group Policy settings, including security settings.

220Where should you place the user accounts?


03/11/2017 – by Mod_GuideK 0

You need to grant a set of users permissions to a specific folder.


Where should you place the user accounts?
A. Domain root
B. Security group
C. Shared folder
D. Organizational Unit

HIDE ANSWERS

Correct Answer: D

221Which should you use to manage the working environments of users


and computers in an Active Directory infrastructure?
03/11/2017 – by Mod_GuideK 0

Which should you use to manage the working environments of users and computers in an Active Directory
infrastructure?
A. Active Directory Domains and Trusts
B. Group Policy Objects
C. Builtin containers
D. Global security groups

HIDE ANSWERS

Correct Answer: B
Explanation/Reference:
A Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will
behave for a defined group of users or computers.

222Which task can you accomplish by using Organizational Units?


03/11/2017 – by Mod_GuideK 0

Which task can you accomplish by using Organizational Units?


A. Apply shared folder permissions to users
B. Place different domains in a centralized manageable environment
C. Create a secondary Active Directory
D. Logically represent a hierarchical structure of your company

HIDE ANSWERS

Correct Answer: D
Explanation/Reference:
A particularly useful type of directory object contained within domains is the organizational unit.
Organizational units are Active Directory containers into which you can place users, groups, computers, and
other organizational units. An organizational unit cannot contain objects from other domains.
An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate
administrative authority. Using organizational units, you can create containers within a domain that represent
the hierarchical, logical structures within your organization

223Where are domain user accounts managed in Windows Server?


03/11/2017 – by Mod_GuideK 0

Where are domain user accounts managed in Windows Server?


A. Local Users and Groups console
B. Control Panel
C. Active Directory Users and Computers
D. Active Directory Sites and Services

HIDE ANSWERS

Correct Answer: C

224Which should you use to monitor server performance and resource


utilization?
03/11/2017 – by Mod_GuideK 0

Which should you use to monitor server performance and resource utilization?
A. Memory
B. Counters
C. Boot logs
D. RAM
HIDE ANSWERS

Correct Answer: B
Explanation/Reference:
Performance Counters, Purpose
Counters are used to provide information as to how well the operating system or an application, service, or
driver is performing. The counter data can help determine system bottlenecks and fine-tune system and
application performance. The operating system, network, and devices provide counter data that an application
can consume to provide users with a graphical view of how well the system is performing.

225Which snap-in is used to create files that contain information about the
state of your server’s resources at a given time?
03/11/2017 – by Mod_GuideK 0

Which snap-in is used to create files that contain information about the state of your server’s resources at a
given time?
A. Reliability and Performance Monitor
B. Event Viewer
C. Services
D. System Monitor

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
Applies To: Windows Server 2008/2012
Windows Reliability and Performance Monitor is a Microsoft Management Console (MMC) snap-in that
combines the functionality of previous stand- alone tools including Performance Logs and Alerts, Server
Performance Advisor, and System Monitor. It provides a graphical interface for customizing performance data
collection and Event Trace Sessions.

226Enabling additional users to handle administrative tasks for a


particular object is referred to as:
03/11/2017 – by Mod_GuideK 0

Enabling additional users to handle administrative tasks for a particular object is referred to as:
A. Redirection
B. Assignment
C. Targeting
D. Delegation

HIDE ANSWERS

Correct Answer: D

227Which kind of group is only used for e-mail applications?


03/11/2017 – by Mod_GuideK 0

Which kind of group is only used for e-mail applications?


A. Exchange Admins group
B. Universal group
C. Security group
D. Distribution group

HIDE ANSWERS

Correct Answer: D

228Which tool should you use to track real-time system resource


utilization?
03/11/2017 – by Mod_GuideK 0

Which tool should you use to track real-time system resource utilization?
A. System Information
B. Component Services
C. Device Manager
D. Perfmon

HIDE ANSWERS

Correct Answer: D
Explanation/Reference:
Example:
How to use Perfmon to collect Microsoft Windows performance counters
Open the WinX menu in Windows 8 and select Run. Type perfmon.exe and hit Enter to open the Performance
Monitor. In the left pane, select the User Defined node, right-click on it and select New > Data Collector Set.
Etc.

229Which two Active Directory objects will be available by default?


03/11/2017 – by Mod_GuideK 0

You create a new domain. Which two Active Directory objects will be available by default? (Choose two)
A. Computer
B. Employee
C. User
D. Device
E. Server

HIDE ANSWERS

Correct Answer: AC
230Which group can create and link Group Policy Objects?
03/11/2017 – by Mod_GuideK 0

By default, which group can create and link Group Policy Objects?
A. Authenticated Users
B. Domain Users
C. Domain Administrators
D. Local Administrators

HIDE ANSWERS

Correct Answer: C

231What is the default location for a new user account in Active


Directory?
03/11/2017 – by Mod_GuideK 0

What is the default location for a new user account in Active Directory?
A. The Users Organizational Unit
B. The Accounts container
C. The Accounts Organizational Unit
D. The Users container

HIDE ANSWERS

Correct Answer: D

232Which provides centralized management of users and computers?


03/11/2017 – by Mod_GuideK 0

Which provides centralized management of users and computers?


A. Active Directory
B. Windows Internet Name Service (WINS)
C. Dynamic Host Configuration Protocol (DHCP)
D. Remote Access

HIDE ANSWERS

Correct Answer: A

233What should you do?


03/11/2017 – by Mod_GuideK 0
You need to apply a Windows Server 2008 group policy. You also need to prevent policies that are applied at
lower levels from affecting this new policy.
What should you do?
A. Set the policy to Loopback
B. Set the permission to Full Control
C. Select the Enforced policy link setting
D. Select the Enabled policy link setting

HIDE ANSWERS

Correct Answer: C

234You need to limit what a service can access. You should change the
service’s:
03/11/2017 – by Mod_GuideK 0

You need to limit what a service can access. You should change the service’s:
A. Dependencies
B. Status
C. Startup type
D. Logon options

HIDE ANSWERS

Correct Answer: D
Explanation/Reference:
Logon options include:
. Log on as: No change
Use this setting to keep the service’s logon credentials as previously configured.
. Log on as: Local System account
Use this setting to change the service’s logon credentials to the Local System account.
. Log on as: This account
Use this setting to change the service’s logon credentials to a specific local or domain user. This account and
Password settings become available once you click this option.

235Services that are required to enable another service to run are referred to
as service:
03/11/2017 – by Mod_GuideK 0

Services that are required to enable another service to run are referred to as service:
A. Roots
B. Prerequisites
C. Dependencies
D. Parents
E. Hosts

HIDE ANSWERS
Correct Answer: C

236Which two specifications are included in Microsoft’s hardware


requirements for Windows Server?
03/11/2017 – by Mod_GuideK 0

Which two specifications are included in Microsoft’s hardware requirements for Windows Server? (Choose
two)
A. USB ports
B. RAM
C. Processor speed
D. Disk I/O

HIDE ANSWERS

Correct Answer: BC
Explanation/Reference:
Example:
System Requirements for Windows Server 2012 Essentials
. CPU socket
1.4 GHz (64-bit processor) or faster for single core
1.3 GHz (64-bit processor) or faster for multi-core
. Memory (RAM)
2 GB
. Hard disk
160 GB hard disk with a 60 GB system partition

237What should you use?


03/11/2017 – by Mod_GuideK 0

You need to see what effect the applied group policies are having on an individual user or computer.
What should you use?
A. Local Users and Groups
B. Resultant Set of Policy
C. Local Security Policy
D. Effective Permissions

HIDE ANSWERS

Correct Answer: D
Explanation/Reference:
If you would like to find out what permissions a user or group has on an object, you can use the Effective
Permissions tool. It calculates the permissions that are granted to the specified user or group. The calculation
takes the permissions in effect from group membership into account, as well as any permissions inherited from
the parent object. It looks up all domain and local groups in which the user or group is a member.
238Which technology uses digital certificates for secure communications
over the Internet?
03/11/2017 – by Mod_GuideK 0

Which technology uses digital certificates for secure communications over the Internet?
A. Fully Qualified Domain Name (FQDN)
B. Internet Service Manager (ISM)
C. Secure Sockets Layer (SSL)
D. File Transfer Protocol (FTP)

HIDE ANSWERS

Correct Answer: C

239What is required for a computer to print to either a local or a network


printer?
03/11/2017 – by Mod_GuideK 0

What is required for a computer to print to either a local or a network printer?


A. 500 GB of free hard disk space
B. Printer Device Drivers
C. 1 GB of RAM
D. Administration tools

HIDE ANSWERS

Correct Answer: B

240What must you install in order to host a Web site on a Windows


Server?
03/11/2017 – by Mod_GuideK 0

What must you install in order to host a Web site on a Windows Server?
A. Active Directory Sites and Services
B. Windows Internet Naming Service (WINS)
C. Fully Qualified Domain Name (FQDN)
D. Internet Information Server (IIS)

HIDE ANSWERS

Correct Answer: D

241What should you do?


03/11/2017 – by Mod_GuideK 0

You need to centralize management of network printers. You also need to enable users to choose a printer
based on location. What should you do?
A. Create multiple print servers
B. Publish the printers in Active Directory
C. Set up Web printing
D. Create a printer pool

HIDE ANSWERS

Correct Answer: B

242Which technology is designed to help teams collaborate?


03/11/2017 – by Mod_GuideK 0

Which technology is designed to help teams collaborate?


A. Microsoft SharePoint Server
B. Microsoft System Center Operations Manager
C. Microsoft Forefront Identity Manager
D. Microsoft BizTalk Server

HIDE ANSWERS

Correct Answer: A
Explanation/Reference:
. Organizations use SharePoint to create websites. You can use it as a secure place to store, organize, share,
and access information from almost any device. All you need is a web browser, such as Internet Explorer,
Chrome, or Firefox.
. * SharePoint Workspace A desktop program that you can use to take SharePoint site content offline and
collaborate on the content with others while you are disconnected from the network. While you and other team
members are offline, you can make changes to SharePoint content that will eventually synchronize back to the
SharePoint site.
Incorrect Answers:
B: System Center 2012 - Operations Manager provides infrastructure monitoring that is flexible and cost-
effective, helps ensure the predictable performance and availability of vital applications, and offers
comprehensive monitoring for your datacenter and cloud, both private and public.
C: Microsoft Forefront Identity Manager 2010 R2 delivers self-service identity management for users,
automates lifecycle management across heterogeneous platforms for administrators, and provides a rich
policy framework for enforcing corporate security policies.
D: Microsoft BizTalk Server (or simply “BizTalk”) enables companies to automate business processes,
through the use of adapters which are tailored to communicate with different software systems used in an
enterprise

243Which file extension indicates a Hyper-V virtual disk file?


03/11/2017 – by Mod_GuideK 0
Which file extension indicates a Hyper-V virtual disk file?
A. . xml
B. . vhd
C. ,vud
D. . vsd

HIDE ANSWERS

Correct Answer: B

244A record of specific aspects of system performance over time is


referred to as a/an:
03/11/2017 – by Mod_GuideK 0

A record of specific aspects of system performance over time is referred to as a/an:


A. Threshold
B. Log
C. Event
D. Alert

HIDE ANSWERS

Correct Answer: B

245Which two are Windows Server Cluster types?


03/11/2017 – by Mod_GuideK 0

Which two are Windows Server Cluster types? (Choose two)


A. Shared storage
B. Failover
C. Network Load Balancing (NLB)
D. Shared services

HIDE ANSWERS

Correct Answer: BC
Explanation/Reference:
The difference between NLB and Windows Failover Cluster.
. An NLB array allows load to be spread amongst all the participating machines.
. A failover cluster provides high availability and redundancy, but doesn’t spread the load. Only one server is
live at any time, but the clustered application(s) can be moved to the other server very quickly.

246Which is an advantage of 64-bit operating systems over 32-bit


operating systems?
03/11/2017 – by Mod_GuideK 0
Which is an advantage of 64-bit operating systems over 32-bit operating systems?
A. Larger amounts of accessible RAM
B. More device drivers
C. More compatible applications
D. Cheaper hardware

HIDE ANSWERS

Correct Answer: A

247Which tool should you use?


03/11/2017 – by Mod_GuideK 0

You need to control which Microsoft Office updates are automatically deployed to client computers. Which
tool should you use?
A. Microsoft Office SharePoint Services (MOSS)
B. Windows Server Update Services (WSUS)
C. Windows Update
D. Microsoft Office Update

HIDE ANSWERS

Correct Answer: B

248To change the boot device order of a computer, you should use:
03/11/2017 – by Mod_GuideK 0

To change the boot device order of a computer, you should use:


A. Device Manager.
B. Disk Management.
C. BIOS settings.
D. Computer Policy.

HIDE ANSWERS

Correct Answer: C

249Which two locations can a Windows Server be backed up to?


03/11/2017 – by Mod_GuideK 0

Which two locations can a Windows Server be backed up to? (Choose two)
A. Network router
B. Local drive
C. Local DFS root share
D. Remote share folder
HIDE ANSWERS

Correct Answer: BD

250The purpose of the Information Technology Infrastructure Library is to


provide a:
03/11/2017 – by Mod_GuideK 0

The purpose of the Information Technology Infrastructure Library is to provide a:


A. Set of standards for networking protocols.
B. Set of best practices for managing IT services.
C. Downloadable library of hardware drivers.
D. Technical library of Windows infrastructure services.

HIDE ANSWERS

Correct Answer: B

You might also like