You are on page 1of 9

 Which of the following is used to boot a computer over the network?

PXE

 Which of the following is used to load a minimum version of Windows to troubleshooting and installation?
Windows PE

 Which two roles are available in WDS?


Deployment server
Transport Server

 Which of the following are necessary for deploying WDS? (Choose all that apply.)
ADDS
DHCP
DNS

 The answer file is made as a(n) _____ file


XML

 Which of the following allows you to package drivers together and deploy them with images?
Dynamic Driver Provisioning

 Which command allows you to modify an offline image?


DISM

 Which program is used to remove the computer name and SID from a computer?
System Preparation Utility

 Which of the following is used to convert a master computer to an image file?


Windows Deployment Service Capture utility
 Which of the following is the filename extension for install images and boot images?
WIM

 Which term best describes multiple hotfixes, security updates, and critical updates which are packaged together and thoroughly tested
together?
Service pack

 To specify which computers, get which updates, into which of the following categories should you divide the computers?
Computer groups

 Which of the following is the default port used for synchronization?


8530

 Which of the following WSUS modes has upstream WSUS servers share updates and the approval of updates with WSUS downstream
servers?
Replica

 Which of the following is the process of downloading updates for a WSUS server?
Synchronization

 Which term best describes when computers are automatically assigned to a computer group using group policies or by modifying the
registry?
Client-side targeting

 Which of the following is required in order to view reports in WSUS?


Microsoft Report Viewer 2008 Redistributable
 Which of the following is the default database used by WSUS?
WID

 Which of the following is the best strategy for getting all clients within an organization to use a WSUS server?
Use group policies.

 If a client is not part of a domain, client-side targeting can be accomplished by doing which of the following?
By modifying the registry

 Which of the following is the primary tool to add or remove server roles?
Server Manager

 Which of the following is used to view the Windows logs?


Event Viewer

 When you are troubleshooting a problem and decide to use the Event Viewer, which of the following should be used to help you focus on
a reduced set of events?
Filters

 Which of the following is used to modify a task after you add a basic task to an Event Viewer?
Task Scheduler

Which of the following allows you to view events from multiple computers using the Event Viewer?
Subscriptions

Which command is used to configure a collecting computer to receive an event subscription?


wecutil qc
Which program allows you to stop a running process?
Task Manager

Which of the following is used to group multiple performance counters so that they can be used over and over in Performance Monitor?
Data Collector Sets

 Which program allows you to determine what processes are using which network connections?
Netstat

 How many primary zones can a zone have?


1

 Which are often known as name servers?


DNS servers

 Which zone is used to translate host names to IP addresses?


Forward lookup zone

 Which would you use when you create a reverse lookup zone for the 172.25.0.0 subnet (subnet mask of 255.255.0.0)?
0.0.25.172

 Which is each node or leaf in the DNS tree referred to as?


Resource record

 Which is used to automatically create and update the host’s primary DNS server?
Dynamic updates
 Which zone contains only the necessary resource records that act as an authoritative name server?
Stub zone

 Which forwards queries to other DNS servers based on the DNS domain name in the query?
conditional forwarding

 Which sends DNS information from a zone on a DNS server to another DNS server?
Zone transfer

 Which command do you use to create a zone to a DNS on a DNS server?


dnscmd /zoneadd

 Which records are automatically created when you create a zone?


SOA
NS

 Which DNS resource record is used to map a host name to an IP address?


A

 Which DNS resource record specifies the authoritative information about a zone?
SOA record

 Which resource record defines an alias for a host name?


CNAME record

 Which type of zone do you find a PTR record in?


Reverse lookup zone
 Which record do you use to specify an organization’s mail server?
MX record

 Which of the following do you use to ensure the only computer that can update its own resource record is used?
Secure dynamic updates

 To scavenge DNS records, where must you enable scavenging and aging?
DNS server and zone

 Which command do you use to clear a computer’s DNS cache?


ipconfig /flushdns

 When is the TTL that is defined by the SOA overwritten?


When a resource record has its own TTL

 Which of the following can you find in RRAS? (Choose all that apply.)
Routing
NAT

 If you want to use VPN Reconnect, which VPN protocol should you use?
IKEv2

 You want to make a server running Windows Server 2012 into a VPN server. However,the networking team allows only HTTPS through
the firewall. Which VPN protocol should you use?
SSTP
 You want to start using smartcards with the VPN. What authentication protocol should you use?
EAP
 Which authentication protocol should you not use because it is the least secure?
PAP

 How do you allow split tunnelling?


Open Advanced TCP/IP Settings and deselect Use default gateway on remote network.

 What is the easiest way to set up a VPN client on a computer for a user that is not technical?
Use CMAK to create an executable to install.

 Which option would you use to make sure that a user can dial in using only his or her home phone?
Always Call-back To

 Which tab in the RIP properties would you use to prevent routes being received from a router located on 10.10.10.10?
Security

 Which option should you use with the Route command when creating a static route that will ensure the route is still available if the
computer is rebooted?
-p

 You have the following servers for DirectAccess:


•Domain Controller/DNS server running Windows Server 2008 operating at Windows Server2003 domain functional level
•Certificate Authority running Windows Server 2012
•File server running Windows Server 2008 R2
•DirectAccess Server running Windows Server 2012
Which of the following servers do you need to modify?
Upgrade the domain controller to Windows Server 2008 R2.
 You are to configure the network location server (NLS). Which web server (IIS) role service should you install on the NLS server?
IP and domain restrictions

 You have installed and configured a DirectAccess server. You created a group called DA Clients. However, when users log on to their
computers, the computers are not configured to use DirectAccess. What do you need to do to configure the clients to use DirectAccess?
Make sure that the client computer is added to the DA Clients group.

 You are configuring DirectAccess on Server1. Which step do you need to perform to ensure that Server1 can initiate connections to
DirectAccess client computers?
Infrastructure servers

 How can you identify the URL of the network location server that a client is using?
Run the netsh namespace show effective policy command.

 What two steps do you need to perform on the DNS server so that it can support DirectAccess?
Remove the ISATAP from the DNS global query block.
Add a record for the NSL server.

 You have a client that is configured for DirectAccess. The client is connected to the Internet from home. How can you verify whether the
client can resolve the DirectAccess server called server1.contosol.com?
Run the ping server1.contoso.com command.

 You have configured a server called Server1 as a DirectAccess server.How do you need to configure the Windows Firewall on the server
to support DirectAccess?
Allow ICMPv6 Echo Request

 Which table is used to determine the behaviour of the DNS clients when determining the address of internal resources?
NRTP
Which of the following clients can connect to a DirectAccess server?(Choose all that apply.)
Windows 8 Enterprise
Windows 7 Ultimate

You might also like