Information Technology Management Study Guide Questions - 409 Verified Questions

Page 1


Information Technology Management Study Guide Questions

Course Introduction

Information Technology Management explores the strategic use of information systems and technologies in contemporary organizations to achieve business goals and gain competitive advantages. The course covers key topics such as IT infrastructure, data management, cybersecurity, digital transformation, project management, and the alignment of IT strategies with organizational objectives. Students will examine case studies, evaluate IT governance frameworks, and analyze the ethical and legal considerations of IT deployment. Emphasis is placed on developing the skills necessary to plan, implement, and manage information technology resources effectively in various business contexts.

Recommended Textbook

MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson

Available Study Resources on Quizplus

10 Chapters

409 Verified Questions

409 Flashcards

Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8045

Sample Questions

Q1) Discuss the difference between domain controllers and servers when raising the level to Windows Server 2008.

Answer: One might mistakenly think that all servers must run Windows Server 2008 to raise the level to Windows Server 2008. This is not true. Only the domain controllers must meet the required level. You can run Windows Server 2000 member servers in a domain at the domain functional level of Windows Server 2008.

Q2) Beyond autonomy, what are two other reasons to create separate domains?

Answer: To control replication traffic over WAN links

To protect the root domain (and the Enterprise Admins group)

Q3) You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____

A) netdom query trust

B) netdom query fsmo

C) netdom query pdc

D) netdom query dc

Answer: B

Q4) ____________________ is achieved when an organization can independently manage their data.

Answer: Data autonomy

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Designing Physical Topology

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8046

Sample Questions

Q1) Discuss the local Administrator's role on an RODC.

Answer: You can implement Administrator role separation on an RODC. In other words, you can enable the local Administrators role on an RODC by adding a user or group to that role. This user will then have the associated permission on the RODC to do regular maintenance, such as adding drivers or performing backups. However, the role membership will not grant the user any administrative rights or permissions in the domain.

When a server is promoted to a domain controller, the local database of users and groups is no longer available in Computer Management. This includes the local Administrators group. Instead, all accounts are managed through Active Directory Users and Computers, and permissions granted here apply to the entire domain. However, it is possible to enable the local Administrators role.

It's worth comparing the Server Operators group with the local Administrators role. You can add users or groups to the Active Directory Server Operators group, and they will have sufficient rights and permissions to administer any domain controllers without permissions to modify Active Directory. Notice the subtlety here: a member of the Server Operators group can administer any domain controller in the domain, while members of the local Administrators role can only administer the single RODC.

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Designing and Implementing DNS

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8047

Sample Questions

Q1) Discuss when a delegated subdomain can be useful.

Answer: It's possible to create a delegated subdomain manually (without running DCpromo). This option can be useful if you want to prestage the delegated subdomains, or if your organization is already created with multiple domains but has grown large enough that you want to delegate name resolution to some of the domains to different DNS servers.

Q2) If a DNS server has a ____, it can authoritatively answer queries for hosts in that zone or with that common namespace.

A) DNS zone

B) DNS file

C) DNS slave

D) DNS stub

Answer: A

Q3) Explain why adding suffixes for a multiple-domain environment is not good solution.

Answer: Adding suffixes in a multiple-domain environment can affect the performance of the clients because each suffix must be searched.

Q4) A(n) ____________________ name mimics a NetBIOS name.

Answer: single-label

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Designing and Implementing Group Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8048

Sample Questions

Q1) The _________________________ design is a simple OU design based on the structure of the organization.

Q2) Among the most risky devices in an organization are ____________________ flash drives.

Q3) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template

B) Starter

C) Reference

D) Instantiated

Q4) Normally, only the ____ group is in the Security Filtering area.

A) Security Policy Administrators

B) Domain Users

C) Domain Administrators

D) Authenticated Users

Q5) What is the most common use of WMI filters?

Q6) Discuss how OUs should be named.

Q7) Describe the geography structure for OUs.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Q8) What are the two commands that can be used to redirect computer accounts and user accounts?

Chapter 5: Designing Remote Access and Terminal

Services Strategies

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8049

Sample Questions

Q1) A(n) _________________________ is used to determine which users are granted access to a remote access server.

Q2) A ____ is a Windows Server 2008 server with the Routing and Remote Access service installed and configured as a VPN server.

A) bridgehead server

B) VPN server

C) DMZ server

D) bastion server

Q3) Describe the NAP enforcement and extended state settings.

Q4) If NAP ____ is enabled, the SHV can direct the noncompliant client to enable a specific security solution to ensure that the client becomes compliant.

A) autoremediation

B) remediation

C) autocorrection

D) enforcement

Q5) TS CALs are managed and maintained on a(n) ____________________ licensing server.

Q6) List and explain two goals for NAP.

Q7) Discuss the purpose of TS Session Broker.

7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Designing and Implementing a PKI

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8050

Sample Questions

Q1) Discuss how certificates issued to network devices can be used.

Q2) The same public key can decrypt information encrypted with the public key.

A)True

B)False

Q3) A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.

A) smart card

B) token

C) trusted computing base

D) trusted computing module

Q4) An established public CA will have a root certificate in the ____.

A) Third-Party Certification Authorities store

B) Personal store

C) Trusted Certification Authorities store

D) Trusted Root Certification Authorities store

Q5) One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.

Q6) Describe restricted enrollment agents.

Q7) List and describe two AD CS role services.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Securing Windows Server 2008 Servers

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8051

Sample Questions

Q1) The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.

Q2) Name and describe a primary tool used for compliance auditing.

Q3) Discuss options for creating a perimeter network.

Q4) You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.

A)True

B)False

Q5) Explain the difference between an upstream server and a downstream server.

Q6) ____ logs tracking information events such as program activation and process exits.

A) Audit account management

B) Audit log purging

C) Audit process tracking

D) Audit token tracking

Q7) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.

Q8) Explain how to install WSUS.

Q9) List and describe a primary benefit provided by WSUS.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business

Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8052

Sample Questions

Q1) One percent downtime equates to more than ____ of downtime in a year.

A) 5 minutes 15 seconds

B) 52 minutes 34 seconds

C) 8 hours 46 minutes

D) 87 hours 36 minutes

Q2) Failover clusters can be used to provide fault tolerance at the disk level.

A)True

B)False

Q3) How can load balancing and fault tolerance be achieved?

Q4) An authoritative restore can mark a single object (such as the CEO's account), an entire OU, or the entire Active Directory database as authoritative.

A)True

B)False

Q5) There's no difference between fault tolerance at the disk level and at the server level.

A)True

B)False

Q6) The ___________________ tools feature in Windows Server Backup includes support for doing backups with Windows PowerShell commands and scripts.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Designing Supporting Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8053

Sample Questions

Q1) ____________________ folders are folders that are replicated to all members in the replication group.

Q2) List and describe a method of configuring DFS namespaces.

Q3) Identify and describe a method of providing user-level security for UNIX users with Services for NFS.

Q4) ____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).

A) Microsoft Office SharePoint Server 2007

B) Microsoft Office Portal Server 2003

C) Microsoft Office Communication Server 2007

D) Microsoft Office Live Server 2003

Q5) DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.

A)True

B)False

Q6) Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.

Q7) List two applications through which RMS can be used to protect documents.

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/8054

Sample Questions

Q1) App-V applications are designed to provide a seamless user experience.

A)True

B)False

Q2) Describe the Microsoft SoftGrid Application Virtualization for Desktops.

Q3) The ____ setting in the Virtual Network Manager allows the virtual machines to have full connectivity on the network using the selected network adapter.

A) internal only

B) host only

C) external

D) NAT

Q4) What are the two components needed for hardware virtualization in Windows XP Mode?

Q5) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.

Q6) Discuss two benefits of server consolidation.

Q7) Discuss how a VPC machine can be used to provide access to a legacy application.

Q8) Describe Microsoft Application Virtualization for Terminal Services.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.