

Information Technology Management Study Guide Questions
Course Introduction
Information Technology Management explores the strategic use of information systems and technologies in contemporary organizations to achieve business goals and gain competitive advantages. The course covers key topics such as IT infrastructure, data management, cybersecurity, digital transformation, project management, and the alignment of IT strategies with organizational objectives. Students will examine case studies, evaluate IT governance frameworks, and analyze the ethical and legal considerations of IT deployment. Emphasis is placed on developing the skills necessary to plan, implement, and manage information technology resources effectively in various business contexts.
Recommended Textbook
MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) Discuss the difference between domain controllers and servers when raising the level to Windows Server 2008.
Answer: One might mistakenly think that all servers must run Windows Server 2008 to raise the level to Windows Server 2008. This is not true. Only the domain controllers must meet the required level. You can run Windows Server 2000 member servers in a domain at the domain functional level of Windows Server 2008.
Q2) Beyond autonomy, what are two other reasons to create separate domains?
Answer: To control replication traffic over WAN links
To protect the root domain (and the Enterprise Admins group)
Q3) You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____
A) netdom query trust
B) netdom query fsmo
C) netdom query pdc
D) netdom query dc
Answer: B
Q4) ____________________ is achieved when an organization can independently manage their data.
Answer: Data autonomy
To view all questions and flashcards with answers, click on the resource link above. Page 3
Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) Discuss the local Administrator's role on an RODC.
Answer: You can implement Administrator role separation on an RODC. In other words, you can enable the local Administrators role on an RODC by adding a user or group to that role. This user will then have the associated permission on the RODC to do regular maintenance, such as adding drivers or performing backups. However, the role membership will not grant the user any administrative rights or permissions in the domain.
When a server is promoted to a domain controller, the local database of users and groups is no longer available in Computer Management. This includes the local Administrators group. Instead, all accounts are managed through Active Directory Users and Computers, and permissions granted here apply to the entire domain. However, it is possible to enable the local Administrators role.
It's worth comparing the Server Operators group with the local Administrators role. You can add users or groups to the Active Directory Server Operators group, and they will have sufficient rights and permissions to administer any domain controllers without permissions to modify Active Directory. Notice the subtlety here: a member of the Server Operators group can administer any domain controller in the domain, while members of the local Administrators role can only administer the single RODC.
To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) Discuss when a delegated subdomain can be useful.
Answer: It's possible to create a delegated subdomain manually (without running DCpromo). This option can be useful if you want to prestage the delegated subdomains, or if your organization is already created with multiple domains but has grown large enough that you want to delegate name resolution to some of the domains to different DNS servers.
Q2) If a DNS server has a ____, it can authoritatively answer queries for hosts in that zone or with that common namespace.
A) DNS zone
B) DNS file
C) DNS slave
D) DNS stub
Answer: A
Q3) Explain why adding suffixes for a multiple-domain environment is not good solution.
Answer: Adding suffixes in a multiple-domain environment can affect the performance of the clients because each suffix must be searched.
Q4) A(n) ____________________ name mimics a NetBIOS name.
Answer: single-label
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) The _________________________ design is a simple OU design based on the structure of the organization.
Q2) Among the most risky devices in an organization are ____________________ flash drives.
Q3) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.
A) Template
B) Starter
C) Reference
D) Instantiated
Q4) Normally, only the ____ group is in the Security Filtering area.
A) Security Policy Administrators
B) Domain Users
C) Domain Administrators
D) Authenticated Users
Q5) What is the most common use of WMI filters?
Q6) Discuss how OUs should be named.
Q7) Describe the geography structure for OUs.
To view all questions and flashcards with answers, click on the resource link above. Page 6
Q8) What are the two commands that can be used to redirect computer accounts and user accounts?
Chapter 5: Designing Remote Access and Terminal
Services Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) A(n) _________________________ is used to determine which users are granted access to a remote access server.
Q2) A ____ is a Windows Server 2008 server with the Routing and Remote Access service installed and configured as a VPN server.
A) bridgehead server
B) VPN server
C) DMZ server
D) bastion server
Q3) Describe the NAP enforcement and extended state settings.
Q4) If NAP ____ is enabled, the SHV can direct the noncompliant client to enable a specific security solution to ensure that the client becomes compliant.
A) autoremediation
B) remediation
C) autocorrection
D) enforcement
Q5) TS CALs are managed and maintained on a(n) ____________________ licensing server.
Q6) List and explain two goals for NAP.
Q7) Discuss the purpose of TS Session Broker.

7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) Discuss how certificates issued to network devices can be used.
Q2) The same public key can decrypt information encrypted with the public key.
A)True
B)False
Q3) A ____ is approximately the size of a credit card, and includes a microprocessor and a user certificate.
A) smart card
B) token
C) trusted computing base
D) trusted computing module
Q4) An established public CA will have a root certificate in the ____.
A) Third-Party Certification Authorities store
B) Personal store
C) Trusted Certification Authorities store
D) Trusted Root Certification Authorities store
Q5) One or more people in an organization can be designated as ________________________ agents for specific templates, and can then request certificates on behalf of users.
Q6) Describe restricted enrollment agents.
Q7) List and describe two AD CS role services.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) The scwcmd command ____________________ is used to analyze a system against a policy and determine if the system is compliant with the policy.
Q2) Name and describe a primary tool used for compliance auditing.
Q3) Discuss options for creating a perimeter network.
Q4) You can use Server Manager to create a security policy that can be applied to any system to reduce the attack surface.
A)True
B)False
Q5) Explain the difference between an upstream server and a downstream server.
Q6) ____ logs tracking information events such as program activation and process exits.
A) Audit account management
B) Audit log purging
C) Audit process tracking
D) Audit token tracking
Q7) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
Q8) Explain how to install WSUS.
Q9) List and describe a primary benefit provided by WSUS.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) One percent downtime equates to more than ____ of downtime in a year.
A) 5 minutes 15 seconds
B) 52 minutes 34 seconds
C) 8 hours 46 minutes
D) 87 hours 36 minutes
Q2) Failover clusters can be used to provide fault tolerance at the disk level.
A)True
B)False
Q3) How can load balancing and fault tolerance be achieved?
Q4) An authoritative restore can mark a single object (such as the CEO's account), an entire OU, or the entire Active Directory database as authoritative.
A)True
B)False
Q5) There's no difference between fault tolerance at the disk level and at the server level.
A)True
B)False
Q6) The ___________________ tools feature in Windows Server Backup includes support for doing backups with Windows PowerShell commands and scripts.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) ____________________ folders are folders that are replicated to all members in the replication group.
Q2) List and describe a method of configuring DFS namespaces.
Q3) Identify and describe a method of providing user-level security for UNIX users with Services for NFS.
Q4) ____ is an advanced implementation of WSS that includes two versions (Standard and Enterprise).
A) Microsoft Office SharePoint Server 2007
B) Microsoft Office Portal Server 2003
C) Microsoft Office Communication Server 2007
D) Microsoft Office Live Server 2003
Q5) DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
A)True
B)False
Q6) Microsoft ____________________ is a full range of supporting server products designed to enhance and automate the administration of large networks within an enterprise.
Q7) List two applications through which RMS can be used to protect documents.
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) App-V applications are designed to provide a seamless user experience.
A)True
B)False
Q2) Describe the Microsoft SoftGrid Application Virtualization for Desktops.
Q3) The ____ setting in the Virtual Network Manager allows the virtual machines to have full connectivity on the network using the selected network adapter.
A) internal only
B) host only
C) external
D) NAT
Q4) What are the two components needed for hardware virtualization in Windows XP Mode?
Q5) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.
Q6) Discuss two benefits of server consolidation.
Q7) Discuss how a VPC machine can be used to provide access to a legacy application.
Q8) Describe Microsoft Application Virtualization for Terminal Services.
To view all questions and flashcards with answers, click on the resource link above. Page 12