

IT Support and Administration Exam Practice Tests
Course Introduction
This course introduces students to the fundamental concepts and practical skills required for IT support and system administration roles. Covering hardware and software troubleshooting, operating system installation and configuration, network management, user account administration, and security protocols, students develop hands-on abilities essential for maintaining and supporting organizational IT infrastructure. The course emphasizes problem-solving, customer service, and documentation techniques, preparing students to efficiently address technical issues and ensure optimal system performance in real-world business environments.
Recommended Textbook MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) Discuss the security risk of SID history if you are migrating accounts between forests that aren't completely trusted.
Answer: While SID history is a useful feature in a fully trusted environment, it can present a security risk if you are migrating accounts between forests that aren't completely trusted. Here's the risk. If an attacker obtains SID history data, he can assign these SIDs to the SID history attributed to accounts he creates in his own domain. These new accounts will now have access to resources based on the SIDs listed in SID history.
Q2) Fine-grained password and account ____ policies are a significant addition to Windows Server 2008.
A) lockout
B) length
C) timeout
D) login
Answer: A
Q3) Discuss what happens when SID filtering is disabled.
Answer: When SID filtering is disabled, it removes the security boundary between the forests and eliminates any isolation that previously existed.
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) In Universal Group Membership Caching, the cached data is automatically renewed every ____ by default.
A) 30 minutes
B) 8 hours
C) 24 hours
D) 7 days
Answer: B
Q2) Data replicated between domain controllers includes all the additions, changes, and modifications of objects, such as when a user is added or a password is changed.
A)True
B)False
Answer: True
Q3) The infrastructure master works most efficiently if it is on a DC designated as a global catalog server.
A)True
B)False
Answer: False
Q4) Cached credentials only provide ____________________ access. Answer: local
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) The primary zone name is case sensitive.
A)True
B)False
Answer: False
Q2) The ____ file includes records to support name-to-IP address resolution.
A) reverse lookup zone
B) stub lookup zone
C) forward lookup zone
D) slave lookup zone
Answer: C
Q3) A(n) ____________________ name mimics a NetBIOS name.
Answer: single-label
Q4) If your organization has a DNS server hosting a standard primary server and you want to add more DNS servers in the zone, they must host ____.
A) Active Directory Integrated zones
B) Active Directory Integrated secondary zones
C) standard stub DNS zones
D) standard secondary DNS zones
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) Explain how to create fine-grained policies.
Q2) When global groups are added to other global groups it is commonly called ____.
A) cascading
B) nesting
C) aggregating
D) concatenating
Q3) Discuss how OUs should be named.
Q4) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.
A) Template
B) Starter
C) Reference
D) Instantiated
Q5) The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.
A) PAT protocol
B) NAP protocol
C) HTTP protocol
D) NAT protocol
Q6) Actual GPOs are commonly named based on their ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal
Services
Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) In organizations that use several RADIUS servers, a RADIUS ____________________ server can be implemented as a central switching or routing point.
Q2) Describe a NAP client.
Q3) TS CALs are managed and maintained on a(n) ____________________ licensing server.
Q4) A Windows Server 2008 server can be used as a RADIUS server by adding the ____ service.
A) NPS
B) NAP
C) RADIUS
D) RRAS
Q5) A full-blown server configured as a router is more efficient than a dedicated hardware router.
A)True
B)False
Q6) List and describe two methods that users can use to start TS RemoteApp applications.
Q7) ______________________________ regularly perform system health updates on the client based on checks identified in SHVs. Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) Using ____, you can execute command-line commands from one server against a remote server.
A) WinRS
B) WinSAT
C) WinRM
D) WCEUtil
Q2) The same public key can decrypt information encrypted with the public key.
A)True
B)False
Q3) List and describe two permissions that can be granted to enterprise admins.
Q4) A(n) ___________________ provides authentication, integrity, and non-repudiation.
Q5) The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.
A) Public-key snap-in
B) Computer Management snap-in
C) Encryption snap-in
D) Certificates snap-in
Q6) List and describe two AD CS role services.
Q7) Explain how to deploy trusted root certificates via group policy.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) Discuss using WSUS with branch offices.
Q2) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
Q3) The scwcmd command transform is used to roll back the settings of the last applied SCW security policy.
A)True
B)False
Q4) ____ are a group of updates used to target a specific area such as security, or a specific component or application.
A) Service packs
B) Drivers
C) Update rollups
D) Updates
Q5) ____ logs an event when a user account or group is added, deleted, or modified, or when a password is set or modified.
A) Audit account management
B) Audit object management
C) Audit file management
D) Audit user management
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) If you want to back up only system state data using the Wbadmin command-line tool, you can use the following command:
A) Wbadmin delete systemstatebackup -backuptarget:x:
B) Wbadmin start systemstatebackup -backuptarget:x:
C) Wbadmin start sysrecovery -backuptarget:x:
D) Wbadmin start systemstaterecovery -backuptarget:x:
Q2) Describe how to add hosts to an NLB cluster.
Q3) The ____ feature of Windows Server 2008 can increase stability and provide scalability for applications and services.
A) System Load Balancing
B) Service Load Balancing
C) Operations Load Balancing
D) Network Load Balancing
Q4) Identify a limitation of using the native backup tools for Active Directory.
Q5) Describe how an authoritative restore of a single record will be properly replicated to the remainder of the directory.
Q6) A(n) ___________________ is a group of independent servers configured together to provide high availability of a service or application.
Page 11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) List two problems that loss of data can cause for a company.
Q2) SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.
A) Administration
B) Command
C) Configuration
D) Management
Q3) ____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.
A) Microsoft System Center Configuration Manager 2007
B) Microsoft Enterprise Operation Center 2007
C) Microsoft System Center Virtual Machine Manager 2007
D) Microsoft System Center Operations Manager 2007
Q4) The command-line tool ____ removes NFS-mounted drives on UNIX systems.
A) dismount
B) remount
C) unmount
D) mount
Q5) List and describe two WSS tools that can be used for collaboration.
Q6) List and describe two benefits SCCM provides for an organization.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) List and describe the two primary components of Microsoft Application Virtualization.
Q2) Describe the Microsoft SoftGrid Application Virtualization for Desktops.
Q3) In application streaming, the entire application is eventually streamed to the client.
A)True
B)False
Q4) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.
Q5) SCVMM includes wizards that help identify the best location of a physical server when it's migrated to a virtual server.
A)True
B)False
Q6) Describe the private virtual machine network setting in the Virtual Network Manager.
Q7) Virtual disks are configured as ___________________ expanding disks.
Q8) Discuss how a VPC machine can be used to provide access to a legacy application.
To view all questions and flashcards with answers, click on the resource link above. Page 13