IT Support and Administration Exam Practice Tests - 409 Verified Questions

Page 1


IT Support and Administration Exam Practice Tests

Course Introduction

This course introduces students to the fundamental concepts and practical skills required for IT support and system administration roles. Covering hardware and software troubleshooting, operating system installation and configuration, network management, user account administration, and security protocols, students develop hands-on abilities essential for maintaining and supporting organizational IT infrastructure. The course emphasizes problem-solving, customer service, and documentation techniques, preparing students to efficiently address technical issues and ensure optimal system performance in real-world business environments.

Recommended Textbook MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson

Available Study Resources on Quizplus

10 Chapters

409 Verified Questions

409 Flashcards

Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8045

Sample Questions

Q1) Discuss the security risk of SID history if you are migrating accounts between forests that aren't completely trusted.

Answer: While SID history is a useful feature in a fully trusted environment, it can present a security risk if you are migrating accounts between forests that aren't completely trusted. Here's the risk. If an attacker obtains SID history data, he can assign these SIDs to the SID history attributed to accounts he creates in his own domain. These new accounts will now have access to resources based on the SIDs listed in SID history.

Q2) Fine-grained password and account ____ policies are a significant addition to Windows Server 2008.

A) lockout

B) length

C) timeout

D) login

Answer: A

Q3) Discuss what happens when SID filtering is disabled.

Answer: When SID filtering is disabled, it removes the security boundary between the forests and eliminates any isolation that previously existed.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Designing Physical Topology

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8046

Sample Questions

Q1) In Universal Group Membership Caching, the cached data is automatically renewed every ____ by default.

A) 30 minutes

B) 8 hours

C) 24 hours

D) 7 days

Answer: B

Q2) Data replicated between domain controllers includes all the additions, changes, and modifications of objects, such as when a user is added or a password is changed.

A)True

B)False

Answer: True

Q3) The infrastructure master works most efficiently if it is on a DC designated as a global catalog server.

A)True

B)False

Answer: False

Q4) Cached credentials only provide ____________________ access. Answer: local

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Designing and Implementing DNS

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8047

Sample Questions

Q1) The primary zone name is case sensitive.

A)True

B)False

Answer: False

Q2) The ____ file includes records to support name-to-IP address resolution.

A) reverse lookup zone

B) stub lookup zone

C) forward lookup zone

D) slave lookup zone

Answer: C

Q3) A(n) ____________________ name mimics a NetBIOS name.

Answer: single-label

Q4) If your organization has a DNS server hosting a standard primary server and you want to add more DNS servers in the zone, they must host ____.

A) Active Directory Integrated zones

B) Active Directory Integrated secondary zones

C) standard stub DNS zones

D) standard secondary DNS zones

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Designing and Implementing Group Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8048

Sample Questions

Q1) Explain how to create fine-grained policies.

Q2) When global groups are added to other global groups it is commonly called ____.

A) cascading

B) nesting

C) aggregating

D) concatenating

Q3) Discuss how OUs should be named.

Q4) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template

B) Starter

C) Reference

D) Instantiated

Q5) The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.

A) PAT protocol

B) NAP protocol

C) HTTP protocol

D) NAT protocol

Q6) Actual GPOs are commonly named based on their ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal

Services

Strategies

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8049

Sample Questions

Q1) In organizations that use several RADIUS servers, a RADIUS ____________________ server can be implemented as a central switching or routing point.

Q2) Describe a NAP client.

Q3) TS CALs are managed and maintained on a(n) ____________________ licensing server.

Q4) A Windows Server 2008 server can be used as a RADIUS server by adding the ____ service.

A) NPS

B) NAP

C) RADIUS

D) RRAS

Q5) A full-blown server configured as a router is more efficient than a dedicated hardware router.

A)True

B)False

Q6) List and describe two methods that users can use to start TS RemoteApp applications.

Q7) ______________________________ regularly perform system health updates on the client based on checks identified in SHVs. Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Designing and Implementing a PKI

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8050

Sample Questions

Q1) Using ____, you can execute command-line commands from one server against a remote server.

A) WinRS

B) WinSAT

C) WinRM

D) WCEUtil

Q2) The same public key can decrypt information encrypted with the public key.

A)True

B)False

Q3) List and describe two permissions that can be granted to enterprise admins.

Q4) A(n) ___________________ provides authentication, integrity, and non-repudiation.

Q5) The ____ can be added to a Microsoft Management Console (MMC) and used to request certificates from an enterprise CA.

A) Public-key snap-in

B) Computer Management snap-in

C) Encryption snap-in

D) Certificates snap-in

Q6) List and describe two AD CS role services.

Q7) Explain how to deploy trusted root certificates via group policy.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Securing Windows Server 2008 Servers

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8051

Sample Questions

Q1) Discuss using WSUS with branch offices.

Q2) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.

Q3) The scwcmd command transform is used to roll back the settings of the last applied SCW security policy.

A)True

B)False

Q4) ____ are a group of updates used to target a specific area such as security, or a specific component or application.

A) Service packs

B) Drivers

C) Update rollups

D) Updates

Q5) ____ logs an event when a user account or group is added, deleted, or modified, or when a password is set or modified.

A) Audit account management

B) Audit object management

C) Audit file management

D) Audit user management

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Designing High Availability and Business

Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8052

Sample Questions

Q1) If you want to back up only system state data using the Wbadmin command-line tool, you can use the following command:

A) Wbadmin delete systemstatebackup -backuptarget:x:

B) Wbadmin start systemstatebackup -backuptarget:x:

C) Wbadmin start sysrecovery -backuptarget:x:

D) Wbadmin start systemstaterecovery -backuptarget:x:

Q2) Describe how to add hosts to an NLB cluster.

Q3) The ____ feature of Windows Server 2008 can increase stability and provide scalability for applications and services.

A) System Load Balancing

B) Service Load Balancing

C) Operations Load Balancing

D) Network Load Balancing

Q4) Identify a limitation of using the native backup tools for Active Directory.

Q5) Describe how an authoritative restore of a single record will be properly replicated to the remainder of the directory.

Q6) A(n) ___________________ is a group of independent servers configured together to provide high availability of a service or application.

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Designing Supporting Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8053

Sample Questions

Q1) List two problems that loss of data can cause for a company.

Q2) SCOM includes the ____ Shell, which is a customized interface of Windows PowerShell.

A) Administration

B) Command

C) Configuration

D) Management

Q3) ____ is an add-on server product that can be used to monitor servers and client computers in an enterprise.

A) Microsoft System Center Configuration Manager 2007

B) Microsoft Enterprise Operation Center 2007

C) Microsoft System Center Virtual Machine Manager 2007

D) Microsoft System Center Operations Manager 2007

Q4) The command-line tool ____ removes NFS-mounted drives on UNIX systems.

A) dismount

B) remount

C) unmount

D) mount

Q5) List and describe two WSS tools that can be used for collaboration.

Q6) List and describe two benefits SCCM provides for an organization.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Designing Virtualization Strategies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/8054

Sample Questions

Q1) List and describe the two primary components of Microsoft Application Virtualization.

Q2) Describe the Microsoft SoftGrid Application Virtualization for Desktops.

Q3) In application streaming, the entire application is eventually streamed to the client.

A)True

B)False

Q4) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.

Q5) SCVMM includes wizards that help identify the best location of a physical server when it's migrated to a virtual server.

A)True

B)False

Q6) Describe the private virtual machine network setting in the Virtual Network Manager.

Q7) Virtual disks are configured as ___________________ expanding disks.

Q8) Discuss how a VPC machine can be used to provide access to a legacy application.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.