Q1. Which of the following can be used to remotely connect to a Windows 7 computer?
A. Remote Desktop
B. Network Services
C. VPN
D. RDP
E. xRDP
Answer: A
Q2. Which of the following statements regarding user access and activity are TRUE?
A. Permissions are used to control user access to a domain.
B. Auditing is used to track user activity on a domain.
C. Authentication is used to allow a user access at the file system level.
D. The Event log track user activity on a client computer.
Answer: B
Q3. You work as a server administrator at ABC.com. You need to connect remotely to Windows Server 2008. How would you accomplish this task?
A. You should install and run Remote Assistance.
B. You should enable Remote Desktop in System Properties.
C. You should enable Remote Assistance in Control Panel.
D. You should enable and initialize RDC.
Answer: B
Q4. Which of the following provides a minimum server environment?
A. Virtualization
B. Windows PE
C. BareMetal Server
D. Server Core
Answer: D
Q5. Which of the following can be used to prevent the unauthorized configuration changes of the Windows Server 2008 operating system?
A. Control Panel
B. FireWall
C. UAC
D. System Monitor
Answer: C
Q6. A ______ backup only stores new and altered files to the backup set?
A. full
B. incremental
C. snap shot
D. shadow copy
Answer: B
Q7. You work as a server administrator at ABC.com. You want to install Windows Server 2008 R2 Enterprise Edition without needing to manually enter configuration information in the GUI dialog boxes. What type of installation should you perform?
A. You should perform an unattended installation.
B. You should perform a clean installation.
C. You should perform an in-place upgrade installation.
D. You should perform a SysPrep Image deployment installation.
Answer: A
Q8. Which of the following is required in Windows Server 2008 for print sharing?
A. The File Replication Service
B. The Server Service
C. The Computer Browser Service
D. The WebClient Service
E. The Terminal Service
Answer: B
Q9. Which of the following protocols is the default protocol that Active Directory uses to authenticate domain users?
A. Kerberos
B. MS-CHAPv2
C. Integrated Windows Authentication
D. RADIUS
E. RIS
Answer: A
Q10. Which of the following hard disk drives provide the best performance?
A. RAID-5
B. Sata
C. eSata
D. SSD
Answer: D