A short, 30-question quiz that covers the span of the material in 70-292. It touches base on the major topics, but you will need to study much more in depth to be successful.
IIS does not install the FTP service by default
The FTP service is being blocked by the Windows Firewall
The FTP service is not compatible with Windows Server 2003
IIS does not include an FTP server
The WWW service is taking precedence over the FTP service
Rate this question:
Security groups control access to resources while distribution groups do not
Distribution groups control access to resources while security groups do not
Both security and distribution groups control access to resources
Neither security nor distribution groups control access to resources
Security groups are the same as distribution groups
Rate this question:
The user is using Windows 2000, which is not compatible with shadow copies
The user does not have file and print sharing enabled
The server has too many concurrent requests
The shadow copies schedule is not set to download or shadow often enough
The user does not have the correct permissions to access the shared folder
Rate this question:
F2 during BIOS
F2 during setup
F2 during Windows Screen
F8 during setup
F8 at login
Rate this question:
Key system configuration settings
OS components
System services
Program files
System state data
Rate this question:
The updates were not downloaded correctly
The network is not functioning
Remote Desktop Protocol is not enabled
WWW Service is not enabled
You did not approve the updates for deployment
Rate this question:
Dsadd computer PETEROSE
Useradd PETEROSE
Csve PETE ROSE
Dsadd user PETEROSE
None of the above
Rate this question:
RDP must be enabled on the remote host (the server)
The user must be a member of the Remote Desktop Users Group
Allow Logon Through Terminal Services must be enabled
The user must have terminal services installed
The user's account must be enabled to Allow Terminal Services
Rate this question:
Volume shadow copies allows for the opening of locked files but not opened files
Volume shadow copies allows for the opening of hidden files but not opened files
Volume shadow copies allows for the opening of opened files but not locked files
Volume shadow copies allows for the opening of opened files but not hidden files
Volume shadow copies allows for the opening of both opened and locked files
Rate this question:
WMIC.exe QFE
WSUS.exe QFE
WMIC.exe
WSUS.exe
None of the Above
Rate this question:
/printers/
/printing/
Rate this question:
Shadow volume copies are more secure
Users can easily restore files backed up via shadow volume copies
Administrators can choose the interval that shadow volume copies operates under
Regular backups use more file or disk space
None of the above
Rate this question:
Defines the unique IP address mapped to each zone
Defines the unique zone mapped to each IP address
Defines the DNS server that will handle requests to a specific zone
Defines the MAC address per each unique IP address
Defines the zone of the requesting client
Rate this question:
Microsoft.com
Windows.microsoft.com
Star.company
Star-company.com
Rate this question:
A
C
MX
B
None of the Above
Rate this question:
Windows 2000 mixed
Windows 2000 native
Windows Server 2003 interim
Windows Server 2003
All of the above are functional levels
Rate this question:
Users should be granted permission only to access non-confidential data
A network should allow only the minority of users to access the majority of confidential data
Access to data and resources should be granted on an as-needed basis
No data should ever be allowed to be accessed without some form of login privilege
Users should be granted as many permissions as possible
Rate this question:
Secondary zones do not hold records
Secondary zones are read-only
Secondary zones are only used without records
Secondary zones cannot be used in conjunction with primary zones
Records are only kept on primary servers
Rate this question:
The syntax of the command is incorrect
The command only works on Windows Server 2000 DNS servers
The command only works on DNS clients
The server requires a reboot before the command is successful
None of the above
Rate this question:
Hash rule, certificate rule, path rule, zone rule
Certificate rule, hash rule, path rule, zone rule
Hash rule, path rule, zone rule, certificate rule
Path rule, zone rule, hash rule, certificate rule
None of the above
Rate this question:
Through Security Options in Local Policy
Through Group Policy
By typing in the recovery console prompt: "allowremoveable"
There is no way to accomplish this
None of the above
Rate this question:
System state data
Service information
Local security policy
Local settings
Password policy
Rate this question:
Sysvol directory
Registry
Active directory
COM+ files
All are included
Rate this question:
Security groups cannot be universal
Group scopes are related to group types
Group scopes are not related to group types
Distribution groups are always universal
None of the above
Rate this question:
They increase the availability of primary and secondary zone servers
They increase the security of a DNS Server by providing SSL and TLS encryption
They are authoratative
They allow for increased administrative precision
None of the above
Rate this question:
It supports up to 32 GB RAM
It supports up to 8 CPU's
It does not support node clustering
It supports up to 4 node clusters
None of the above
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.