-
General Knowledge
-
General Topics
- Abbreviations
- Books and Authors
- Famous Academies and Institutes
- First in India (Man)
- First in India (Women)
- Important Dates
- Famous Personalities
- Public Administration Science
- Astronomy
- Biology
- Botany
- Chemistry
- Physics
- Zoology
- Inventions and Scientists Geography
- Geographical Epithets India
- Geographical Epithets World
- Places Associated with Industries in India
- National Parks and Sanctuaries
- Towns on River Banks History
- Indian History and Culture
- Indian National Movement
- Indian Polity and Constitution
- Ancient Period in Indian History
- World History
- Governor General of India Culture
- Languages
- Indian Dance and Music
- Classical Dances of India
- Folk Dances in India and Tribal Dances in India
- Famous Dancers, Instrumentalists, Vocalists in India World
- First in the World
- Parliament Names
- United Nation Organizations (UNO)
- World's Famous News Agencies
- World Industries
- National Emblems
- Countries and Alternative Names
- Countries and Capitals
- View More topics...
- General Aptitude
- Problems on Ages
- Alligation and Mixture
- Area
- Arithmetic Progression
- Average
- Banker's Discount
- Boats and Streams
- Calendar
- Chain Rule
- Clock
- Compound Interest
- Decimal Fraction
- Height and Distance
- Logarithms
- Mensurations
- Numbers
- Odd Man Out and Series
- Partnership and Share
- Percentage
- Permutation and Combination
- Pipes and Cisterns
- Probability
- Problems on H.C.F and L.C.M
- Problems on Numbers
- Problems on Trains
- Profit and Loss
- Races and Games
- Ratio and Proportion
- Simple Interest
- Simplification
- Stocks and Shares
- Surds and Indices
- Time and Distance
- Time and Work
- True Discount
- Volume & Surface Areas
- General English
- Antonyms
- Synonyms
- Vocabulary Test
- One Word Substitution
- Sentence Completion
- Sentence Improvement
- Idioms & Phrases
- Homonyms
- Word Formation
- Active & Passive Voice
- Direct and Indirect Speech
- Spotting Errors
- Double Synonyms
- Choose the Appropriate Filter
- Spelling Test
- Transformation
- Reconstruction of Sentence
- Chooose the Correct or Incorrect Sentence
- Networking
- Interview Questions
-
Programming
- .NET
- Java
- ASP.NET
- C++
- Perl
- Python
- Ruby and Rails
- Struts
- Core Java
- Hibernate Database
- DB2
- MS SQL Server
- MySQL
- Oracle
- SQL
- DBMS
- Data Warehousing
- Data structures and Algorithms Cisco
- CCNA
- CCNP Routing
- CCNP Switching
- Internetworking
- Border Gateway Protocol Windows
- MCSE
- Exchange Server
- Windows Server 2008
- DNS & Active Directory
- Firewall Questions Linux
- Unix
- Linux Server Administrator
- Linux System Administrator
- Linux File Manipulation
- Database
- Home
- Server Administration
- MCSA Windows Server 2012
Instructions
- Total Questions 20
- Each question carry 1 mark
- Must answer all the questions (otherwise report card will not be generated)
- If you dont want to take a test, simply click the check answers button and view all the answers with explanations
- Do Not Refresh the Page
- No Time Limit
- Good Luck :)
- Installing and Configuring Windows Server 2012 R2
- Administering Windows Server 2012 R2
- Configuring Advanced Windows Server 2012 R2 Services
You Scored % - /
- The accessing of certain sensitive files must be logged.
- Modifications to certain sensitive files must be logged.
- System administrators must be able to provide information about which users accessed sensitive files and when they were accessed.
- All logon attempts for specific shared machines must be recorded.
Correct Answers :
[B, E, G, H]
Explanation :
The Active Directory Users and Computers tool allows system administrators to change auditing options and to choose which actions are audited. At the file system level, Isabel can specify exactly which actions are recorded in the audit log. She can then use Event Viewer to view the recorded information and provide it to the appropriate managers.
Correct Answers :
[B]
Explanation :
Offline files give you the opportunity to set up files and folders so that users can work on the data while outside the company walls. Offline files allows a user to work on files while at home without the need to be logged into the network.
Correct Answers :
[D]
Explanation :
The Secure Only option is for DNS servers that have an Active Directory Integrated zone. When a computer tries to register with DNS dynamically, the DNS server checks Active Directory to verify that the computer has an Active Directory account. If the computer that is trying to register has an account, DNS adds the host record. If the computer trying to register does not have an account, the record gets tossed away and the database is not updated.
Correct Answers :
[A]
Explanation :
If you need to complete a zone transfer from Microsoft DNS to a BIND (Unix) DNS server, you need to enable BIND Secondaries on the Microsoft DNS server.
Correct Answers :
[B]
Explanation :
The boot threshold for an interface controls how long the relay agent will wait before forwarding DHCP requests it hears on that interface.
Correct Answers :
[B]
Explanation :
Multilink PPP has nothing to do with encryption of data. Multilink is easy to set up, relatively low in cost, and it makes the connection faster.
Correct Answers :
[B, E]
Explanation :
By setting the Network Policy Server, you can force your DHCP users to use NAP on all of the DHCP scopes. This ensures that client systems meet minimum requirements to connect to a domain network.
Correct Answers :
[D]
Explanation :
Servers that are running Network Policy Server (NPS) are required to have a certificate installed on the NPS server.
Correct Answers :
[A]
Explanation :
Using images allows you to back up and restore your entire Windows Server 2012 R2 machine instead of just certain parts of data.
Correct Answers :
[C]
Explanation :
The Backup Once link allows you to start a backup on the Windows Server 2012 R2 system.
Correct Answers :
[C]
Explanation :
The Delegation of Control Wizard can be used to allow other system administrators permission to add GPO links.
Correct Answers :
[C]
Explanation :
The system administrator can specify whether the application will be uninstalled or whether future installations will be prevented.
Correct Answers :
[A, B, D]
Explanation :
Only the Standard, Datacenter, and Hyper-V editions of Windows Server 2012 R2 can participate in a failover cluster.
Correct Answers :
[A, B, D]
Explanation :
All versions of Windows Server 2012 R2 can participate in an NLB cluster except for the Windows Server 2012 R2 Hyper-V edition.
- The accessing of certain sensitive files must be logged.
- Modifications to certain sensitive files must be logged.
- System administrators must be able to provide information about which users accessed sensitive files and when they were accessed.
- All logon attempts for specific shared machines must be recorded.
Correct Answers :
[B, E, G, H]
Explanation :
The Group Policy Management Console allows system administrators to change auditing options and to choose which actions are audited. At the file system level, LaDonna can specify exactly which actions are recorded in the audit log. She can then use Event Viewer to view the recorded information and provide it to the appropriate managers.
Correct Answers :
[A]
Explanation :
The iSCSI default port is TCP 3260. Port 3389 is used for RDP, port 1433 is used for Microsoft SQL, and port 21 is used for FTP.
Correct Answers :
[A]
Explanation :
Using images allows you to back up and restore your entire Windows Server 2012 R2 machine instead of just certain parts of data.
Correct Answers :
[C]
Explanation :
If you need to get a stalled computer up and running as quickly as possible, you should start with the Last Known Good Configuration option. This option is used when you’ve made changes to your computer’s hardware configuration and are having problems restarting but have not logged into the machine. Last Known Good Configuration will revert to the configuration used the last time the computer was successfully booted.
Correct Answers :
[C]
Explanation :
Out of the possible answers provided, the only DHCP configuration option that would be both fault-tolerant and redundant is DHCP failover.
Correct Answers :
[B, C, D]
Explanation :
DNS registration is an advanced DHCP configuration. All three other options provide additional security for DNS on your network.
|
|
||||||||||||||||||||||||||||