Term
7.1 How many WSUS servers within a single organization need to contact the Microsoft Update Web site to get a list of available updates? |
|
Definition
|
|
Term
7.1 When should you deploy multiple independent WSUS servers? How is this configuration similar to a single WSUS server? |
|
Definition
o When you have large networks in different physical locations, or for different groups when each server is managed separately. Each server must contact Microsoft Update. |
|
|
Term
7.1 How would you deploy WSUS when an Internet connection is not allowed for an isolated network? |
|
Definition
o Connect one WSUS server configure its settings, export the settings to removable media, import the settings on the disconnected WSUS server. |
|
|
Term
7.1 When using client-side targeting, how do you identify the computer group for a specific computer? How does this differ from server-side targeting? |
|
Definition
o With client side targeting, group membership is determined via registry settings on the client or via group policy. With Server side targeting membership is assign manually via the WSUS console. |
|
|
Term
7.1 By default, where does a client's Automatic Updates feature look for available updates? How would you change this when using WSUS? |
|
Definition
o The default is the Microsoft website. The easiest way to change this for WSUS is to use group policy. |
|
|
Term
7.2 What is the relationship between a counter and an object? |
|
Definition
o A counter is a specific statistic for an object such as %Disk Read Time is a counter for the object PhysicalDisk |
|
|
Term
7.2 What kind of data collector allows you to capture software process events? |
|
Definition
|
|
Term
7.2 What action can you take if you want to know when the CPU in a system runs over 80% more than 15% of the time? |
|
Definition
Configure a performance counter alert for the CPU |
|
|
Term
7.2 What is the purpose of a baseline when monitoring system performance? |
|
Definition
o Helps determine when changes negatively impact performance or when systems need upgrading or replacing |
|
|
Term
7.2 Which WSRM policy allocates resources evenly between Remote Desktop Services sessions? |
|
Definition
o Weighted Remote Sessions Policy |
|
|
Term
7.3 How does a custom view differ from adding a filter to a log? |
|
Definition
o A custom view is persistent whereas when you filter a log, it only applies to the selected log and only lasts until event viewer is closed. |
|
|
Term
7.3 How can you combine events from multiple logs into a single report? |
|
Definition
|
|
Term
7.3 How can you combine events from multiple servers onto a single server? |
|
Definition
Configure Event Subscriptions |
|
|
Term
7.3 Which tasks can you attach to an event or log? |
|
Definition
Run A Program; Send an Email; Display a Message |
|
|
Term
7.3 What is the default extension for saved event log files? |
|
Definition
.evt Can also be saved as TXT, XML, or CSV |
|
|
Term
7.3 Which operating systems support event subscriptions? |
|
Definition
o Windows Vista, Server 2008 or later systems |
|
|
Term
7.3 Which log do you view to see events generated on other computers using event subscriptions? |
|
Definition
o Events are saved on the Collector Computer where they can be manipulated in the event log just like any other event. |
|
|
Term
7.4 How do firewall ports affect your ability to remotely manage a server? |
|
Definition
o Depending on the tool you would like to use you may need to open specific ports on the firewall to allow the application through. Remote Desktop open 3389, RD Gateway open 443, etc. |
|
|
Term
7.4 What firewall port must be opened for Remote Desktop connections? |
|
Definition
|
|
Term
7.4 What advantage does using RD Gateway have over using Remote Desktop? |
|
Definition
o Allows clients to establish a RD connection using RDP over HTTPS [OR] RD Gateway uses port 443 which is open by default on most firewalls.
Encrypts Traffic Works through NAP |
|
|
Term
7.4 What is the effect of enabling the Remote Administration exception in the firewall? |
|
Definition
Allows you to use MMC snap-ins from a server to connect to a remote server.
Ports needed to manage snap ins are opened automatically |
|
|
Term
7.4 What are the operating system requirements for RSAT? |
|
Definition
o Windows 7 or Server 2k8 and 2K8 r2 |
|
|
Term
7.4 Which remote administration tools could you use if the firewall had only ports 80 and 443 open? |
|
Definition
Windows Remote Shell RD Gateway |
|
|
Term
7.5 What is the difference between auditing for success and auditing for failure? |
|
Definition
o Audit Success –to identify who has gained access or who was able to exercise a right or privilege Audit Failure –identify patterns of attempted success |
|
|
Term
7.5 What is the difference between Account Logon and Logon auditing? |
|
Definition
o Account Logon tracks when a user account is used to authenticate to a computer Account Management tracks changes to user accounts |
|
|
Term
7.5 What additional step must you complete in order to audit NTFS file access? |
|
Definition
o Configure auditing on the specific objects to be audited. |
|
|
Term
7.5 How can you configure auditing to track changes to Active Directory objects? |
|
Definition
o Configure the Directory Service Access audit policy. |
|
|
Term
7.5 What are the results of excessive auditing? |
|
Definition
o Increases the number of entries in the log making it harder to find things you’re looking for |
|
|
Term
7.5 Which event IDs are recorded when a change is made to an Active Directory object? |
|
Definition
o 5136 (Modify) 5137 (Create) 5138 (Undelete) 5139 (Move) |
|
|
Term
7.6 How can you modify permissions assigned using the Delegation of Control wizard? How do you reset permissions on Active Directory objects to the default settings? |
|
Definition
o You cannot modify permissions using the wizard. DSCALS/resetDefaultDACL |
|
|
Term
7.6 What can a user who is a member of the DnsAdmins group do? |
|
Definition
Manage all DNS servers in the domain |
|
|
Term
7.6 How can you allow a user to manage only a single server? |
|
Definition
Add them to a local administrator on that server |
|
|
Term
7.6 How do you allow users to modify content in DFS folders and in IIS virtual directories? |
|
Definition
For both cases configure NTFS permissions and grant read/write permissions |
|
|
Term
7.6 Which built-in groups let you allow users to view server performance information and events? |
|
Definition
Performance Log Users & Performance Monitor Users |
|
|
Term
7.6 When would you use the Server Operators built-in group? |
|
Definition
o Log on locally and shut down system Backup and restore files Change system time Create and delete shared resources |
|
|
Term
7.7 Which tool would you use to ask "What if?" questions about GPO design and application? |
|
Definition
|
|
Term
7.7 When running Group Policy Results, why does the target computer need to be turned on? |
|
Definition
The utility contacts the destination CPU and queries it for effective Group Policy settings |
|
|
Term
7.7 When are computer and user GPO settings applied? |
|
Definition
Each time a computer boots Each time a user logs on Every 90 minutes for domain computers Every 5 minutes for domain controllers |
|
|
Term
7.7 How do you force the reapplication of GPO settings? |
|
Definition
o Use the Gpupdate/force command |
|
|
Term
7.8 How is using System Center Configuration Manager similar to using Group Policy for software distribution? |
|
Definition
o You can use both to install applications locally on computers but SCCM has greater capability. |
|
|
Term
7.8 What advantage does using System Center Data Protection Manager have over using Windows Server Backup? |
|
Definition
o DPM provides a greater level of control by allowing you to backup a variety of systems and data types such as exchange storage servers, SQL databases, SharePoint farms, files on client computers, and more. It also allows for command line scripting using windows PowerShell as well as support for tape backup. |
|
|
Term
7.8 What advantage does using System Center Operations Manager have over using Performance Monitor? |
|
Definition
o SCOM can monitor thousands of computers and provides a comprehensive view of their health. |
|
|
Term
7.8 What advantage does using System Center Virtual Machine Manager have over using Hyper-V Manager? |
|
Definition
o VMM allows you to manage all your virtual machines and VM components from a single console. |
|
|
Term
8.1 Which backup storage type(s) would you choose if you wanted to be able to restore individual folders or files? |
|
Definition
A shared folder or attatched disk |
|
|
Term
8.1 What volumes are always included in scheduled backups? How can you create a backup to exclude these volumes? |
|
Definition
System volumes are always included and cannot be excluded from a scheduled backup. A manual back would need to be used. |
|
|
Term
8.1 How can you create automatic backups with a frequency less than once a day? |
|
Definition
Use Task Scheduler and the wbadmin start backup command |
|
|
Term
8.1 Which backup methods include a backup of the system state information? |
|
Definition
Full server backups include the system state information automatically |
|
|
Term
8.2 What is the difference between an authoritative and a nonauthoritative restore? |
|
Definition
o Nonauthoritative restores the DC to and AD to its state at the time of backup and then syncs with the other domain controllers on the network. Authoritative will be used to restore a designated object or container to its state at the time of backup. Prevents overwriting by Active Directory Replication. |
|
|
Term
8.2 How can snapshots help you preserve Active Directory data? Why are they not as useful as a backup when you need to restore large numbers of objects? |
|
Definition
o They allow you to see how the AD looked at the time of the snapshot. However they are read only you cannot restore from them. |
|
|
Term
8.2 Which backup type should you perform if you want to back up the Active Directory database? |
|
Definition
|
|
Term
8.2 When would you use a full server restore instead of another method to recover a domain controller? |
|
Definition
If you are unable to reboot the server |
|
|
Term
8.2 What methods would you use to move a GPO to another domain? What methods could you use to move a starter GPO to another domain? |
|
Definition
o Import the settings from the GPO Backup and manually configure GPO permissions. Export the starter GPO as a .cab file then import it to the other domain. |
|
|
Term
8.2 What is the difference between import and restore when working with GPO backups? |
|
Definition
o Import does not bring the settings with the GPO they must be manually configured. Restore creates the GPO and restores the settings. |
|
|
Term
8.3 What IP address do clients use to connect to computers running NLB? |
|
Definition
The shared cluster IP address |
|
|
Term
8.3 What is the heartbeat, and how is it used in convergence? |
|
Definition
A heartbeat is a periodic signal sent out by cluster members to other members to maintain consistency between them. Heartbeats are used to indicate if convergence is necessary if a new member is added or a member is missing. |
|
|
Term
8.3 When will convergence occur? |
|
Definition
If a heartbeat does not occur within 5 seconds of its expected time If a heartbeat if received from a new cluster member. If a configuration change is made to the cluster or a member. |
|
|
Term
8.3 What should you do on a cluster host to use unicast mode if the host needs to perform peer-to-peer communications with other cluster hosts? |
|
Definition
Install second NIC's in each host |
|
|
Term
8.3 How can you prevent a cluster host from responding to traffic sent to a specific port? |
|
Definition
o In the port rule filtering mode create a rule for the port and use the DISABLE THIS PORT RANGE rule. |
|
|
Term
8.3 Which client affinity option should you use when clients connect to a NLB cluster using multiple proxy servers? |
|
Definition
|
|
Term
8.3 What happens to traffic not identified by a port rule? How can you control which cluster host responds? |
|
Definition
The host with the lowest host ID handles the traffic |
|
|
Term
8.3 What happens if a cluster host has a weight value of 0 when multiple host filtering is used? |
|
Definition
That host is prevented from responding to specific traffic |
|
|
Term
8.4 How is Failover Clustering different from NLB? |
|
Definition
o The main difference is that failover clustering uses shared disk resources. With NLB each server maintains its own storage. |
|
|
Term
8.4 Which application types are best used with NLB and not failover clustering? |
|
Definition
o Stateless applications such as a front end web server. |
|
|
Term
8.4 How does a single-instance application differ from a multiple-instance application? |
|
Definition
o A single instance application is active on only one server at a time A multiple instance application can run on multiple servers at a time. |
|
|
Term
8.4 Which quorum mode should be used if you have an even number of cluster hosts? Why? |
|
Definition
o Node and Disk majority or Node and File Share Majority should be used because if half of the nodes go down but the witness disk is still available the cluster will continue to function. |
|
|
Term
8.4 Which quorum mode allows the cluster to continue operating even if only one cluster host is still available? |
|
Definition
|
|
Term
8.4 Which methods can you use to assign IP addresses to cluster members? |
|
Definition
o DCHP or Manual with either IPv4 or IPv6. However the same assignment method and type must be used on all nodes. |
|
|
Term
Tell Me About Server 2012 (up to 13) |
|
Definition
• Multitenant infrastructure that provides a platform for building a private cloud • Provides users with access to data and applications from virtually anywhere, from any device • Reliable cross-premises connectivity • High levels of uptime • Servers are designed to endure failures without disrupting services • Software based policy controls • Windows Power Shell • Support of open standards, open source applications • Supports a mobile and flexible work style • Remote access audit policy • Data Classification |
|
|