MCSE 70-290 Questions Quiz

27 Questions | Total Attempts: 10768

SettingsSettingsSettings
MCSE Quizzes & Trivia

This is a 27 question quiz covering the 70-290 chapter of Microsoft Certified Solutions Expert(MCSE)exam. It has questions testing every major exam topic, but it is by no means a replacement for study and further practice examination. You will find that the questions are similar in both style and content to the actual test, so practice carefully. All the best!


Related Topics
Questions and Answers
  • 1. 
    You are worried about severe weather and the potential resultant loss of data. Which of the following is not a component of a disaster recovery or preventative maintenance program?`
    • A. 

      Install an uninterrupted power supply

    • B. 

      Configure Power Options in the Control Panel to the setting “Prevent Data Damage”

    • C. 

      Set up regular backups of the hard disk or necessary data files using the Windows Backup utility

    • D. 

      Configure RAID disk mirroring on another hard drive on another server

    • E. 

      Set up a backup server to be used in case of primary server failure

  • 2. 
    • A. 

      Higher data availability

    • B. 

      Ensured data integrity

    • C. 

      Ability to mitigate disaster or recover from data loss

    • D. 

      Spanning of a single logical volume over multiple physical volumes

    • E. 

      Mirroring of a volume

  • 3. 
    A user complains that he experiences difficulties accessing shares on a Windows 2003 Server. He notes that he cannot see which folders are shared on the server, nor can he access the shares. What is the most likely source of the issue?
    • A. 

      Security Policy

    • B. 

      Sharing Security

    • C. 

      NTFS Security

    • D. 

      Local Profile

    • E. 

      Roaming Profile

  • 4. 
    • A. 

      Requiring a change in password by the administrator at regular time intervals

    • B. 

      Creating a minimum password length

    • C. 

      Creating a maximum password age

    • D. 

      Allowing the user to change his password

    • E. 

      Setting an expiration date on the password

  • 5. 
    Which of the following is a benefit of DHCP-assigned IP addresses?
    • A. 

      Increased security

    • B. 

      Higher network throughput

    • C. 

      Lower latency

    • D. 

      Lower network overhead

    • E. 

      Decreased administrative overhead

  • 6. 
    Which of the following is a potential problem associated with Automatic Windows updates?
    • A. 

      The server may not receive the updates properly

    • B. 

      The updates are often corrupted files

    • C. 

      The download speed associated with automatic updates is slower than that of manual updates

    • D. 

      Some updates require the server to restart upon completion

    • E. 

      The server may stop responding during the update process

  • 7. 
    Which of the following is unique to IIS as a web server package?
    • A. 

      The ability to display Active Server Pages natively

    • B. 

      The ability to display HTML pages natively

    • C. 

      SSL and TLS security

    • D. 

      UNIX integration and cross-platform compliance

    • E. 

      Java functionality

  • 8. 
    Your manager asks you to implement a solution that will allow the server to share its Internet connection with network computers and regulate the traffic. How will this best be accomplished?
    • A. 

      Install two network cards, connect one to the gateway/Internet and the other to the network, bridge the two, and enable Internet Connection Sharing

    • B. 

      Install a single network card, connect both the server and the rest of the network to the gateway/Internet

    • C. 

      Install two network cards, connect one to the gateway/Internet and the other to another server

    • D. 

      Install one network card, connect one to the network, and enable Internet Connection sharing

    • E. 

      No action is required because this is the default behavior

  • 9. 
    A user complains that he is unable to connect to the Internet via the ICS/DHCP-enabled server. He notes that his assigned IP address is 169.254.213.222 and that the network connection appears to be valid. What is the most likely source of the issue?
    • A. 

      TCP/IP configuration on the computer

    • B. 

      TCP/IP configuration on the server

    • C. 

      DHCP configuration on the server

    • D. 

      NetBIOS interference

    • E. 

      Internet Connection Sharing on the server

  • 10. 
    What is the advantage of using Last Known Good Configuration mode as compared to Safe Mode?
    • A. 

      Last Known Good Configuration mode allows the user to login as the administrator

    • B. 

      Safe Mode enables a special arrangement of settings and configuration not unique to the particular server whereas Last Known Good Configuration enables settings unique to the server that last worked correctly

    • C. 

      Safe Mode enables a unique arrangement of settings and configuration that the server is often not equipped to handle

    • D. 

      Last Known Good Configuration mode disables networking so that there are fewer security issues

    • E. 

      Last Known Good Configuration mode requires interactive login whereas Safe Mode does not

  • 11. 
    What would you type in to access a share called “Classified” on a server named STORE with the IP address 14.23.141.17 via the Internet without a HOSTS or LMHOSTS file?
    • A. 

      \\STORE\Classified

    • B. 

      \\14.23.141.17\STORE\Classified

    • C. 

      \\Classified\STORE

    • D. 

      \\14.23.141.17\Classified

    • E. 

      \\STORE

  • 12. 
    Your manager asks you to implement a solution that allows users to log in remotely to the server. However, port 3389 is being used by another remote desktop system and is therefore not available for use over the Internet. How can you allow Internet users to access the server?
    • A. 

      Change the receive/listen port on RDC via the Remote Desktop program

    • B. 

      Change the receive/listen port on RDC via the Registry Editor

    • C. 

      Use the “outward bound” setting to access the computers

    • D. 

      Use the “Local Network Only” setting

    • E. 

      Change the server’s IP address to match the class of the accessing computers

  • 13. 
    A folder has specific “Read” access for user John, who is in the group “People.” The group “People” is specifically allotted “Full Control” access for the same folder. What are John’s effective permissions?
    • A. 

      Read only

    • B. 

      Full Control

    • C. 

      Read + Write

    • D. 

      Read + Write + List Folder Contents

    • E. 

      Read + Write + Execute

  • 14. 
    Which of the following is not considered a potential benefit of using Windows Server 2003 as opposed to Windows Server 2000?
    • A. 

      Enhanced security

    • B. 

      Increased compliance and operation with Windows XP/Vista clients

    • C. 

      Ability to run Terminal Services

    • D. 

      Enhanced features and configuration tools

    • E. 

      None of the above

  • 15. 
    A user complains that he is unable to use his file-sharing program over the Internet on his PC, which is connected to the Windows Server 2003 system with ICS/DHCP. Which of the following is the likely cause of this?
    • A. 

      File sharing programs are not compatible with ICS

    • B. 

      He has the wrong IP address due to DHCP

    • C. 

      Windows Server 2003 cannot handle the increased traffic as a result of the file-sharing

    • D. 

      The Internet Connection Firewall configured with ICS/network bridge is blocking traffic on the associated port

    • E. 

      The DHCP server is not configured for the port associated with the file-sharing program

  • 16. 
    Which of the following is not a valid Windows Server 2003 installation-related utility?
    • A. 

      Riprep

    • B. 

      Sysprep

    • C. 

      Setup

    • D. 

      Netprep

    • E. 

      All of the above utilities are installation-related

  • 17. 
    Terry has specific “Full Control” sharing permissions for the folder SECRET and “Read Only” NTFS permissions for the folder SECRET. What are her effective permissions if she attempts to access the share?
    • A. 

      No access

    • B. 

      Read Only

    • C. 

      Read + Write

    • D. 

      Read + Write + Execute

    • E. 

      Full Control

  • 18. 
    Which of the following is not a built-in feature of Windows Server 2003?
    • A. 

      Unattended remote installations

    • B. 

      Active Server Pages

    • C. 

      DHCP Server

    • D. 

      Internet Information Services

    • E. 

      All of the above are included in Windows Server 2003

  • 19. 
    Manufacturing is a computer that is still running Windows 98 in order to use legacy software. SECRETSERVER is a Windows Server 2003 system with a share “Secret Dreams.” All sharing and security permissions have been configured correctly. Why can’t Manufacturing access the share “Secret Dreams?”
    • A. 

      Sharing is not a feature in Windows 98

    • B. 

      Shared folders on Windows Server 2003 are not accessible to Windows 98 Computers

    • C. 

      The server’s name is too long for the Windows 98 PC to handle

    • D. 

      The share’s name cannot contain any of the strings in the server’s name

    • E. 

      Windows 98 computers can only access Windows Server 2003 shares if they are domain controllers

  • 20. 
    What is the purpose of VGA Mode?
    • A. 

      To recover lost data

    • B. 

      To fix faulty display settings or reset the display configuration

    • C. 

      To prevent network access while undergoing repair operation

    • D. 

      To restore the computer to the last known good configuration

    • E. 

      To restore the computer to an earlier date and time

  • 21. 
    Which of the following is a benefit of using workgroups?
    • A. 

      They allow for computers to login to a single domain

    • B. 

      They allow for faster network access

    • C. 

      They allow for a loose logical organization of networked PC’s

    • D. 

      They allow for the use of Group Policy

    • E. 

      They offer enhanced security features

  • 22. 
    Which of the following is not a reasonable size for a volume on a Windows Server 2003 server?
    • A. 

      5 GB

    • B. 

      50 GB

    • C. 

      500 GB

    • D. 

      5 TB

    • E. 

      None of the above

  • 23. 
    Which of the following is not a valid RAID option?
    • A. 

      Disk striping

    • B. 

      Disk mirroring

    • C. 

      Spanning volumes

    • D. 

      Disk striping with parity

    • E. 

      Disk verifying

  • 24. 
    Which of the following is not a valid administrative tool?
    • A. 

      Computer Management

    • B. 

      Display Settings

    • C. 

      Local Security Policy

    • D. 

      Services

    • E. 

      All of the above are administrative tools

  • 25. 
    What is a difference between a service and a typical Windows application?
    • A. 

      A service requires more user input than an application

    • B. 

      A service is more secure than an application

    • C. 

      A service requires less user input than an application

    • D. 

      A service takes higher processing priority than applications

    • E. 

      An application runs in the background whereas a service is actively and readily apparent