Microsoft MCITP Test Prep - Windows Server 2008 - Question List

Select how would you like to study

56. Which of the following commands should you use to obtain detailed information about all the .msi applications installed in the WIM image mounted in the D:\Mount folder?
  1. dism/online/get-packageinfo
  2. dism/image:d:\mount/get-featureinfo
  3. dism/image:d:\mount/get-appinfo
  4. dism/image:d:\mount/get-apppatchinfo
57. All computers in the London office are configured to use S10 as their preferred DNS server. The Texas branch office has a server named S11 which hosts a primary zone named payroll.Globe.com. The refresh interval of the payroll.Globe.com zone is set to 24 hours. In the Texas office, a firewall filters all incoming network traffic from other offices. A rule on this firewall prevents all computers from the London office network, except S10, from performing DNS lookups against S11.

As a business requirement no delay should occur between the time that a new record is created in the payroll.Globe.com zone and the time that the record can be resolved from any computers in the London office. All computers in the London office must be able to resolve names in the payroll.Globe.com namespace.

Which of the following should be done to configure DNS on S10 to meet the requirements?
  1. Setup a stub zone named payroll.Globe.com.
  2. Setup conditional forwarding to S11 for the payroll.Globe.com namespace.
  3. In the Globe.com zone, set up a delegation to the payroll.Globe.com zone on S11.
  4. Setup a secondary zone named payroll.Globe.com that has S11 as master.
58. You want to ensure that all clients using Windows 7 will change their passwords every three weeks. Which of the following policy should you configure on the clients?
  1. Enforce Password History
  2. Maximum Password Age
  3. Minimum Password Length
  4. Minimum Password Age
59. Which of the following groups should you be a member of in order to be able to create or modify an application directory partition?
  1. Domain users
  2. Enterprise Admins
  3. Server operators
  4. Schema Admins
60. Which of the following should you do to allow access to only authorized laptops to your wireless network?
  1. IPv4 address filtering
  2. WEP
  3. MAC address filtering
  4. WPA

Select how would you like to study