[Free] 2017(Oct) EnsurePass Testinsides Microsoft 98-365 Dumps with VCE and PDF 1-10

EnsurePass
2017 Oct Microsoft Official New Released 98-365
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/98-365.html

Windows Server Administration Fundamentals

Question No: 1

The purpose of the Information Technology Infrastructure Library is to provide a:

  1. Set of standards for networking protocols.

  2. Set of best practices for managing IT services.

  3. Downloadable library of hardware drivers.

  4. Technical library of Windows infrastructure services.

Answer: B

Explanation: The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business.

Question No: 2

You need to create a group that includes users from different domains in a single forest. You also need to enable the group to access resources in any domain in the forest.

Which type of group should you create?

  1. Workgroup

  2. Local group

  3. Universal group

  4. Global group

  5. Domain Local group

Answer: C

Explanation: Universal Group:

  • Group can include as members…

    Accounts from any domain within the forest in which this Universal Group resides Global groups from any domain within the forest in which this Universal Group resides

    Universal groups from any domain within the forest in which this Universal Group resides

  • Group can be assigned permissions in… Any domain or forest

*

Question No: 3

One advantage of a SAN is that it:

  1. Can be located either inside or outside the server.

  2. Provides USB and Firewire connectivity.

  3. Consolidates storage space for servers.

  4. Encrypts all files.

Answer: C

Explanation: A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage.

Question No: 4

This question requires that you evaluate the underlined text to determine if it is correct.

quot;Microsoft App-Vquot; can make applications available to end user computers without having to install the applications on those computers.

Select the correct answer if the underlined text does not make the statement correct. Select #39;No change is neededquot; if the underlined text makes the statement correct.

  1. Microsoft Hyper-V

  2. DirectAccess

  3. Windows Deployment Services

  4. No change is needed.

Answer: D

Explanation: Microsoft Application Virtualization (MS App-V) platform allows applications to be deployed (quot;streamedquot;) in real-time to any client from a virtual application server. It removes the need for traditional local installation of the applications.

Reference: http://en.wikipedia.org/wiki/Microsoft_App-V

Question No: 5

This question requires that you evaluate the underlined text to determine if it is correct.

You need to troubleshoot network environment problems. First, you define the issues that are most likely causing the symptoms. Then you eliminate each issue until the symptoms disappear.

This approach is referred to as quot;performancequot; troubleshooting.

Select the correct answer if the underlined text does not make the statement correct. Select quot;No change is neededquot; if the underlined text makes the statement correct.

  1. Systematic

  2. Specific

  3. Trial and error

  4. No change is needed

Answer: A

Explanation: The ability to troubleshoot effectively reduces downtime and increases safety.

A Systematic approach brings efficiencies to the process of troubleshooting. Preparation

Step 1: Observe Behavior Step 2: Define Problem Area

Step 3: Identify Possible causes

Step 4: Determine Most Probable cause Step 5: Test and Repair

Follow-up

Reference: http://www.troubleshootingskills.com/how-it-works/systematic-approach/

Question No: 6

Your relative is the owner of Humongous Insurance, and you provide part time IT support for the company#39;s Windows desktops and servers. All of its computers are on a private network behind a firewall.

Because you are going away to college, you need a secure method to manage the servers and desktops.

Which two Windows 2008 R2 features should you use? (Choose two.)

  1. VPN Server

  2. Hyper-V

  3. Remote Desktop

  4. Active Directory Federation Services

  5. FTP Server

Answer: A,C

Explanation: You can set VPN Server or Remote Desktop to securely access the network remotetly.

Question No: 7

This question requires that you evaluate the underlined text to determine if it is correct. Active Directory user account names are not case sensitive.

Select the correct answer if the underlined text does not make the statement correct. Select #39;No change is neededquot; if the underlined text makes the statement correct

  1. Can be from 1 to 256 characters in length

  2. Can contain numbers and letters but no special characters

  3. Must be created with a first and last name

  4. No change is needed.

Answer: D

Explanation: Active directory user names are not case sensitive.

Question No: 8

Power On Self Test (POST) runs when a computer first boots. Which component software issues this test?

  1. Complementary Metal Oxide Semiconductor

  2. Northbridge On Board Chip

  3. Basic Input/Output System

  4. Southbridge On Board Chip

Answer: C

Explanation: The four main functions of a PC BIOS (Basic Input/Output System).

POST – Test the computer hardware and make sure no errors exist before loading the operating system. Additional information on the POST can be found on our POST and Beep Codes page.

Bootstrap Loader – Locate the operating system. If a capable operating system is located, the BIOS will pass control to it.

BIOS drivers – Low level drivers that give the computer basic operational control over your computer#39;s hardware.

BIOS or CMOS Setup- Configuration program that allows you to configure hardware settings including system settings such as computer passwords, time, and date.

Reference: http://www.computerhope.com/jargon/b/bios.htm

Question No: 9

You create a new domain. Which two Active Directory objects will be available by default? (Choose two)

  1. Computer

  2. Employee

  3. User

  4. Device

  5. Server

Answer: A,C

Explanation: An Active Directory structure is an arrangement of information about objects. The objects fall into two broad categories: resources (e.g., printers) and security principals (user or computer accounts and groups). Security principals are assigned unique security identifiers (SIDs).

Note:

Leave a Reply

Your email address will not be published. Required fields are marked *