Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

Microsoft 98-365 Dumps

verified by experts

2 products

  • Verified by experts

98-365 Premium Bundle

  • Premium File 394 Questions & Answers

  • Training Course 47 Lectures

$35.68

$19.99
Microsoft
Windows Server Administration Fundamentals
Microsoft
Windows Server Administration Fundamentals

Files

Views

159

Size

1.1 MB

Downloads

81

Views

336

Size

1.3 MB

Downloads

208

Purchase Individually

  • 98-365

    Premium File

    394 Questions & Answers
    $21.41
    $14.99
  • 98-365

    Training Course

    47 Lectures
    $14.27
    $9.99

Questions & Answers for Microsoft 98-365

Showing 1-15 of 147 Questions

Question #1

You configure Volume Shadow Copy Service (VSS) to save previous versions of a shared
folder. By default, the copies of shared folders are stored in:

A. A Network Attached Storage (NAS) device.

B. A Distributed File System (DFS) share.

C. A failover cluster.

D. A local volume.

Explanation: Shadow Copy technology requires the file system to be NTFS to be able to
create and store shadow copies. Shadow Copies can be created on local and external
(removable or network) volumes by any Windows component that uses this technology,
such as when creating a scheduled Windows Backup or automatic System Restore point.

Question #2

Enabling additional users to handle administrative tasks for a particular object is referred to
as:

A. Redirection

B. Assignment

C. Targeting

D. Delegation

Explanation: In computing Delegation of Control is assigning a person or group specific
administrative permissions for an Organizational Unit.

Question #3

Plug and Play is a/an:

A. Automatic device configuration system.

B. Automatic system update application.

C. Method used by developers to create applications.

D. Multimedia device.

Question #4

The system partition on a Windows Server must always be installed to a:

A. Dynamic disk.

B. Simple volume.

C. NTFS volume.

D. FAT32 volume.

Question #5

You need to grant a set of users permissions to a specific folder.
Where should you place the user accounts?

A. Domain root

B. Security group

C. Shared folder

D. Organizational Unit

Explanation: Place the users in an OU. Assign permissions to the OU for the specific
folder.

Question #6

For each of the following statements, select Yes if the statement is true. Otherwise, select
No. Each correct selection is worth one point.

Question #7

You notice frequent writes to the page file.
Which should you monitor to determine the cause?

A. CPU

B. RAM

C. Network

D. Hard disk

Explanation: When the RAM is full the page file is used as virtual RAM.

Question #8

Which technology is designed to help teams collaborate?

A. Microsoft SharePoint Server

B. Microsoft System Center Operations Manager

C. Microsoft Forefront Identity Manager

D. Microsoft BizTalk Server

Explanation: * Organizations use SharePoint to create websites. You can use it as a
secure place to store, organize, share, and access information from almost any device. All
you need is a web browser, such as Internet Explorer, Chrome, or Firefox.
* SharePoint Workspace A desktop program that you can use to take SharePoint site
content offline and collaborate on the content with others while you are disconnected from
the network. While you and other team members are offline, you can make changes to
SharePoint content that will eventually synchronize back to the SharePoint site.
Incorrect:
not B: System Center 2012 Operations Manager provides infrastructure monitoring that is
flexible and cost-effective, helps ensure the predictable performance and availability of vital
applications, and offers comprehensive monitoring for your datacenter and cloud, both
private and public.
Not C: Microsoft Forefront Identity Manager 2010 R2 delivers self-service identity
management for users, automates lifecycle management across heterogeneous platforms
for administrators, and provides a rich policy framework for enforcing corporate security
policies.
Not D: Microsoft BizTalk Server (or simply "BizTalk") enables companies to automate
business processes, through the use of adapters which are tailored to communicate with
different software systems used in an enterprise.

Question #9

You need to manage a Windows Server 2008 server from a Windows client computer by
using a Management Console.
What should you install on the client computer?

A. Remote Assistance

B. Remote Server Administration Tools

C. Windows Server Resource Kit

D. Microsoft Office SharePoint Server

Explanation: Example: Remote Server Administration Tools for Windows 8.1 enables IT
administrators to manage roles and features that are installed on computers that are
running Windows Server 2012 or Windows Server 2012 R2 from a remote computer that is
running Windows 8.1 Pro or Windows 8.1 Enterprise.

Question #10

Services that are required to enable another service to run are referred to as service:

A. Roots

B. Prerequisites

C. Dependencies

D. Parents

E. Hosts

Explanation: Some services have dependency services that do not start until their
dependency services start first.

Question #11

You are troubleshooting a permissions issue with the Reports share. The permissions are
shown in the following image:

The groups connect to the share.
Use the drop-down menus to select the answer choice that answers each question. Each
correct selection is worth one point.

Question #12

You need to make a share hidden. Which symbol should you append to the share name?

A. _

B. !

C. @

D. #

E. $

Explanation: The "$" appended to the end of the share name means that it is a hidden
share. Windows will not list such shares among those it defines in typical queries by remote
clients to obtain the list of shares. One needs to know the name of an administrative share
in order to access it. Not every hidden share is administrative share; in other words,
ordinary hidden shares may be created at user's discretion.

Question #13

Which type of folder permissions takes precedence?

A. Explicit Deny permissions

B. Explicit Allow permissions

C. Inherited Deny permissions

D. Inherited Allow permissions

Explanation: Here are some rules for resolving permissions conflicts:
"Deny" permissions generally take precedence over "allow" permissions.
Permissions applied directly to an object (explicit permissions) take precedence over
permissions inherited from a parent (for example from a group).
Permissions inherited from near relatives take precedence over permissions inherited from
distant predecessors. So permissions inherited from the object's parent folder take
precedence over permissions inherited from the object's "grandparent" folder, and so on.
Permissions from different user groups that are at the same level (in terms of being
directly-set or inherited, and in terms of being "deny" or "allow") are cumulative. So if a user
is a member of two groups, one of which has an "allow" permission of "Read" and the other
has an "allow" of "Write", the user will have both read and write permission--depending on
the other rules above, of course.

Question #14

Distributed File System (DFS) is used to:

A. Delegate permissions to a global distribution group.

B. Implement parity.

C. Group shared folders from different servers.

D. Configure spanned and extended volumes.

Explanation: Distributed File System (DFS) is a set of client and server services that allow
an organization using Microsoft Windows servers to organize many distributed SMB file
shares into a distributed file system. DFS provides location transparency and redundancy
to improve data availability in the face of failure or heavy load by allowing shares in multiple
different locations to be logically grouped under one folder, or DFS root.

Question #15

Which kind of group is only used for e-mail applications?

A. Exchange Admins group

B. Universal group

C. Security group

D. Distribution group

Explanation: Example:
As an Office 365 Small Business admin, you can create and manage distribution groups for
your organization. A distribution group is a collection of two or more people that appears in
your organizations address book. When an email message is sent to a distribution group, it
goes to all members of the group.

×