

Information Technology Capstone
Exam Answer Key
Course Introduction
The Information Technology Capstone course provides students with the opportunity to integrate and apply the knowledge and skills acquired from previous IT coursework in a comprehensive project. Working individually or as part of a team, students engage in the full project lifecycle problem identification, requirement analysis, planning, implementation, testing, and documentation while addressing real-world challenges. The course emphasizes project management, collaboration, and effective communication, culminating in a final presentation and deliverable that demonstrate students' readiness for professional IT practice.
Recommended Textbook
MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson
Available Study Resources on Quizplus
10 Chapters
409 Verified Questions
409 Flashcards
Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8045
Sample Questions
Q1) A(n) _________________________ is used within a domain to organize objects.
Answer: Organizational Unit (OU)
Organizational Unit
OU
Q2) You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____
A) netdom query trust
B) netdom query fsmo
C) netdom query pdc
D) netdom query dc
Answer: B
Q3) The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.
A) domain-wide
B) tree-wide
C) schema-wide
D) forest-wide
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Designing Physical Topology
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8046
Sample Questions
Q1) The ____ manages the pool of available RIDs and issues banks of RIDs to other domain controllers.
A) domain naming master
B) schema master
C) RID master
D) PDC emulator
Answer: C
Q2) Describe DFS namespace.
Answer: A DFS namespace is used to group shared folders from different servers into a logically structured namespace. This namespace appears to the user as a single shared folder with nested subfolders. The user can access the namespace and easily access all of the shared folders without knowing (or needing to know) that the folders are located on multiple servers.
Q3) A(n) ____________________ application can determine its own Active Directory site membership (and location) and connect to other servers in the same site.
Answer: site-aware
Q4) Cached credentials only provide ____________________ access.
Answer: local
To view all questions and flashcards with answers, click on the resource link above.
4
Chapter 3: Designing and Implementing DNS
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8047
Sample Questions
Q1) List and describe three improvements available if DNS is hosted on Windows Server 2008.
Answer: GlobalNames zones. DNS can be configured to resolve single-label names that have historically been resolved by Windows Internet Name Services (WINS) servers. WINS servers are used to resolve NetBIOS names, but if your organization is eliminating WINS, a GlobalNames zone (GNZ) can be implemented to resolve names for legacy clients or applications. This is especially important if an organization is migrating to an IPv6 network because IPv6 does not support WINS. IPv6 support. DNS now fully supports the 128 bit IPv6 addresses. RODC support. It's possible to host a read-only zone on a read-only domain controller. Background zone loading. Windows Server 2003 DNS servers could sometimes take up to an hour to reboot when it had to load a significant number of zones. Windows Server 2008 DNS servers load the zone data in the background, allowing the DNS servers to reboot quickly.
Q2) A(n) ___________________ record is used to find mail servers.
Answer: mail exchange (MX)
mail exchange
MX
To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Designing and Implementing Group Policy
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8048
Sample Questions
Q1) OUs are difficult to modify.
A)True
B)False
Q2) Describe the Kerberos policy within Group Policy.
Q3) Explain how to create fine-grained policies.
Q4) Describe the geography structure for OUs.
Q5) Universal group membership information is only contained in the ____.
A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
Q6) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.
A) Template
B) Starter
C) Reference
D) Instantiated
Q7) The _________________________ design is a simple OU design based on the structure of the organization.
Q8) Discuss reasons to use OUs.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal Services Strategies
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8049
Sample Questions
Q1) Hosting a server on the Internet adds minimal risk.
A)True
B)False
Q2) ____ is used to provide end users with access to individual applications or full desktop operating systems from almost any mobile device.
A) Remote Services (RS)
B) Terminal Interactive Services (TIS)
C) Terminal Services (TS)
D) Remote Interactive Services (RIS)
Q3) ____ specify other settings that must be met for the connection, including the authentication method used, idle timeout settings, session timeout settings, and more.
A) Constraints
B) Permissions
C) Boundaries
D) Policies
Q4) Discuss the purpose of TS Session Broker.
Q5) In organizations that use several RADIUS servers, a RADIUS ____________________ server can be implemented as a central switching or routing point.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Designing and Implementing a PKI
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8050
Sample Questions
Q1) After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.
A)True
B)False
Q2) AD CS publishes a delta CRL once a ____ by default.
A) day
B) week
C) month
D) year
Q3) Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.
Q4) The ____ is the first CA in the hierarchy.
A) basis CA
B) original CA
C) root CA
D) subordinate CA
Q5) A PKI may appear complex on the surface but is actually rather simple.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Securing Windows Server 2008 Servers
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8051
Sample Questions
Q1) Explain the difference between an upstream server and a downstream server.
Q2) List and explain the three parts to the Microsoft SD³+C approach.
Q3) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.
Q4) ____________________ identify resources in one network that can communicate with resources in another network.
Q5) The scwcmd command ____ is used to apply the security policy to the system.
A) enable
B) configure
C) display
D) register
Q6) When MBSA is installed, the ____ command-line utility is also installed, which can be used to run MBSA from the command line.
A) MBSAGUI
B) MBSACLI
C) MBSA /CLI
D) MBSA MMC
Q7) Describe the purpose of the WSUS statistics server.
Q8) Discuss options for creating a perimeter network.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business
Continuity
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8052
Sample Questions
Q1) The ____ can be used to validate the hardware used in the failover cluster and the configuration of a cluster.
A) Configuration wizard
B) System Configuration Validation wizard
C) Operational Validation wizard
D) Validate a Configuration wizard
Q2) The Windows Server Backup feature isn't installed by default.
A)True
B)False
Q3) An authoritative restore can mark a single object (such as the CEO's account), an entire OU, or the entire Active Directory database as authoritative.
A)True
B)False
Q4) The ____ feature of Windows Server 2008 can increase stability and provide scalability for applications and services.
A) System Load Balancing
B) Service Load Balancing
C) Operations Load Balancing
D) Network Load Balancing
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Designing Supporting Services
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/8053
Sample Questions
Q1) A ____ namespace would be created when the Windows Server 2008 server is not in a domain.
A) domain-based
B) stand-alone
C) forest-based
D) directory-based
Q2) List and describe two WSS tools that can be used for collaboration.
Q3) With SCOM, administrators can use a single centralized server to monitor all servers in the organization.
A)True
B)False
Q4) SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.
A)True
B)False
Q5) DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Designing Virtualization Strategies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/8054
Sample Questions
Q1) ____ can be used to create virtual machines from scratch, import virtual machines over the network, remove virtual servers, and modify the properties of an existing virtual server.
A) Application Manager
B) Virtual Server Manager
C) Performance Manager
D) Hyper-V Manager
Q2) With application virtualization, terminal services can be used to host entire desktops or applications.
A)True
B)False
Q3) Discuss how a VPC machine can be used to provide access to a legacy application.
Q4) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.
Q5) List and describe the two primary components of Microsoft Application Virtualization.
Q6) Describe the System Center Application Virtualization Streaming Server.
To view all questions and flashcards with answers, click on the resource link above. Page 12