Information Technology Capstone Exam Answer Key - 409 Verified Questions

Page 1


Information Technology Capstone

Exam Answer Key

Course Introduction

The Information Technology Capstone course provides students with the opportunity to integrate and apply the knowledge and skills acquired from previous IT coursework in a comprehensive project. Working individually or as part of a team, students engage in the full project lifecycle problem identification, requirement analysis, planning, implementation, testing, and documentation while addressing real-world challenges. The course emphasizes project management, collaboration, and effective communication, culminating in a final presentation and deliverable that demonstrate students' readiness for professional IT practice.

Recommended Textbook

MCITP Guide to Microsoft Windows Server 2008 Enterprise Administration 1st Edition by Darril Gibson

Available Study Resources on Quizplus

10 Chapters

409 Verified Questions

409 Flashcards

Source URL: https://quizplus.com/study-set/453

Page 2

Chapter 1: Designing Active Directory Domain Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8045

Sample Questions

Q1) A(n) _________________________ is used within a domain to organize objects.

Answer: Organizational Unit (OU)

Organizational Unit

OU

Q2) You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____

A) netdom query trust

B) netdom query fsmo

C) netdom query pdc

D) netdom query dc

Answer: B

Q3) The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.

A) domain-wide

B) tree-wide

C) schema-wide

D) forest-wide

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Designing Physical Topology

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8046

Sample Questions

Q1) The ____ manages the pool of available RIDs and issues banks of RIDs to other domain controllers.

A) domain naming master

B) schema master

C) RID master

D) PDC emulator

Answer: C

Q2) Describe DFS namespace.

Answer: A DFS namespace is used to group shared folders from different servers into a logically structured namespace. This namespace appears to the user as a single shared folder with nested subfolders. The user can access the namespace and easily access all of the shared folders without knowing (or needing to know) that the folders are located on multiple servers.

Q3) A(n) ____________________ application can determine its own Active Directory site membership (and location) and connect to other servers in the same site.

Answer: site-aware

Q4) Cached credentials only provide ____________________ access.

Answer: local

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Designing and Implementing DNS

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8047

Sample Questions

Q1) List and describe three improvements available if DNS is hosted on Windows Server 2008.

Answer: GlobalNames zones. DNS can be configured to resolve single-label names that have historically been resolved by Windows Internet Name Services (WINS) servers. WINS servers are used to resolve NetBIOS names, but if your organization is eliminating WINS, a GlobalNames zone (GNZ) can be implemented to resolve names for legacy clients or applications. This is especially important if an organization is migrating to an IPv6 network because IPv6 does not support WINS. IPv6 support. DNS now fully supports the 128 bit IPv6 addresses. RODC support. It's possible to host a read-only zone on a read-only domain controller. Background zone loading. Windows Server 2003 DNS servers could sometimes take up to an hour to reboot when it had to load a significant number of zones. Windows Server 2008 DNS servers load the zone data in the background, allowing the DNS servers to reboot quickly.

Q2) A(n) ___________________ record is used to find mail servers.

Answer: mail exchange (MX)

mail exchange

MX

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Designing and Implementing Group Policy

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8048

Sample Questions

Q1) OUs are difficult to modify.

A)True

B)False

Q2) Describe the Kerberos policy within Group Policy.

Q3) Explain how to create fine-grained policies.

Q4) Describe the geography structure for OUs.

Q5) Universal group membership information is only contained in the ____.

A) global catalog

B) DNS server

C) GlobalNames Zone

D) RID master

Q6) ____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template

B) Starter

C) Reference

D) Instantiated

Q7) The _________________________ design is a simple OU design based on the structure of the organization.

Q8) Discuss reasons to use OUs.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Designing Remote Access and Terminal Services Strategies

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8049

Sample Questions

Q1) Hosting a server on the Internet adds minimal risk.

A)True

B)False

Q2) ____ is used to provide end users with access to individual applications or full desktop operating systems from almost any mobile device.

A) Remote Services (RS)

B) Terminal Interactive Services (TIS)

C) Terminal Services (TS)

D) Remote Interactive Services (RIS)

Q3) ____ specify other settings that must be met for the connection, including the authentication method used, idle timeout settings, session timeout settings, and more.

A) Constraints

B) Permissions

C) Boundaries

D) Policies

Q4) Discuss the purpose of TS Session Broker.

Q5) In organizations that use several RADIUS servers, a RADIUS ____________________ server can be implemented as a central switching or routing point.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Designing and Implementing a PKI

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8050

Sample Questions

Q1) After installing certificate services, the name of the computer and the domain settings cannot be changed, or AD CS will no longer function correctly.

A)True

B)False

Q2) AD CS publishes a delta CRL once a ____ by default.

A) day

B) week

C) month

D) year

Q3) Users in the ___________________ role are granted the Issue and Manage Certificates permission and can approve certificate enrollment and revocation requests.

Q4) The ____ is the first CA in the hierarchy.

A) basis CA

B) original CA

C) root CA

D) subordinate CA

Q5) A PKI may appear complex on the surface but is actually rather simple.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Securing Windows Server 2008 Servers

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8051

Sample Questions

Q1) Explain the difference between an upstream server and a downstream server.

Q2) List and explain the three parts to the Microsoft SD³+C approach.

Q3) ____________________ rules are commonly used to publish an Internet-facing server's connection information to the external firewall.

Q4) ____________________ identify resources in one network that can communicate with resources in another network.

Q5) The scwcmd command ____ is used to apply the security policy to the system.

A) enable

B) configure

C) display

D) register

Q6) When MBSA is installed, the ____ command-line utility is also installed, which can be used to run MBSA from the command line.

A) MBSAGUI

B) MBSACLI

C) MBSA /CLI

D) MBSA MMC

Q7) Describe the purpose of the WSUS statistics server.

Q8) Discuss options for creating a perimeter network.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Designing High Availability and Business

Continuity

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8052

Sample Questions

Q1) The ____ can be used to validate the hardware used in the failover cluster and the configuration of a cluster.

A) Configuration wizard

B) System Configuration Validation wizard

C) Operational Validation wizard

D) Validate a Configuration wizard

Q2) The Windows Server Backup feature isn't installed by default.

A)True

B)False

Q3) An authoritative restore can mark a single object (such as the CEO's account), an entire OU, or the entire Active Directory database as authoritative.

A)True

B)False

Q4) The ____ feature of Windows Server 2008 can increase stability and provide scalability for applications and services.

A) System Load Balancing

B) Service Load Balancing

C) Operations Load Balancing

D) Network Load Balancing

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Designing Supporting Services

Available Study Resources on Quizplus for this Chatper

41 Verified Questions

41 Flashcards

Source URL: https://quizplus.com/quiz/8053

Sample Questions

Q1) A ____ namespace would be created when the Windows Server 2008 server is not in a domain.

A) domain-based

B) stand-alone

C) forest-based

D) directory-based

Q2) List and describe two WSS tools that can be used for collaboration.

Q3) With SCOM, administrators can use a single centralized server to monitor all servers in the organization.

A)True

B)False

Q4) SCOM builds on the basic philosophy that an administrator wants to know about problems before they happen.

A)True

B)False

Q5) DFS replication is used to group shared folders stored on different servers into a single Universal Naming Convention (UNC) path.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Designing Virtualization Strategies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/8054

Sample Questions

Q1) ____ can be used to create virtual machines from scratch, import virtual machines over the network, remove virtual servers, and modify the properties of an existing virtual server.

A) Application Manager

B) Virtual Server Manager

C) Performance Manager

D) Hyper-V Manager

Q2) With application virtualization, terminal services can be used to host entire desktops or applications.

A)True

B)False

Q3) Discuss how a VPC machine can be used to provide access to a legacy application.

Q4) Imagine that you have five physical servers (HV1 through HV5), each hosting virtual machines, and you're preparing to migrate another physical server to a virtual environment.Explain how the Virtual Machine Deployment wizard can be used to help you select the best server for migration.

Q5) List and describe the two primary components of Microsoft Application Virtualization.

Q6) Describe the System Center Application Virtualization Streaming Server.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Turn static files into dynamic content formats.

CreateĀ aĀ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.