98-365 Exam Update Tips: All PassLeader’s 98-365 exam questions were updated in recent days with the change of new questions, PassLeader ensure the 98-365 brain dumps are the newest and valid enough to pass your test. Visit passleader.com and get the 98-365 exam dumps with PDF and VCE. New version vce player is also free now.
Exam Code: 98-365
Exam Name: Windows Server Administration Fundamentals
You work as a System Administrator for company Inc. The company has a Windows Server 2008 domain-based network. The network contains one Windows Server 2008 R2 and twelve Windows 7 client computers. You want to centralize management and configuration of operating systems, applications, and user settings. What will you do?
A. Apply NTFS permission.
B. Implement an account policy.
C. Apply an audit policy.
D. Implement a group policy.
Which of the following tools will you use to create image files of an existing system for duplicating or backup purposes?
A. Windows System Image Manager
D. Setup Manager
You work as a Server Administrator for company Inc. The company has its main branch in London and two sub-branches in Tokyo and Paris. The company has 1,500 clients and a number of servers that run Windows Server 2008 R2. You need to distribute workload across the cluster nodes for supporting a larger number of simultaneous clients. What will you do to accomplish the task?
A. Deploy Windows AIK.
B. Use Network Load Balancing.
C. Implement NIC teaming.
D. Create a failover cluster.
Adam works as a Software Tester for SecureEnet Inc. He is required to test the software on different operating systems. Adam installs Windows 7 on his laptop, which enables him to create, mount, and boot from VHD files. Which of the following statements are true about Virtual Hard Disk (VHD)? Each correct answer represents a complete solution. Choose all that apply.
A. VHD can be used to install a wide variety of operating systems.
B. VHD allows multiple operating systems to reside on a single host machine
C. VHDs are implemented as files that reside on the native host file system.
D. VHD is a file formatted to be structurally different to a physical Hard Disk Drive.
You work as a Network Administrator for Perfect Solutions Inc. The company plans to establish a Windows 2008 Active Directory-based network. The network will be configured as a single forest and a multiple-domain network. You are planning for the placement of operations master roles. In this context, which of the following operations master roles are applied to the entire forest? Each correct answer represents a complete solution. Choose all that apply.
A. Domain naming master
B. Schema master
C. PDC emulator master
D. Relative ID (RID) master
You work as a Server Administrator for company Inc. The company has a Windows Server 2008 R2 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. A single domain controller is configured on the network. Some employees reported that they failed to log on to the domain controller. You want to know IP addresses and other details of the accounts of the employees. Which of the following utilities will you use to accomplish the task?
A. Server Manager
B. Resource Monitor
C. Event Viewer
D. Performance Monitor
Which of the following statements are true about a device driver? Each correct answer represents a complete solution. Choose all that apply.
A. Device drivers are software-dependent and do not depend on operating systems.
B. It allows higher-level computer programs to interact with a hardware device.
C. It is a program or software that controls a particular device.
D. It works as a translator between the device and the operating system and programs that use the device.
You work as a Server Administrator for company Inc. The company has deployed Windows Server 2008 R2 for the deployment of workstations and servers. You need to service Windows images offline before the deployment. Which of the following tools will you use to accomplish the task?
You work as a System Administrator for company Inc. The company has a Windows 2008 based network environment. There are twenty client computers running Windows 7 and three servers running Windows Server 2008 R2. You have to ensure that customer service representatives can access the client’s information whenever they need. For this, you want to configure a RAID 5 solution in Network Attached Storage (NAS). How many minimum hard drives can you use?
Web developers request FTP access to the Web server so that they can upload and download updated contents. Which of the following ports does FTP use for communication? Each correct answer represents a complete solution. Choose two.
Which of the following types of volumes supported by dynamic disk uses a minimum of three disks for creating a fault-tolerant drive among the drives?
A. RAID-5 volume
B. Mirrored volume
C. Striped volume
D. Spanned volume
Which of the following statements are NOT true about the Volume Boot Sector, commonly known as Master Boot Record? Each correct answer represents a complete solution. Choose all that apply.
A. The actual program can be 512 bytes long.
B. Four 16-byte master partition records are present in MBR.
C. The end of MBR marker is h55CC.
D. The volume boot sector is present in cylinder 0, head 0, and sector 1 of the default boot drive.
Which of the following key combinations opens the Task Manager window?
A. Ctrl + Shift + Esc
B. Ctrl + Alt + Esc
C. Ctrl + Alt + Del
D. Ctrl + Shift + Alt
Which of the following tasks can you perform without requiring administrative permissions or rights when you log in as a standard user in Windows Server 2008 R2? Each correct answer represents a complete solution. Choose three.
A. Change Windows settings.
B. Connect Bluetooth devices to the computer.
C. Install updates from Windows Update.
D. Reset the network adapter and perform network diagnostic and repair tasks.
Which of the following statements regarding the Secure Sockets Layer (SSL) security model are true? Each correct answer represents a complete solution. Choose two.
A. The server always authenticates the client.
B. The client can optionally authenticate the server.
C. The server can optionally authenticate the client.
D. The client always authenticates the server.