[Free] Get all latest Microsoft 98-365 Actual Tests 81-90
QUESTION 81
The network-attached storage (NAS) device is a file server running on a dedicated device
connected to the network. Which of the following are the advantages of the NAS device? Each
correct answer represents a complete solution. Choose all that apply.
A. It enables the Windows, UNIX/Linux, Mac OS, and Novell clients to use the same storage and
to access the shared data.
B. It is easy to install, configure, and manage by using a web browser.
C. It is used when computer systems are retired and disk drives are required to be zeroed out.
D. It permits the addition of more hard disk storage space to a network without shutting them
down for maintenance and upgrades.
Correct Answer: ABD
QUESTION 82
Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server
2008 single Domain-based network. Mark wants to use scripting for managing Windows server
roles, backing up and restoring group policy objects (GPOs), and creating reports for the GPOs.
Which of the following tools will Mark use to accomplish the task?
A. Active Directory Sizer (ADSizer)
B. Windows PowerShell
C. GPUPDATE
D. Group Policy Management Console (GPMC)
Correct Answer: B
QUESTION 83
Sasha installs an ISA sound card on her Windows 2000 Professional system. The driver fails and
now the computer is unable to start. What should she do after rebooting in safe mode?
A. Disable driver signing
B. Remove sound card before booting
C. Enable driver signing
D. Disable the driver
Correct Answer: D
QUESTION 84
Which of the following is NOT a purpose of using a container?
A. To group tasks as a unit so that if a task fails all other tasks can be rolled back.
B. To run all the tasks at a time until a condition becomes false.
C. To queue up the tasks so that if a task fails, the next task in the queue gets operated.
D. To run each task repeatedly.
Correct Answer: C
QUESTION 85
You work as a System Administrator for company Inc. The Microsoft iSCSI initiator service is
deployed in the organization in order to allow Windows Server 2008 R2 to connect to SCSI
devices that are attached to a network. You want to remove all persistently bound volumes and
devices for the iSCSI service. Which of the following iSCSICLI commands will you use to
accomplish the task?
A. iSCSICLI AddPersistentDevices
B. iSCSICLI AddTarget
C. iSCSICLI ClearPersistentDevices
D. iSCSICLI RemovePersistentDevices
Correct Answer: C
QUESTION 86
You work as a Server Administrator for company Inc. You want all transactions to the storefront
on the Web server to be encrypted. Which of the following security protocols will you use to
encrypt Web traffic?
A. L2TP
B. PPTP
C. SSL
D. IPSec
Correct Answer: C
QUESTION 87
Drag and Drop the name of the components on the right side that belongs to the CPU (Central
Processing Unit) on the left.
Correct Answer:
QUESTION 88
Which of the following is an application protocol for querying and modifying data using directory
services running over TCP/IP?
A. Kerberos
B. SNMP
C. UDP
D. LDAP
Correct Answer: D
QUESTION 89
Which of the following file systems centralizes data and can be used to replicate shared folders to
other servers?
A. ADFS
B. FAT32
C. DFS
D. NTFS
Correct Answer: C
QUESTION 90
Which of the following types of resource record is generally used with virtual servers that point
to several servers offering network load balancing to distribute work?
A. MX
B. SRV
C. SOA
D. CNAME
Correct Answer: D
Instant Access to Download Testing Software & PDF File for Microsoft 98-366 Real Exam
Instant Access to Try Microsoft 98-366 Free Demo
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF