New Updated Microsoft MTA 98-365 Real Exam Questions and Answers Download 81-90

Ensurepass

QUESTION 81

The network-attached storage (NAS) device is a file server running on a dedicated device

connected to the network. Which of the following are the advantages of the NAS device? Each

correct answer represents a complete solution. Choose all that apply.

 

  1. It enables the Windows, UNIX/Linux, Mac OS, and Novell clients to use the same storage and

to access the shared data.

  1. It is easy to install, configure, and manage by using a web browser.

  2. It is used when computer systems are retired and disk drives are required to be zeroed out.

  3. It permits the addition of more hard disk storage space to a network without shutting them

down for maintenance and upgrades.

 

Correct Answer: ABD

 

 

QUESTION 82

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server

2008 single Domain-based network. Mark wants to use scripting for managing Windows server

roles, backing up and restoring group policy objects (GPOs), and creating reports for the GPOs.

Which of the following tools will Mark use to accomplish the task?

 

  1. Active Directory Sizer (ADSizer)

  2. Windows PowerShell

  3. GPUPDATE

  4. Group Policy Management Console (GPMC)

 

Correct Answer: B

 

 

QUESTION 83

Sasha installs an ISA sound card on her Windows 2000 Professional system. The driver fails and

now the computer is unable to start. What should she do after rebooting in safe mode?

 

  1. Disable driver signing

  2. Remove sound card before booting

  3. Enable driver signing

  4. Disable the driver

 

Correct Answer: D

 

 

 

 

QUESTION 84

Which of the following is NOT a purpose of using a container?

 

  1. To group tasks as a unit so that if a task fails all other tasks can be rolled back.

  2. To run all the tasks at a time until a condition becomes false.

  3. To queue up the tasks so that if a task fails, the next task in the queue gets operated.

  4. To run each task repeatedly.

 

Correct Answer: C

 

 

QUESTION 85

You work as a System Administrator for company Inc. The Microsoft iSCSI initiator service is

deployed in the organization in order to allow Windows Server 2008 R2 to connect to SCSI

devices that are attached to a network. You want to remove all persistently bound volumes and

devices for the iSCSI service. Which of the following iSCSICLI commands will you use to

accomplish the task?

 

  1. iSCSICLI AddPersistentDevices

  2. iSCSICLI AddTarget

  3. iSCSICLI ClearPersistentDevices

  4. iSCSICLI RemovePersistentDevices

 

Correct Answer: C

 

 

QUESTION 86

You work as a Server Administrator for company Inc. You want all transactions to the storefront

on the Web server to be encrypted. Which of the following security protocols will you use to

encrypt Web traffic?

 

  1. L2TP

  2. PPTP

  3. SSL

  4. IPSec

 

Correct Answer: C

 

 

QUESTION 87

Drag and Drop the name of the components on the right side that belongs to the CPU (Central

Processing Unit) on the left.

 

98-365-demo-14

 

Correct Answer:

98-365-demo-15

 

 

QUESTION 88

Which of the following is an application protocol for querying and modifying data using directory

services running over TCP/IP?

 

  1. Kerberos

  2. SNMP

  3. UDP

  4. LDAP

 

Correct Answer: D

 

 

QUESTION 89

Which of the following file systems centralizes data and can be used to replicate shared folders to

other servers?

 

  1. ADFS

  2. FAT32

  3. DFS

  4. NTFS

 

Correct Answer: C

 

 

QUESTION 90

Which of the following types of resource record is generally used with virtual servers that point

to several servers offering network load balancing to distribute work?

 

  1. MX

  2. SRV

  3. SOA

  4. CNAME

 

Correct Answer: D

 

Instant Access to Download Latest Complete Collection of Microsoft MTA 98-365 Real Exam

Try Microsoft MTA 98-365 Free Demo