Imagine
Cup - IT Challenge!
IT Challenge Round 1 Practice Questions.
IT Challenge Round 1 Practice Questions.
(attend Quiz after preparing)
The
questions below will give you a taste of the questions that will appear on the
IT Challenge Quiz.
Welcome to the Imagine Cup IT Challenge Quiz!
You must answer all questions in the time provided, as indicated by the countdown timer above.
Please answer each question by selecting one of the multiple choice answers below it. You can answer the questions in any order, and can change your answers at any point during the quiz time. However, once the quiz time is up, you will be prevented from making any further changes.
Your score will be the number of questions you get right. No points are deducted for incorrect answers, so it is in your best interest to always make your best guess.
Your answers will automatically be saved every 5 minutes. If you would like to save them at other times, please use the "Save Answers" button above. Use "Finish Quiz" when you have finished the quiz - the quiz window will then close and you'll be unable to make further changes to your answers.
If you inadvertently close your browser window, lose your connection, or encounter any error during the quiz, return to your IT Challenge portal page and click on "COMPETE" again. If you are unable to enter or re-enter the quiz at all, contact Support immediately. Include your Imagine Cup user name and any error codes that you received in your e-mail.
IMPORTANT: The IT Challenge Quiz makes use of cookies and javascript. Your browser must accept both. Some browser add-on components, like third party toolbars, may conflict with the operation of the IT Challenge Quiz, and we recommend that you disable them before starting. If you encounter scripting errors while running the IT Challenge Quiz, be sure to restart your browser and clear your cache before continuing.
Good luck!
Also see Resource (1)
PART - A
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PART - B
|
Question 1:
|
When configuring a SQL 2005
Server in preparation for connectivity to a SharePoint Server 2007 farm,
Microsoft recommends that Local and Remote Connections use both TCP/IP and
named pipes. Where is this setting found?
A. In the SQL Server Management Studio B. In the SQL Server Configuration Manager C. In the SQL Server 2005 Surface Area Configuration tool D. In the SQL Server Business Intelligence Development Studio |
Question 2:
|
To which group should you add
a user to allow them to authorize DHCP servers?
A. Domain Admins B. Schema Admins C. Local Admins D. Enterprise Admins |
Question 3:
|
Active Directory topology is
calculated based on what?
A. Site link cost B. Bandwidth C. Latency D. Distance |
Question 4:
|
Which component allows an
administrator to enforce organizational standards to newly created GPOs?
A. ADMX/ADML templates B. Starter GPOs C. WMI filtering D. GPO precedence rules |
Question 5:
|
What tool can be used to take
remote control of another user’s RDP session?
A. Remote Desktop Server Manager B. RDP Client C. Remote Desktop Session Broker D. Powershell |
Question 6:
|
What are the requirements for
Hyper-V R2?
A. 32 bit Operating system B. A CPU with Hardware Assisted Virtualization C. 16 GB of RAM D. A CPU with Hardware Assisted Virtualization, 32 bit Operating system, and 16 GB of RAM |
Question 7:
|
Which command-line editor
should be used in Windows 7 to modify settings such as the boot sequence,
display order and time out values for multiple operating systems, or
Emergency Management Services and boot debugging settings?
A. Bcdedit.exe B. Winconfig.exe C. Bootiniconfig.exe D. Regedit.exe |
Question 8:
|
What setting, if enabled,
will immediately push the SCCM client out to any discovered machines?
A. Enabling Computer Client Agent B. Enabling Client Push Installation to assigned Resources C. Enabling the Software Update Point client Installation D. Enabling Advertised Programs Agent |
Question 9:
|
Why are the ASP.NET Ajax
extensions 1.0 needed for a successful Operations Manager 2007 R2
installation?
A. To enable Operations Manager 2007 R2 to monitor Unix and Linux systems B. To enable the use of the WebConsole Reporting module C. To enable the use of the WebConsole Authoring module D. To enable the use of the WebConsole Health explorer |
Question 10:
|
How many database replicas
are supported in Exchange Server 2010 Database Availability Groups?
A. Only 1 per Storage Group B. Up to 5 C. Unlimited D. Up to 16 |
Question 11:
|
Which server in a SCOM
architecture holds the Data Warehouse?
A. Operations database server B. Standby operations database server C. Reporting server D. Root management server |
Question 12:
|
Which utility uses SQL
queries to review and analyze IIS logs for failures and unusual behavior?
A. Tracelog 3.1 B. Logparser 2.2 C. EventcombMT D. nlparse |
Question 13:
|
You are the administrator for
the company network. You are bringing a new remote office online. The office
has a domain controller that also runs DNS and WINS. It also has a file
server that runs DHCP. DHCP enabled workstations are not getting DHCP
addresses as expected. What should you do?
A. Move the DHCP service to the domain controller B. Disable WINS since it interferes with DHCP on the same network C. Authorize the DHCP server in Active Directory D. Enable DHCP forwarding on the workstations |
Question 14:
|
You are a database
administrator for your company. You review the error log for a SQL Server
2005 Enterprise Edition computer. You notice torn page errors for one index
in a 2-terabyte (TB) database. You need to resolve the torn index page
problem as quickly as possible. What should you do?
A. Run DBCC CHECKDB with the REPAIR_REBUILD option. B. Use the latest database tape backup to restore only the torn page. Then restore any transaction logs that have been made since the full backup. C. Restore the latest full tape database backup. Then restore any transaction logs that have been made since the full backup. D. Restore the database from the most recent database snapshot. |
Question 15:
|
You are the support engineer
for your company. A user is complaining about connectivity problems with the
Outlook 2007. Their mailbox is hosted on an Exchange 2007 server. You want to
check their Outlook connection status. What should you do?
A. Right-click on the Outlook icon in the system tray. B. Select Help, Office Diagnostics. C. Ctrl-right-click on the Outlook icon in the system tray. D. Select Tools, Rules and Alerts |
Question 16:
|
In WSS 3.0 when a site
administrator wishes to create a new subweb using the Team Site template,
which of the following links does she select from the Create page?
A. Basic Page B. Web Part Page C. Sites and Workspaces D. Collaboration Portal |
Question 17:
|
In Exchange Server 2010
Database Availability Groups, the quorum model is handled as follows:
A. Only Node Majority is supported, therefore DAGs must be configured only in odd number of member servers. B. Only Fileshare Majority is supported, therefore DAGs must be configured only in even number of member servers. C. The quorum model automatically changes between Node Majority, and Node and File Share Majority dependent on the number of member servers in the DAG. D. Quorum is handled only by clustered shared volumes (CSVs) and therefore can only be created in odd number of member servers in the DAG. |
Question 18:
|
You are a consumer support
technician. A user’s computer has a 100-GB hard disk and contains 80% free
space. The hard disk contains a collection of pictures, videos, and music
files that uses 3.5 GB of space. The user plans to send a backup copy of the
file collection to a friend who resides in another state. You need to provide
the user the most efficient backup method for sending the media files. You
also need to minimize the size of the backup media set. What should you do?
A. Use the Back up files option to back up the media files to a set of CDs. B. Use the Back up computer option to back up the computer to a set of DVDs. C. Use the Back up computer option to back up the computer to an external hard disk. D. Use the Back up files option to back up the media files to a DVD. |
Question 19:
|
You are the network
administrator for your company. All servers run Windows 2003. You need to
access your servers in the DMZ using SSL. What port would you ask the
firewall administrator to open to give you access?
A. 443 B. 21 C. 3389 D. 1443 |
Question 20:
|
I click on the Start button
and enter System in the Search field, select System Configuration and hit
enter to open the tool. Which of the following options on the Boot tab allow
me to boot the system without the statup splash screen showing?
A. Boot log B. No GUI boot C. Base video D. OS boot information |
Question 21:
|
You need to select the
architecture for Exchange 2007 that will give you automatic redundancy in the
case of a server or storage failure. Which option is best:
A. Implement Clustered Continuous Replication on the Exchange 2007 mailbox server. B. Implement Exchange 2007 in a virtual server and copy the virtual server to another host each night. C. Implement Continuous Local Backup on the Exchange 2007 mailbox server. D. Implement a Single Copy Cluster on the Exchange 2007 mailbox server. |
Question 22:
|
You are the administrator for
the company network. The amount of data stored on Windows file servers has
been growing steadily. You company does not and cannot implement storage
quotas at this time. Analysis of the files on the file servers shows that
users are storing MP3 files, which violates company storage policies. How can
you prevent users from storing MP3 files on the company file servers?
A. Implement an Encrypted File System policy B. Configure it in Group Policy C. Upgrade the file servers to Windows file servers to Windows Server 2003 R2 and utilize File Server Resource Manager D. Block MP3 files using the Windows Firewall |
Question 23:
|
Which of the following is a
valid PowerShell command in Windows 7 (assuming the directories and files
referenced do in fact exist on the computer)?
A. compare-object -referenceobject $(get-content C:\test\test.txt) -differenceobject $(get-content C:\testtwo\test.txt) B. compare-object -referenceobject $(get-content C:\test one\test.txt) -differenceobject $(get-content C:\testtwo\test.txt) C. compare-object -referenceobject (get-content C:\test\test.txt) -differenceobject (get-content C:\testtwo\test.txt) D. compare-object -referenceobject {get-content C:\test one\test.txt} -differenceobject {get-content C:\testtwo\test.txt} |
Question 24:
|
You have a System Center
Configuration Manager 2007 environment. You need to ensure that remote client
computers that connect to the virtual private network (VPN) are able to
receive software updates. What should you do?
A. Create a new site system, and configure it with the SMS Provider role. B. Add the IP subnets that the VPN uses to the network discovery. C. Create a new site boundary, and add the IP subnets that the VPN uses to the site boundary. D. Create a new site system, and configure it with the Software Update Point role. |
Question 25:
|
You are the backup
administrator for your company. The company uses Data Protection Manager 2007
to backup all its servers. For security, you want to encrypt the data that is
backed up by DPM. What should you do?
A. Select encryption in the short-term protection options in the protection group. B. Select encryption in the long-term protection options in the protection group. C. Select encryption in both short-term and long-term protection options in the protection group. D. Select encryption in the agent options. |
Question 26:
|
You are the mail
administrator for your company. The company uses Exchange 2003 and Outlook
2003. A user complains that her calendar keeps reminding her about a past
appointment even though she has dismissed it. How can you correct this
problem?
A. Delete the user’s Free/Busy information B. Run Outlook with the /ClearReminders switch C. Reboot the Exchange mailbox server D. Run Outlook with the /CleanReminders switch |
Question 27:
|
Which one or more of the
following file types will be indexed by SharePoint Server 2007 when uploaded
to a document library in an out-of-the-box configuration?
A. .ppt B. .doc and .ppt C. .pdf D. .doc |
Question 28:
|
If I am a farm administrator
and am accessing the Central Administrator console for SharePoint Server
2007, what tab(s) appear by default from the home page?
A. Application Management, Home and Operations B. Home C. Operations D. Application Management |
Question 29:
|
You are a messaging
professional. Your company uses a Microsoft Exchange Server 2007 messaging
system. The company adds a new Mailbox server and moves half of the user
mailboxes to the new server. You set the retention period for deleted
mailboxes to 21 days. The backup report shows that the Exchange Server 2007
backups store 800 GB of data. The mailboxes of the users contain 200 GB of
data. There are no public folder databases. All Exchange Server 2007
databases are stored on a Storage Area Network (SAN), which has available
disk space. You need to reduce the time taken to back up the Exchange Server
2007 databases. You must achieve this goal by minimizing the disruption of
user access to mailboxes. Which action should you perform?
A. Set the retention period for deleted mailboxes to five days. B. Increase the window for scheduled online maintenance for each mailbox database. C. Create a new database on the same Mailbox server for each existing database. Move users to the new databases and delete the old databases. D. Dismount and defragment each mailbox database. |
Question 30:
|
You are a Windows Mobile 6.0
device user. You are concerned that your email might not be synchronizing to
your Exchange server. You want to check the status. Where should you check
status?
A. Start, Settings, Device Information B. Start, Programs, ActiveSync C. Start, Settings, Error Reporting D. Messaging, Menu, Options |
Also see Resource (1)
No comments:
Post a Comment