412-5

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of the following is a distributed file system protocol used to access files over the network that
is used with UNIX and Linux file server clients?
2.
1 point
What feature of Windows enables you to integrate Windows users into an existing UNIX or Linux
environment?
3.
1 point
What feature or role must you install to extend the Active Directory schema with UNIX attributes?
4.
1 point
When configuring UNIX Attributes for an Active Directory user account, which of the following
attributes is not available for configuration?
5.
1 point
Which of the following protocols is not supported by BranchCache?
6.
1 point
Which mode of BranchCache configuration uses one or more dedicated servers to provide the cached
copy in the branch office?
7.
1 point
Distributed cache mode is designed for branch offices with what number of clients?
8.
1 point
Before you can use BranchCache, you must perform several tasks. Which of the following tasks is not
required to be performed to use BranchCache?
9.
1 point
When configuring the BranchCache hash publication options in Group Policy, you have three options
available. Which of the options listed here is not available to configure?
10.
1 point
What can you use to configure automatic procedures for defining a desired property on a file based
on the conditions specified in a rule?
11.
1 point
Before you can audit access to files, what must you first do? (Choose all that apply)
12.
1 point
When configuring file access auditing, which of the following audit types are available to choose
from?
13.
1 point
What feature, first available in Windows 7 and Windows Server 2008, enables you to configure
object access auditing for every file and folder on the computer’s file system?
14.
1 point
What can be configured to create targeted audit policies based on resource properties, and
expressions, so that you don’t have to audit every file?
15.
1 point
How is Identity Management for UNIX installed?