[Free] Get all latest Microsoft 98-365 Actual Tests 81-90



The network-attached storage (NAS) device is a file server running on a dedicated device

connected to the network. Which of the following are the advantages of the NAS device? Each

correct answer represents a complete solution. Choose all that apply.


A.        It enables the Windows, UNIX/Linux, Mac OS, and Novell clients to use the same storage and

to access the shared data.

B.        It is easy to install, configure, and manage by using a web browser.

C.        It is used when computer systems are retired and disk drives are required to be zeroed out.

D.        It permits the addition of more hard disk storage space to a network without shutting them

down for maintenance and upgrades.


Correct Answer: ABD




Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server

2008 single Domain-based network. Mark wants to use scripting for managing Windows server

roles, backing up and restoring group policy objects (GPOs), and creating reports for the GPOs.

Which of the following tools will Mark use to accomplish the task?


A.      Active Directory Sizer (ADSizer)

B.      Windows PowerShell


D.      Group Policy Management Console (GPMC)


Correct Answer: B




Sasha installs an ISA sound card on her Windows 2000 Professional system. The driver fails and

now the computer is unable to start. What should she do after rebooting in safe mode?


A.      Disable driver signing

B.      Remove sound card before booting

C.      Enable driver signing

D.      Disable the driver


Correct Answer: D




Which of the following is NOT a purpose of using a container?


A.      To group tasks as a unit so that if a task fails all other tasks can be rolled back.

B.      To run all the tasks at a time until a condition becomes false.

C.      To queue up the tasks so that if a task fails, the next task in the queue gets operated.

D.      To run each task repeatedly.


Correct Answer: C




You work as a System Administrator for company Inc. The Microsoft iSCSI initiator service is

deployed in the organization in order to allow Windows Server 2008 R2 to connect to SCSI

devices that are attached to a network. You want to remove all persistently bound volumes and

devices for the iSCSI service. Which of the following iSCSICLI commands will you use to

accomplish the task?


A.      iSCSICLI AddPersistentDevices

B.      iSCSICLI AddTarget

C.      iSCSICLI ClearPersistentDevices

D.      iSCSICLI RemovePersistentDevices


Correct Answer: C




You work as a Server Administrator for company Inc. You want all transactions to the storefront

on the Web server to be encrypted. Which of the following security protocols will you use to

encrypt Web traffic?


A.      L2TP

B.      PPTP

C.      SSL

D.      IPSec


Correct Answer: C




Drag and Drop the name of the components on the right side that belongs to the CPU (Central

Processing Unit) on the left.




Correct Answer:





Which of the following is an application protocol for querying and modifying data using directory

services running over TCP/IP?


A.      Kerberos

B.      SNMP

C.      UDP

D.      LDAP


Correct Answer: D




Which of the following file systems centralizes data and can be used to replicate shared folders to

other servers?


A.      ADFS

B.      FAT32

C.      DFS

D.      NTFS


Correct Answer: C




Which of the following types of resource record is generally used with virtual servers that point

to several servers offering network load balancing to distribute work?


A.      MX

B.      SRV

C.      SOA

D.      CNAME


Correct Answer: D


Instant Access to Download Testing Software & PDF File for Microsoft 98-366 Real Exam

Instant Access to Try Microsoft 98-366 Free Demo