Sharepoint - Intro

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You are the WSS 3.0 administrator for your organization. You are in the process of configuring WSS on a new server farm. You are on the Configure SharePoint Central Administration web application page. Your next task is to select a method of authentication under the Configure Security Settings section. Which of the following are options you can select? (Choose all that apply.) A. Kerberos B. SSL C. NTLM D. HTTP

A, C. NTLM and Kerberos are the only two options that are available for authenticating to the Central Administration web application.

You are the WSS 3.0 administrator for your organization. Using a Level 1 - supported browser, you can perform which of these functions? (Choose all that apply.) A. Customize the look and feel by moving web parts on the page. B. Deploy Features that have been activated in your WSS 3.0 site. C. Close or remove web parts using the drop - down menu on a web part. D. Change the location of a web part in a Web Part zone by moving it on top of another web part.

A,B,C,D. All are true; remember that SharePoint is highly customizable right out of the box, and that a user with the correct rights and browser can move, add, remove, and customize SharePoint using Features and web parts

WSS 3.0 site definition files allow developers and administrators to do which of the following to WSS 3.0 and SharePoint sites? (Choose all that apply.) A. Roll out custom sites with Features available in a site, site collection, or farm. B. Save administrators time when rolling out new sites in SharePoint. C. Avoid missing Features in newly created sites . D. Create a standard for deploying changes to WSS 3.0 and SharePoint.

A,B,C,D. Site Features are great; they save time and make sense for any organization that has the experience to create these fi les.

Which of the following is not one of the logs that can be used to monitor and troubleshoot performance on a WSS server? A. File Replication Service log B. Unified Logging Service (ULS) logs C. Application Event log D. Internet Information Services (IIS) logs

A. WSS servers do not make use of the Windows File Replication Service by default. It is doubtful that you would ever need this event viewer log for troubleshooting WSS.

You are the WSS 3.0 administrator for your organization. You want to secure a document library so that users who have permissions to just view the documents in the library are not allowed to print them out. What should you do? A. Edit the permissions of the library to allow no users to print documents. B. Implement Information Rights Management on the library. C. Modify the permission level for the users in the Visitors group to use Restricted Read with No Printing. D. Implement auditing on the library.

B. You should implement Information Rights Management on the library. IRM allows you to create a more secure environment for your library. With IRM, users with the View permission in WSS 3.0 can be restricted from copying or printing documents in the library.

You are the WSS 3.0 administrator for your organization. You are asked to restore a document that was deleted by an end user 29 days before the request. What should you do? A. Perform a restore using STSADM - o restore - file . B. Use the Backup and Restore feature to perform a site collection restore. C. Have the user restore the file by using the SharePoint Recycle Bin. D. Instruct the user to restore the file from the Windows Deleted Files folder.

C. The user's Recycle Bin is the first area a user should look for a document or list deleted in SharePoint. The user's Recycle Bin holds documents and fi les for up to 30 days.

You are the WSS 3.0 administrator for your organization. You have deployed WSS 3.0 on three servers, each containing one network adapter. You have implemented NLB in the default operating mode. When you try to ping one of the servers from the other, it is not successful. You need to be able to communicate among the NLB servers. What should you do? (Choose all that apply.) A. Install a second network adapter on all the NLB servers. B. Implement dynamic IP addressing on all the NLB servers. C. Install a second network adapter on the first server that you configured for NLB and configure it to use unicast mode. D. Configure the NLB cluster to use multicast mode.

A,D. You should either install a second network adapter on all the NLB servers or confi gure the NLB cluster to use multicast mode. The default mode is unicast. If you need to have intrahost communications in your NLB cluster, you should confi gure multicast mode. The other option is to install a second network adapter. The host adapter can remain confi gured for the default mode of unicast. You should not confi gure dynamic IP addressing. All servers in an NLB cluster must have static IPs. You should not install a second adapter on just one of the servers; if you install a second adapter, it must be on all the servers.

You are the WSS 3.0 administrator for your company. The CIO has asked you to set up a site for him where he can keep a daily journal of thought about the state of the company. He would like to use this site to generate discussion among the managers who report to him. What site template will best provide the capabilities required by the CIO? A. Blog site B. Blank site with a discussions list C. Team site D. Wiki site

A. A blog site will provide the CIO with a site where he can create posts daily. Users who have access to the site can read the posts and comment on them. A blank site with a discussion list or a team site could also be used, but would not be as good a fi t for the CIO since neither provides categorization. The CIO could also use a wiki site to publish his thoughts, but soliciting comments would be diffi cult.

You have deployed WSS 3.0. Your users store expense reports in a document library on a WSS website. A user tells you that she deleted an expense report three weeks ago. You need to recover the lost document. What should you do? A. Instruct the user to recover the document from the Recycle Bin in the WSS site. B. Recover the document from the Deleted from End User Recycle Bin view of the site collection Recycle Bin. C. Restore the recent full backup of the WSS website to a test server. Copy the expense report to the original document library. D. Recover the document from the Recycle Bin on the WSS server desktop.

A. The user can restore the document by using the site's Recycle Bin. You won't need to restore the fi le from a previous backup. The file will not be in the WSS server's desktop Recycle Bin or the second stage Recycle Bin for the site collection.

You are the WSS 3.0 farm administrator for your company. You want to deploy a public extranet site using WSS 3.0 as an Internet presence site to promote your products. What should you do? A. You should create an Internet solution using anonymous access. B. You should build an extranet solution using forms - based authentication. C. You should create an Internet solution using Basic authentication. D. You should create an Intranet solution using a default Active Directory account for all the users who want to view your products

A. You should create a WSS 3.0 site that has anonymous access enabled. Since you want to let all users view your site, you need to set up anonymous access authentication. All the other options require that a user have a user ID and password to access the site.

You are the WSS 3.0 administrator for your organization with a small farm deployment. You need to deploy a custom web part assembly to your web application. You are concerned with code access security so you have installed the assembly in a secure location. However, you cannot add the web part to a web part page. What should you do? A. Create a new custom policy for the web part assembly and have the web.config point to it. B. Change the trust level in the web.config file to Full. C. Change the trust level in the web.config file to Medium. D. Change the trust level in the web.config file to Minimal.

A. You should create a new custom policy for the web part assembly and have the web. config point to it. You should not reset the trust level in the web.config to Full because it would allow full access to all assemblies in the web application.

You are the WSS 3.0 administrator for your organization. All the regulation documents for the HR department have been uploaded into a document library on their website. You need to attach pertinent information to each of the documents for historical and auditing purposes. What should you do? A. Create metadata to hold the information. B. Create versioning to hold the information. C. Create an Information Management Policy to hold the information. D. Create folders to hold the information.

A. You should create metadata to hold the information. Metadata, often called columns, properties, or attributes, provides descriptive information used for locating and analyzing the content contained within the document.

You are the WSS 3.0 administrator for your organization. You need to configure your WSS 3.0 installation so your sites can accept and archive incoming e - mail. What should you do? A. You should install the IIS SMTP service on your Web front end server. B. You should install Outlook on your Web front end server. C. You should create a new virtual directory in IIS. D. You should install an Exchange server on your back end SQL server

A. You should install the IIS SMTP service on your Web front end server. You must also confi gure incoming e-mail settings in Central Administration

You are upgrading a WSS 2.0 farm to WSS 3.0 using the gradual approach. What is the minimum hardware level required for web front - end servers in the upgraded environment? (Choose all that apply.) A. 4GB of RAM B. 2.5GHz processor C. 1024 768 resolution monitor D. 100Mbps connection between client computers and server

B,C. WSS 3.0 web front-end servers should have a minimum of a 2.5GHz processor and a 1024 768 resolution monitor. Two gigabytes of RAM is the minimum, and 100Mbps is only required between the servers in the farm, not between servers and clients.

You are upgrading a WSS 2.0 environment that contains Microsoft Office 2003 web parts. Which upgrade approaches can you use? (Choose two. Each answer represents a complete solution.) A. Perform an in - place upgrade of the existing system. B. Use the gradual upgrade approach to migrate the existing system. C. Use the database migration method to move the content to the new farm. D. Install a new WSS 3.0 environment and manually migrate content to the new system

B,D. Microsoft Offi ce 2003 web parts cannot be installed directly in WSS 3.0 and can only be upgraded using the in-place or gradual upgrade approaches.

You are a WSS 3.0 site collection administrator for your organization. You want to customize the default.aspx page on your site, but you aren ' t a programmer. What application should you use to change the " look and feel " of the page? A. Microsoft FrontPage 2003 B. Microsoft Office SharePoint Designer 2007 C. Macromedia Dreamweaver D. Microsoft Word

B. Microsoft Offi ce SharePoint Designer 2007 has been specifi cally designed to customize and brand SharePoint HTML pages and websites. FrontPage 2003 is not compatible with the current version of SharePoint. It was used to edit pages in WSS 2.0. Visual Studio 2005 cannot edit pages that are stored directly in the content database. Custom pages can only be deployed through programming when using Visual Studio. Dreamweaver also can't open the pages of a SharePoint site directly from the content database.

You have deployed WSS 3.0. You create a new Announcements list for the managers in your company. Security on the list has not been broken. You need to ensure that managers can only view and add tasks to the list. Which group should you add the managers to on the site? A. Sitename Owners B. Sitename Members C. Sitename Visitors D. Sitename Designers

B. You should add the managers to the Sitename Members group, which has the Contribute permission level. The Owners group, with the Full Control permission level, would give them more than View and Add permissions. The Visitors group, with the Read permission level, would only give them the View permission. There is no default group called Sitename Designers.

You are the WSS 3.0 administrator for your organization. You have deployed a WSS 3.0 server farm. To allow external access to your sites, you decide to install an ISA server. You need to configure it so that your solution is as secure as possible and your internal users still have access to the site. What should you do? A. Implement an edge firewall topology. B. Implement a split back - to - back topology. C. Implement a multihomed perimeter topology. D. Implement a back - to - back perimeter topology.

B. You should implement a split back-to-back topology. The split back-to-back topology is the most secure; your web front-end servers and possibly your search servers are in the perimeter network while the database server is still maintained in the internal corporate network. You can use two Active Directory directory services with the perimeter domain trusting the corporate domain. The split back-to-back solution uses two ISA or fi rewall servers for additional security to your network. All other solutions are less secure.

You are the WSS 3.0 administrator for your organization. You are creating a web application that will be accessed only by your customers. The authentication for the web application must meet the following conditions: customer accounts will be stored in a SQL Server database; authentication to the web application is performed by a membership provider created by an ASP.NET developer; and two levels of permissions will be created for customer access to the content. You must select an appropriate authentication option. What should you do? A. Select Windows authentication. B. Select forms authentication. C. Select web Single - sign On authentication. D. Select SSL authentication.

B. You should select forms authentication. Forms authentication allows you to store user credentials in a custom format such as a SQL Server database. Forms authentication is managed using a membership provider that is implemented in the web application and Central Administration web.config fi le.

You are the WSS 3.0 administrator for your organization. You want to change the image on the home page of your site using the least amount of effort. What should you do? A. Using the browser, select Create from the Site Actions menu and add the new image. B. Using the browser, select Title, Description, and Icon from the Site Settings page and add the new image. C. Using Office SharePoint Designer 2007, select Title, Description and Icon from the Site Settings page and add the new image. D. Using Office SharePoint Designer 2007, select New from the Common menu and add the new image

B. You should use the browser and select Title, Description, and Icon from the Site Settings page and add the new image.

You are the WSS 3.0 administrator for your company. Managers in your company use team sites to facilitate collaboration in their departments. Recently one of the managers created a site but accidentally selected Document Workspace instead of Team Site for the template. He would like to delete the site but doesn ' t know how. What two ways can you show him that he can use to delete the site? (Choose all that apply.) A. Navigate to the Site Settings page on the top - level site and select Sites Hierarchy from the Site Collection Administration column. Click the Delete link next to the site on the Sites Hierarchy page. B. Navigate to the Site Settings page on the site and select Delete This Site from the Users and Permissions column. C. Navigate to the Site Settings page on the site and select Delete This Site from the Site Administration column. D. Navigate to the Site Settings page on the Parent site and select Sites and Workspaces from the Site Administration column. Click the Delete link next to the site on the Sites and Workspaces page.

C, D. Sites can be deleted from their own Site Settings page or from the Sites and Workspaces list on their parent site. The Delete link is in the Site Administration column, not the Users and Permissions column. The Sites Hierarchy page provides links to manage, not delete, all the sites in a site collection.

You have deployed WSS 3.0 with a single web front - end server and a SQL database server. You need to monitor the WSS server to identify HTTP 401 errors. What should you do? A. Open the event viewer on your workstation and remotely monitor the application event log on the WSS server. Watch for HTTP errors. B. Create a counter log that uses the Network Interface Bytes Total/ Sec counter. Store the counter log results in a SQL Server database. xxxviii Assessment Test C. Configure the IIS Log active format on each WSS server to use the W3C Extended Log File Format option. Review the logs weekly. D. Install Microsoft Operations Manager (MOM) on a network server. Install the IIS management pack on the MOM server.

C. HTTP 401 errors will be recorded in the IIS logs. Since you only have one WSS server, you don't need to confi gure MOM to monitor the logs

You have deployed WSS 2.0 with a single site collection. You want to upgrade it to WSS 3.0. You would like to maintain existing URLs. What should you do? A. Use the database migration method to move the content to the new farm. B. Use the gradual upgrade approach to migrate the existing system. C. Perform an in - place upgrade of the existing system. D. Install a new WSS 3.0 environment and manually migrate content to the new system

C. In-place upgrades are the fastest and easiest way to upgrade small environments while maintaining existing URLs.

You have deployed WSS 3.0. You want to use forms - based authentication to a SQL database to authenticate remote users that do not belong to your Active Directory domain. You configure a web application to use forms, but external users report that they can ' t authenticate to the WSS website. You need to ensure that external users are able to authenticate to the WSS website. What should you do? A. Restart the Netlogon service on the WSS server. B. Configure the Active Directory object for the WSS server to be Trusted for delegation. C. Edit the web application web.config file to specify the connection string and membership provider entries for the AspNetSqlMembershipProvider . D. Use Internet Information Services Manager to configure the Basic authentication on the website

C. The confi guration details for the AspNetSqlMembershipProvider need to be added to the web application web.config file. The other choices all deal with forms of Active Directory authentication and not a custom authentication provider.

As the WSS 3.0 administrator for your organization, you are preparing to deploy Windows SharePoint Services 3.0 on a server named Web1. You have installed Windows Server 2003 Web Edition, including all service packs and prerequisite files, on Web1. You are ready to start installing WSS 3.0. Which installation option should you choose? A. Basic Installation as a Stand - Alone Server B. Basic Installation as a Front - End Web Server C. Advanced Installation as a Front - End Web Server D. Advanced Installation as a Stand - Alone Server

C. You should choose the Advanced Installation as a Front-End Web Server. It is not possible to install a SQL Server database on the Web Edition of Windows Server 2003; therefore, this is your only option

You are the WSS 3.0 administrator for your organization. Your organization is planning a WSS 3.0 deployment using three web front - end (WFE) servers. You need to ensure your users ' optimal access to their content as well as provide for adding new WFE servers for future needs. What should you do? A. Configure the WFE servers to use active/passive clustering. B. Configure WFE servers with default IIS settings. C. Configure the WFE servers for network load balancing (NLB). D. Configure the WFE servers for Domain Name System (DNS) round - robin.

C. You should confi gure the WFE servers for network load balancing. NLB is a native functionality provided with Windows server products. NLB provides both load balancing as well as fault tolerance on each WFE server. You should not confi gure round-robin because it is not as effi cient as NLB. Although active/passive clustering provides fault tolerance, it does not optimize access to the users' content. Confi guring the servers with default IIS settings does nothing to balance the users' access

You are the WSS 3.0 administrator for your organization. You are planning your implementation of WSS 3.0. You want to ensure that your business processes are supported. What should you do? A. Create and implement an Information Rights Management plan. B. Create and implement a workflow. C. Create and implement a governance plan. D. Create and implement content types.

C. You should create and implement a governance plan. A governance plan establishes how your organization aligns WSS 3.0 with its business processes.

You are the WSS 3.0 administrator for your organization. Both internal users and external users will be accessing your WSS 3.0 web application. You must implement a solution so that both sets of users are able to access the content using different URLs. Your solution should minimize administrative overhead and hardware requirements. What should you do? A. Create separate web applications for internal and external users. B. Create separate WSS 3.0 deployments for internal and external users. C. Extend the web application by defining separate zones for internal and external users. D. Create two separate database servers to hold the content, one for internal users and one for external users.

C. You should extend the web application by defi ning separate zones for internal and external users. Both zones access the same content keeping administrative overhead minimized. Since both zones of the web application are held on the same server, the hardware necessary for the solution is also kept to a minimum.

You are the WSS 3.0 administrator for your organization. You have deployed WSS 3.0 in a small farm topology. Users inform you that they are getting no results when they search the WSS 3.0 sites on WSS01. What should you do? A. Open Windows Components on WSS01 and reinstall WSS 3.0 with the option Start Search. B. Open Central Administration; on the Home page under Administrator Tasks, select WSS01 and start the search service. C. Open the Central Administration website, on the Operations page under Topology and Services, select WSS01 and start the search service. D. Open the SQL Server Surface Area Configuration tool. Select WSS01 Search and click Start.

C. You should open the Central Administration website, and on the Operations page under Topology and Services, select WSS01 and start the search service. The users have no results because the search service has not been started on WSS01. This confi guration is managed in Central Administration and not in SQL Server.

You are the WSS 3.0 farm administrator for your company. You have deployed a single WSS 3.0 server using the Basic installation option. After several months, the usage and content has grown dramatically. You have decided that you need to scale out your implementation to a medium farm architecture. What should you do? A. You should move the existing WSS 3.0 databases to a dedicated SQL 2005 server and the search activities to a second dedicated server. B. You should move the existing WSS 3.0 databases to a dedicated SQL 2005 server. C. You should perform a new server farm installation and migrate the content databases to the new farm. D. You should add another web front - end server to the current installation.

C. You will need to perform a new server farm installation. The Basic option installs Windows Internal Database (WID) for its database component. Although you can move the databases to a dedicated SQL Server, there is no way that you can add additional WFE servers to scale out a Basic installation option farm.

You have deployed a WSS farm consisting of three web front - end WSS servers and a back - end SQL Server. You need to monitor services across all of the servers in the web server farm. What should you do? A. On each server, configure the Central Administration Diagnostic Logging feature to store trace logs on a network share drive. B. Create a custom Microsoft Management Console (MMC) that contains the Event Viewer from each WSS server. Assessment Test xxxvii C. Add the Web Service: Current Connections counter for each WSS server to a Performance Monitor chart view. D. Install Microsoft Operations Manager (MOM). Download and install the WSS management pack on the MOM server.

D. MOM 2005 with the WSS management pack can be used to monitor WSS events in the application event logs on multiple servers.

Which of the following is not a site permission in SharePoint? A. Apply Themes and Borders B. Use Self - Service Site Creation C. Manage Alerts D. Manage Lists

D. Manage Lists is a List permission, not a Site permission.

You are the WSS 3.0 administration for your organization. You are informed by the networking team that the WSS 3.0 Central Administration port number is the same as another web application on the corporate network. You ' re told you must change the WSS 3.0 Central Administration port number to 4500. What do you do? A. In Application Management, choose Network Settings and change the port number for the Central Administration web application. B. Run the SharePoint Technologies Configuration Wizard to change the port. C. Install a second network adapter and set a new port number. D. Use the command STSADM - o setadminport - port 4500 .

D. The only way to change the Central Administration port number is to use the STSADM -o setadminport command.

You are the WSS 3.0 administrator for your organization. You have just finished installing WSS 3.0 on a single server so your team can evaluate SharePoint. What do you do next? A. Create a site collection using Central Administration. B. Extend a Web application using Central Administration . C. Create a Blank site using Central Administration. D. Create a Web application using Central Administration.

D. You should create a Web application using Central Administration. When the WSS 3.0 installation is complete, your next task is to create a Web application to host your site collection(s) and sites.

You are the WSS 3.0 administrator for your organization. Your WSS 3.0 implementation consists of a medium - sized farm with four load - balanced web front - end servers. You have deployed three web applications on your farm. One web application requires Secure Sockets Layer (SSL) security. You have obtained the necessary certificate(s) from a trusted certificate authority. What should you do? A. Install a certificate on the database server. B. Install a certificate on each WFE server and the database server. C. Install a certificate on the first configured WFE server. D. Install a certificate on each WFE server

D. You should install a certifi cate on each WFE server. Since you are using load balancing, you need a certifi cate on each WFE. You do not need a certifi cate on the database server because authentication and encryption occur on the WFEs.

You are the WSS 3.0 administrator for your organization. You want to create new pages on your sites that include custom web part zone layouts. What should you do? A. Use Microsoft Office SharePoint Designer 2007 to customize the default.master page and add your zone layouts. B. Use the Create Web Part pages from the Page Create option in Office SharePoint Designer 2007 and select the layout you want from those available. C. Using the browser, select Web Part Page from the Create page and select one of the existing layouts. Customize the layout in the browser. D. Use Office SharePoint Designer 2007 to create your custom pages and add your zone layouts.

D. You should use Offi ce SharePoint Designer 2007 to create your custom pages and add your zone layouts. Web part page layouts cannot be customized using the browser.


संबंधित स्टडी सेट्स

AP World History Chapter 5 study guide part 2

View Set

W3Schools - HTML (HTML Comments, HTML Colors, HTML CSS)

View Set

CoursePoint Chapter 1, 3, & 24 Questions

View Set

Chapter 45 NCLEX style questions

View Set

CFA Level I: Portfolio Management

View Set

The Cold War and American Culture

View Set

Small Business Management Chapter 6

View Set

Person Chapter 4 (Sentence Fragment and Sentence Combination Errors)

View Set

Psyc 360 Intro to Personality Final Exam

View Set