Below we have listed all the Microsoft Certification Exams Interview Questions and answers. Feel free to comment on any Microsoft Certification Exams Interview Questions or answer by the comment feature available on the page.
To buy an eBook containing 30,000 Interview Questions, with Answers, Click Here.
View All Microsoft Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Microsoft Certifications are professional certifications verifying demonstrated proficiency with Microsoft products. They exist in the categories of Server, Desktop, Applications, Database, and Developer with a variety of tiers of proficiency certified, including Solutions Associate (MCSA), Solutions Expert (MCSE), and Solutions Developer (MCSD). They are bestowed on people who pass one or more exams. MCP-qualifying exams include all of the exams required in the Microsoft Certified Solutions Associate (MCSA), MCSE, MCSD, and Microsoft Specialist certifications. Microsoft Technology Associate (MTA) exams and Microsoft Office Specialist (MOS) exams do not qualify for MCP certification.
Subcategories for Microsoft Certification Exams Interview Questions & Answers :-
Following are sub categories for which Interview Questions & Answers are available under Microsoft Certification Exams Interview Questions & Answers. Please select the appropriate sub-category:-
|Which of the following approaches to data gathering will produce the most usable performance baseline for a Windows NT network server?
A. Using the Chart View in Performance Monitor, collect computer and network utilization statistics every 15 minutes for two working days.
B. Using the Log View in Performance Monitor, collect processor, memory, logicaldisk, and network counters every 15 minutes for two working days.
C. Using the Chart View in Performance Monitor, collect computer and network utilization statistics every hour for a week.
D. Using the Log View in Performance Monitor, collect processor, memory, logicaldisk, and network counters every hour for a week.
|You need to test applications in both Windows 2000 and Windows NT 4.0. Currently you have Windows NT 4.0 Workstation installed on several computers. You will also be installing Windows 2000 Professional on a separate partition (D:) and dual-booting between the two operating systems. After installing Windows 2000 on D: and converting the partition to NTFS, what must be done to ensure that you can access data on the D: drive when booted into Windows NT Workstation?
A. You must upgrade the disk to a dynamic disk. In order to allow other operating systems access to volumes that have been formatted as NTFS under Windows 2000, the disk must first be converted to a dynamic disk.
B. You must upgrade the installation of Windows NT Workstation to Service Pack 4 or greater. Compatability with the new version of NTFS used in Windows 2000 is provided to Windows NT 4.0 systems by Service Pack 4 and later Service Packs.
C. You must add the special group Everyone to the Pre-Windows 2000 Compatible Access security group. In order to provide users running Windows NT 4.0 access to volumes that have been formatted as NTFS under Windows 2000, you must weaken permissions in this fashion.
D. You cannot grant access to volumes that have been formatted as NTFS under Windows 2000 to users who are running Windows NT 4.0. If you wish to grant access to these users, you must convert the volume to either FAT or FAT32 from Disk Manager.
|You have forgotten a "share name". You need to locate a file in that share. How can you quickly see a list of all shares on your system?
A. Browse to your system through Network Neighborhood and you will see all of the shares.
B. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under system tools.
C. Using the computer management tool in the Administrative tools group in Control Panel, you will find a tab to view shared folders under Storage
D. Using Windows Explorer, choose shared folders from the view menu.
|Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?
A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished
|You have just received 50 PC's with Windows ME on them. They also have dual 3.0GHZ processors in them. You decide that you want to upgrade them all up to Windows 2000 Professional. After running set up on a machine, you realize that only one of the processors is being seen by the OS what do you do next.
A. Run sysprep.exe update the machines after deployment
B. Run sysprep.exe with -pnp option
C. Use device manager to update the system to recognize the second processor. Then run sysprep.exe.
D. Run unattend.txt
| Jachamji has two users in different departments who need to communicate securely. These users need their communications on the LAN to each other to be both mutually authenticated and encrypted. However, they both need to communicate in the clear with other users on the LAN. How should Jachamji proceed?
A. Use VPN features to create a PPTP tunnel between the users computers.
B. Secure the shared resources on both users' computers with local groups and restrict access to the shared resources to the two users.
C. Put the two users on an isolated subnet. Enable packet filtering at the switch.
D. Define and implement an IPSec policy for both users computers.
| Which new Windows 2000 features lessen the need for rescue boot disks? [Check all correct answers]
A. Safe Boot
B. System file protector
C. Recovery mode console
|Users report that legitimate e-mail messages are being delivered to their Microsoft Office Outlook
Junk E-mail folders.
You confirm that the e-mail addresses of the message senders were on the Outlook Safe
You need to allow user -defined Safe Senders Lists to be used during the Exchange Edge
Transport server message delivery.
What should you do?
A. On the Mailbox server content filter configuration, enable Outlook E-mail Postmark validation.
B. On the Edge Transport server content filter configuration, enable authenticated message
C. Enable anti-spam updates on the Edge Transport server.
D. Run the Update-SafeList cmdlet for each users mailbox on the Mailbox server.
|Your companies Microsoft ActiveSync policy is configured to require inactive users to provide
their password every 10 minutes. A company executive requests that her mobile device be
exempt from the inactivity timer. You need to exempt the executives mobile device from the
timeout policy while maintaining the other corporate policy settings. What should you do?
A. Remove the corporate ActiveSync policy from the executives mailbox.
B. Create a new ActiveSync policy that has the required settings, and apply it to the executives
C. Change the password setting on the executives mobile device to override the ActiveSync
D. Reconfigure the executives mobile device for ActiveSync, and do not apply the corporate
|You are preparing to configure e-mail retention on three managed custom folders for all
mailboxes on an Exchange Server 2007 computer named Exch1.
You perform the following actions.
Create three managed custom folders.
Create managed content settings for each folder, and configure the required retention settings.
Create a new managed folder mailbox policy named MailRet.
Add each managed custom folder to the MailRet policy.
Configure the managed folder assistant for Exch1.
You need to finish configuring the messaging records management (MRM) retention settings so
that the three folders are available for the mailboxes on Exch1.
What should you do?
A. For each mailbox on Exch1, select the Enable retention hold for items in this mailbox check
B. For each mailbox on Exch1, add the MailRet policy.
C. Add managed content settings to the three managed custom folders.
D. Create a new managed folder mailbox policy for each of the three managed custom folders.
|Your Exchange Server 2007 organization contains two load balanced Client Access servers.
Outlook Anywhere users on the corporate network have access to availability information. You
need to allow access to availability information for users outside the corporate network who
connect by using Outlook Anywhere. What should you do?
A. Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client
B. Add a replica of the Exchange organizations Free/Busy public folder to at least one of the
Mailbox servers in the same site as the Client Access servers.
C. Add the Full Details read permission to each users calendar properties by using the Microsoft
Office Outlook client.
D. Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the
Client Access servers.
|ou need to configure a public folder to replicate on only Saturdays and Sundays. You also need
to ensure that posts will be denied after the folders size reaches 500 MB. Which cmdlet should
you run for the public folder?
A. Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule ?Saturday.12:00 AM-
B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule ?Saturday.12:00 AM-
Sunday.1 1:59 PM?
C. Set- PublicFolder - MaxltemSize 500MB. ReplicationSchedule ?Saturday.12:00AM-
D. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true
|You create a new message classification named Customer Data. Messages that have this
classification should not be sent outside the company. You need to redirect to the CustData
mailbox all outbound e-mail messages that have the Customer Data classification. What should
A. Run the Set-MessageClassification -Identity ?Customer Data? -UserDisplayEnabled:$true
B. Add read permissions to the Customer Data message classification by running the Set-
C. Run the Set-MessageClassification -Identity ?Customer Data?
D. Create a new transport rule to redirect to the CustData mailbox all messages that are sent
from internal users to only users outside the company and that are marked with the Customer
|ou are preparing to configure Outlook Anywhere on your existing Exchange Server 2007
organization. A Mailbox server named ExchMb1 contains all of the mailboxes that will be
accessed by users who use Outlook Anywhere. A Client Access server named ExchCas1 is
available from the Internet. Users will access Outlook Anywhere with mail .contoso.com as the
host (A) name. You need to configure the Exchange organization so that Outlook Anywhere can
be used by Microsoft Office Outlook clients from the Internet. Which three actions should you
perform? (Each correct answer presents part of the solution. Choose three.)
A. Install RPC over HTTP Proxy on ExchCas1.
B. Install a valid SSL certificate for ExchMb1 on the default Web site.
C. Install a valid SSL certificate for ExchCas1 on the default Web site.
D. Install RPC over HTTP Proxy on ExchMb1.
E. Run the Enable-OutlookAnywherE.Server:ExchCas1 -ExternalHostName:mail.contoso.com ?
F. Run the Enable-Outlook4nywherE.Server:ExchMb1 -ExternalHostName:mail.contoso.com ?
|Your native Exchange Server 2007 environment has the following server roles installed:
Three Mailbox servers
One Hub Transport server named ExchHub1
One Edge Transport server named ExchEdge1
The human resources (HR) department uses a Windows SMTP relay with an IP address of
192.168.10.25. E-mail from the HR department to all employees must be sent from this relay.
You need to configure your Exchange environment to accept e-mail messages from the internal
HR SMTP relay.
Which cmdlet should you run?
A. New- ReceiveConnector -Name ?HR e-mail? -Server ExchHub1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Internal
B. New- ReceiveConnector -Name ?HR e-mail? -Server ExchHub1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
C. New- ReceiveConnector -Name ?HR e-mail? -Server ExchEdge1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
D. New- ReceiveConnector -Name ?HR e-mail? -Server ExchEdge1 - RemoteIPRanges
192.168.10.25 - AuthMechanism BasicAuth -Usage External
|A new virus is discovered in your Exchange Server 2007 organization. The file extension is .ext
for this virus. The current settings for attachment filtering are configured to delete specified
attachments and allow the message to be delivered. However the virus files are not being filtered.
You must stop the spread of this new virus. Neither the attachment nor the e-mail message
should reach the e-mail recipient. The message that contains the virus should not generate a
non-delivery report (NDR). You need to add a filter for the file extension of the virus. Which two
cmdlets should you run? (Each correct answer presents part of the solution. Choose two.)
A. Add- AttachmentFilterEntry -Name *.ext -type ContentType
B. Add- AttachmentFilterEntry -Name *.ext -type FileName
C. Set- AttachmentFilterListConfig -Action Reject - RejectMessage ?None?
D. Set- AttachmentFilterListConfig -Action SilentDelete
|Your company normally does not allow out-of-office messages to be sent to users outside of your
Exchange 2007 organization. The company makes an exception for a business partner named
Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need
to configure your Exchange organization to allow out-of-office messages to be sent to e-mail
addresses in the northwindtraders.com domain. What should you do?
A. Add northwindtraders.com as a remote domain and set the appropriate options.
B. Add northwindtraders.com as an accepted domain and set the appropriate options.
C. Create a transport rule and set the appropriate options.
D. Create a Send connector for northwindtraders.com and set the appropriate options.
|In your Exchange Server 2007 organization, a report of the Exchange server settings indicates
that the storage limits for the mailbox stores are not all the same. You need to create an
Exchange Management Shell script that will reconfigure all of the Exchange server mailbox stores
to have identical storage limits. How should you create the script to accomplish this goal?
A. Redirect the output of the Get-ExchangeServer cmdlet to the Set-Mailbox Database cmdlet
with the appropriate parameters.
B. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-Mailbox cmdlet with the
C. Redirect the output of the Get-MailboxDatabase cmdlet to the Set-MailboxDatabase cmdlet
with the appropriate parameters.
D. Redirect the output of the Get-Mailbox cmdlet to the Set-MailboxDatabase cmdlet with the
|A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server
2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve
A. Use the Exchange Task wizard in Exchange Server 2003.
B. Use the Move Mailbox wizard in Exchange Server 2007.
C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter.
D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
|Your company?s Exchange Server 2007 organization has a mail-enabled public folder named
Monitoring. The folder is configured to receive automated alerts from the companys external
monitoring system. All corporate users can send e-mail to this public folder. Mail from the
monitoring system is being returned with a non-delivery report (NDR). You need to ensure that
the monitoring alerts will be received in the Monitoring public folder. What should you do?
A. Use Microsoft Office Outlook to assign anonymous users the permission to create items in the
Monitoring public folder.
B. Use Microsoft Office Outlook to assign default users the permission to create items in the
Monitoring public folder.
C. Run the Set-MailPublicFolder -RequireSenderAuthenticationEnabled: $true cmdlet for the
Monitoring public folder.
D. Run the Add-PublicFolderClientPermission -AccessRights: EditOwnedItems cmdlet for
anonymous users for the Monitoring public folder.
India News Network
Latest 20 Questions
Payment of time- barred debt is:
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal