Chapter 5 Server Review Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By TimGutierrez
T
TimGutierrez
Community Contributor
Quizzes Created: 4 | Total Attempts: 651
Questions: 20 | Attempts: 130

SettingsSettingsSettings
Chapter 5 Server Review Quiz - Quiz

Technically, a server is defined as a computer program that allows proper functioning for other programs and devices. Are you an IT technician and want to assess your knowledge on servers. Chapter 5-server review is what you need.


Questions and Answers
  • 1. 

    By default, user account names are case sensitive

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    User account names are not case sensitive by default. This means that the system does not differentiate between uppercase and lowercase letters when it comes to user account names. For example, "johnsmith" and "JohnSmith" would be considered the same account name.

    Rate this question:

  • 2. 

    The ability to force a user to be disconnected after logon hours expire is a group policy setting.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because group policy settings can be used to control various aspects of user behavior and permissions within a Windows domain. One such setting is the ability to force a user to be disconnected after their logon hours expire. This can be useful for enforcing security measures and ensuring that users adhere to predetermined access restrictions. By enabling this setting, administrators can automatically disconnect users once their allotted logon hours have expired, preventing unauthorized access outside of specified timeframes.

    Rate this question:

  • 3. 

    Members of the Backup Operators group can log on locally to and shut down domain controllers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Members of the Backup Operators group have the necessary privileges to log on locally to domain controllers and perform tasks such as shutting them down. This group is specifically designed to allow users to perform backup and restore operations on the domain controller, which includes shutting it down if necessary. Therefore, the statement is true.

    Rate this question:

  • 4. 

    In order to ensure no one uses public computer terminals after 5 pm, you’ve set the log on hours for the guest user accounts to deny log on after 5. However, you’ve noticed that users are still using the terminals after 5 pm, while other users are denied the ability to log in.Why are some users denied to log on, while other users are still using the terminals? 

    • A.

      Logon hours can only be set on stand-alone computers

    • B.

      The users were logged on prior to 5pm

    • C.

      You highlighted 8 am to 5 pm, but selected “Logon denied”

    • D.

      The machines the other users are on have pending update installs that are preventing the log off sequence from taking place

    Correct Answer
    B. The users were logged on prior to 5pm
  • 5. 

    Select below a character that can be used in a user account name:

    • A.

      !

    • B.

      @

    • C.

      :

    • D.

      ?

    Correct Answer
    A. !
    Explanation
    The exclamation mark (!) can be used in a user account name. It is a valid character that can be included in usernames for various systems and platforms.

    Rate this question:

  • 6. 

    If the Unlock Account checkbox is selected under a user account’s Properties dialog box, what does this mean?

    • A.

      The user was disabled by administrator

    • B.

      The user has locked their screensaver password

    • C.

      The user has too many failed logon attempts and is locked out

    • D.

      The account’s properties have been locked to prevent modification

    Correct Answer
    C. The user has too many failed logon attempts and is locked out
    Explanation
    If the Unlock Account checkbox is selected under a user account's Properties dialog box, it means that the user has too many failed logon attempts and is locked out. This checkbox is used to unlock the account and allow the user to log in again after a certain period of time or after the administrator manually unlocks it.

    Rate this question:

  • 7. 

    By default, a user’s profile is created.... 

    • A.

      When the user is created

    • B.

      When the user first logs on

    • C.

      After the user first logs off

    • D.

      After the user creates his profile folder

    Correct Answer
    B. When the user first logs on
    Explanation
    When a user first logs on to a system, their profile is created by default. This means that all the necessary settings, preferences, and personalization options are set up for that specific user. This allows the user to have a personalized experience and access their specific files and applications. Creating the profile when the user first logs on ensures that the profile is created only for active users and reduces unnecessary storage usage for inactive users.

    Rate this question:

  • 8. 

    Where are user profiles stored by default in Windows Server 2008?

    • A.

      %SYSTEMDRIVE%\Users

    • B.

      %SYSTEMDRIVE%\Documents and Settings

    • C.

      %SYSTEMDRIVE%\LocalUsers

    • D.

      %SYSTEMPARTITION%\LocalUsers

    Correct Answer
    A. %SYSTEMDRIVE%\Users
    Explanation
    In Windows Server 2008, user profiles are stored by default in the directory %SYSTEMDRIVE%\Users. This directory is typically located on the C: drive, which is the system drive. The user profiles contain personal settings, documents, and other user-specific data for each user on the server. Storing the profiles in the %SYSTEMDRIVE%\Users directory allows for easy access and management of the user profiles.

    Rate this question:

  • 9. 

    How do you change a profile into a mandatory profile? 

    • A.

      Delete Ntuser.dat from the profile

    • B.

      Rename Ntuser.dat to Ntuser.manual

    • C.

      Rename Ntuser.dat to Ntuser.man

    • D.

      Delete the AppData folder inside the profile

    Correct Answer
    C. Rename Ntuser.dat to Ntuser.man
    Explanation
    To change a profile into a mandatory profile, you need to rename the Ntuser.dat file to Ntuser.man. This file is responsible for storing the user's profile settings and preferences. By renaming it to Ntuser.man, the system recognizes it as a mandatory profile, which means that any changes made by the user will not be saved after logging off. This is useful in situations where you want to enforce a standard profile for multiple users, preventing them from making permanent changes to their profiles.

    Rate this question:

  • 10. 

    You have received a call from an employee about permissions on a shared folder, having found he can no longer access the resource. After checking the folder, you find that the group the employee is in is part of the resource’s DACL, but seems to have no effect on the group’s permissions. The group’s permission entry is the only entry in the DACL. What is wrong?

    • A.

      The shared resource no longer exists

    • B.

      The group has been converted from a security group to a distribution group

    • C.

      The group has been added to “Deny access to shared resources” policy on the

    • D.

      The group has been converted from a distribution group to a security group

    Correct Answer
    B. The group has been converted from a security group to a distribution group
    Explanation
    When a security group is converted to a distribution group, it loses its security-related permissions. This means that even though the group is still listed in the DACL of the shared folder, it no longer has any effect on the group's permissions. Therefore, the employee who is part of this group cannot access the shared folder.

    Rate this question:

  • 11. 

    Which statement is false? 

    • A.

      Domain local groups can have universal groups from any domain in the forest as members

    • B.

      Universal groups can have universal groups from any domain in the forest as members

    • C.

      Global groups can be members of any global group in the forest

    • D.

      Domain local groups can be members of local groups on domain member computers

    Correct Answer
    C. Global groups can be members of any global group in the forest
    Explanation
    The statement "Global groups can be members of any global group in the forest" is false. Global groups can only be members of domain local groups, not other global groups.

    Rate this question:

  • 12. 

    What is Microsoft’s best practices recommendation for the structure of group scope nesting?

    • A.

      AGDLP

    • B.

      ADLGP

    • C.

      AGPDL

    • D.

      ADLPG

    Correct Answer
    A. AGDLP
    Explanation
    Microsoft's best practices recommendation for the structure of group scope nesting is AGDLP. This acronym stands for Account, Global, Domain Local, and Permission. This structure is based on the principle of granting permissions to groups rather than individual users. The Account groups are used to manage user accounts, the Global groups are used to manage permissions across domains, the Domain Local groups are used to manage permissions within a specific domain, and the Permission groups are used to assign specific permissions to resources. This nesting structure ensures better organization, easier management, and more efficient permission assignment within an Active Directory environment.

    Rate this question:

  • 13. 

    Where are local groups stored? 

    • A.

      On a domain controller

    • B.

      On the local computer, under C:\Documents and Settings

    • C.

      On stand-alone servers only

    • D.

      In the local SAM database

    Correct Answer
    D. In the local SAM database
    Explanation
    Local groups are stored in the local SAM (Security Accounts Manager) database. The SAM database is a part of the Windows operating system and is responsible for storing local user and group account information on the local computer. It is used for authentication and authorization purposes, allowing users to access local resources and granting permissions to local groups. Therefore, the correct answer is "In the local SAM database."

    Rate this question:

  • 14. 

    Which group matches the following description?This universal group is found only on DCs in the forest root domain. Members have full control over forestwide operations. This group is a member of the Administrators group on all DCs.

    • A.

      Enterprise Admins

    • B.

      Domain Admins

    • C.

      DnsAdmins

    • D.

      Option 4

    Correct Answer
    A. Enterprise Admins
    Explanation
    The group that matches the given description is Enterprise Admins. This group is found only on domain controllers (DCs) in the forest root domain and its members have full control over forestwide operations. Additionally, Enterprise Admins is a member of the Administrators group on all DCs.

    Rate this question:

  • 15. 

    At about what interval does a computer change its computer account password? 

    • A.

      30 minutes

    • B.

      30 hours

    • C.

      30 days

    • D.

      30 weeks

    Correct Answer
    C. 30 days
    Explanation
    A computer typically changes its computer account password at a 30-day interval. This is a security measure to ensure that passwords are regularly updated and reduce the risk of unauthorized access to the system. By changing passwords regularly, the computer enhances its security and makes it more difficult for hackers or unauthorized users to gain access to sensitive information or resources.

    Rate this question:

  • 16. 

    Which command line tool removes, or deletes, objects from Active Directory? 

    • A.

      DSADD

    • B.

      DSGET

    • C.

      DSMOD

    • D.

      DSRM

    Correct Answer
    D. DSRM
    Explanation
    DSRM is the command line tool that is used to remove or delete objects from Active Directory. It stands for "Directory Services Restore Mode" and allows administrators to delete objects such as users, groups, computers, and organizational units from the Active Directory database. This tool helps in managing and maintaining the Active Directory environment by providing a way to remove unnecessary or outdated objects.

    Rate this question:

  • 17. 

    Which of the below utilities uses comma-separated values to bulk import or export Active Directory data? 

    • A.

      CVSDE

    • B.

      LDAP

    • C.

      CSVDE

    • D.

      LDFIDE

    Correct Answer
    C. CSVDE
    Explanation
    CSVDE (Comma-Separated Values Data Exchange) is the correct answer because it is a utility that is used to bulk import or export Active Directory data. It allows data to be stored in a CSV file format, where each value is separated by a comma. This format is commonly used for transferring and manipulating data between different systems. LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information, but it does not specifically use comma-separated values for bulk import or export. LDFIDE is not a valid utility or protocol.

    Rate this question:

  • 18. 

    A ____________________ is a group created in the local SAM database on a member server or workstation or a stand-alone computer.

    Correct Answer
    Local Group
    Explanation
    A local group refers to a group that is created within the local Security Accounts Manager (SAM) database on a member server, workstation, or a stand-alone computer. This type of group is specific to the local machine and is used for managing user access and permissions on that particular system. Local groups are not domain-based and do not have any impact or visibility on other machines or the entire network.

    Rate this question:

  • 19. 

    The ____________________ group is a built-in default group and has no default rights or permissions.

    Correct Answer
    Guests
    Explanation
    The "Guests" group is a built-in default group in a system or network that has no default rights or permissions. This means that users who are part of the "Guests" group do not have any special access or privileges by default. They are typically restricted from performing certain actions or accessing sensitive information, making it a limited and restricted group within the system or network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2014
    Quiz Created by
    TimGutierrez
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.