Chapter 2

87 Questions  I  By V_gray
Please take the quiz to rate it.

Chapter 2
Review

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  What type of permissions control access to specific parts of an Active Directory hierarchy?
2.  What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?
3.  The drive interface that is preferred for network servers is called
4.  _________folders makes them accessible to network users.
5.  The disk interface most commonly associated with workstations is called ______.
6.  Subdomains in a tree inherit permissions and policies from their parent domains.
A.
B.
7.  Which of the following statements about the DiskPart command-line utility is Not true?
A.
B.
C.
D.
8.  A volume that consits of  a single volume ,u can extend it to create a spanned or striped volume. You can extend into any adjacent unallocated space on the same disk or, with some limitations, shrink the volume by de-allocating any unused space in the volume.
9.  When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.
A.
B.
10.  The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file’s___________ permissions.
11.  Each domain in an Active Directory installation is a separate __________ entity.
12.  What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?
13.  __________ volumes are parity information to rebuild data in the event of disk failure
14.  What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?
15.  Which of the following is not a reason why you should try to create as few domains as possible when designing an Active Directory infrastructure?
16.  A(n) _________ object is one that can have other objects subordinate to it
17.  To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called __________.
18.  When beginning a new Active Directory installation, the first step is to create a new __________.
19.  Each domain in an Active Directory installation is a separate __________ entity.
20.  Which of the following is not a variable that can affect the performance of an Active Directory installation?
A.
B.
C.
D.
21.  You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.
22.  Each domain in an Active Directory installation is a separate __________ entity.
23.  Drives can be mapped through Group Policy or though what other method?
24.  Which of the following statements are requirements for extending a volume on a dynamic disk?
A.
B.
C.
25.  A(n) __________ object is one that can have other objects subordinate to it.
26.  What is the name of the communications protocol called for by the original X.500 standard?
27.  The Read-Only Domain Controller (RODC) supports only incoming replication traffic. As a result, what is it possible to do when using a Read-Only Domain Controller?
A.
B.
C.
D.
28.  A standard interface for connecting storage devices such as hard disk and CD-ROM drives inside personal computer.
29.  Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?
30.  Every object consists of __________ that store information about the object.
31.  What is the primary difference between global and universal groups?
32.  What type of devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network?
33.  A separate netowrk dedicated to file servers and external storage devices
34.  Active Directory was first introduced in which operating system?
35.  A security principal is
A.
B.
C.
D.
36.  To use a Windows Server 2008 computer as a domain controller, you must configure it to use a(n) __________.
37.  Every Active Directory domain should have a minimum of __________ domain controllers.
38.  A mirrored drive installation that also uses redundant host adapters is called disk _______.
39.  Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service.
A.
B.
40.  __________Policy is one of the most powerful administrative features of Active Directory.  
41.  The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of _______traffic between sites.
42.  Active Directory was first introduced in which operating system?
43.  The overall objective in your Active Directory design process should be to create as few __________ as possible.
44.  What is the primary difference between global and universal groups?
45.  You can drag and drop leaf objects, such as users and computers, between OUs, but not between domains.
A.
B.
46.  The overall objective in your Active Directory design process should be to create as few ___________         as possible
47.  If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.
48.  Drives can be mapped through Group Policy or though what other method?
49.  In Windows, the ________file system is limited to volumes no larger than 32 GB.
50.  You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.
51.  The process of granting users access to file server shares by reading their permission is called:
52.  DNS naming limitations call for a maximum of how many characters per domain name?
53.  To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called___________.
54.  _____ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system.
55.  Which of the following statements are Not true in reference to converting a basic disk to a dynamic disk?
A.
B.
C.
D.
56.  Unlike organizational units, you cannot assign Group Policy settings to computer objects, nor can you delegate their administration.
A.
B.
57. 
Folder _______ asks users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server.  
58.  Which of  the following statements are Not true about differences between network attached storage (NAS) devices and storage area network (SAN) storage
A.
B.
C.
D.
59.  When you assign a __ _ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects
60.  The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of __________ traffic between sites.
61.  Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?
62.  What type of permissions control access to specific parts of an Active Directory hierarchy?
63.    The ________utility enables you to create a fourth primary permission on a basic disk.
64.  When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.
A.
B.
65.  If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all __________ in the same tree, with a single root domain at the top.
66.  When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.
A.
B.
67.  If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.
68.  A volume that writes data one stripe at a time , provides improved performance, and does not provide fault tolerance.
69.  A(n) __________ object is one that can have other objects subordinate to it.
70.  Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service.
A.
B.
71.  A site topology consists of all of the following Active Directory object types except __________.
72.  Which group is used most often when designing an Active Directory infrastructure?
73.  The features that enables a windows server 2008 computer to maintain up to 64 previous versions of a file is called?
74.  Where do users log in when joining an Active Directory domain?
75.  What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?
76.  Every object consists of _________ that store information about the object.
77.  Every Active Directory domain should have a minimum of _____ domain controllers.
78.  The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of _______traffic between sites.  
79.  There are two basic classes of objects in an Active Directory domain. Which of the following is an object?
80.  When using the subzone method, you can leave the Internet DNS servers in place and use Windows Server 2008 DNS servers to host the zone for the subdomain. Which of the following is a configuration change that you must make?A) You must use your domain controllers as your DNS servers.
A.
B.
C.
D.
81.  Which of the following is a main group type found in Active Directory?
82.  When beginning a new Active Directory installation, the first step is to create a new __________.
83.  In the NTFS permission system, ___________ permissions are actually combinations of _______ permissions.
84.  An access __ __ list is a collection of individual permissions in the form of access control entries.
85.  An Active Directory domain controller can verify a user’s identity by which of the following methods?
A.
B.
C.
D.
86.  DNS naming limitations call for a maximum of how many characters per domain name?
87.  Which of the following is not a reason for creating an organizational unit?
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.