70-410 Quiz - Ness MCSA - April 2015

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shira3101
S
Shira3101
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,160
Questions: 18 | Attempts: 1,160

SettingsSettingsSettings
MCSA Quizzes & Trivia

Questions and Answers
  • 1. 

    After promoting server 2012 to domain controller, where is the ntds folder located?

    • A.

      In the new drive that has been created in the dc

    • B.

      In users and computer role consol

    • C.

      In windows folder on c drive

    • D.

      In a vhd file

    Correct Answer
    C. In windows folder on c drive
    Explanation
    After promoting server 2012 to a domain controller, the ntds folder is located in the Windows folder on the C drive. This is because the ntds folder contains the Active Directory database and log files, which are essential components of the domain controller. Storing them in the Windows folder on the C drive ensures that they are easily accessible and properly integrated with the operating system.

    Rate this question:

  • 2. 

    Which operation master roles (fsmo) must be located in the forest?

    • A.

      Rid master , schema master

    • B.

      Domain naming master , pdc emulator

    • C.

      Schema master , domain naming master

    • D.

      Pdc emulator , rid master

    Correct Answer
    C. Schema master , domain naming master
    Explanation
    The correct answer is schema master and domain naming master. These two operation master roles (FSMO) must be located in the forest. The schema master is responsible for managing and making changes to the Active Directory schema, which defines the structure and attributes of objects in the directory. The domain naming master is responsible for managing the addition and removal of domains in the forest. Both of these roles are critical for maintaining the integrity and functionality of the Active Directory forest.

    Rate this question:

  • 3. 

    Which of the following microsoft operation systems (editions) include a license that allows you to create a unlimited number of virtual instances?

    • A.

      Standard edition

    • B.

      Essencial edition

    • C.

      Enterprise edition

    • D.

      Datacenter edition

    Correct Answer
    D. Datacenter edition
    Explanation
    The Datacenter edition of Microsoft operating systems includes a license that allows users to create an unlimited number of virtual instances. This means that organizations using the Datacenter edition can run multiple virtual machines on a single physical server without having to purchase additional licenses. This edition is typically used by large enterprises or data centers that require a high level of virtualization and scalability.

    Rate this question:

  • 4. 

    Why do we use reley agent for dhcp scenarios?

    • A.

      For security means

    • B.

      Helps dhcp lease addresess to clint in the lan network

    • C.

      Helps dhcp lease addresess to client out of the lan to another network

    • D.

      Manage split scope

    Correct Answer
    C. Helps dhcp lease addresess to client out of the lan to another network
    Explanation
    The relay agent is used in DHCP scenarios to help lease addresses to clients outside of the local area network (LAN) and to another network. It acts as an intermediary between the DHCP server and the client, forwarding DHCP messages between them. This is necessary when the client is located in a different network segment or subnet than the DHCP server. The relay agent ensures that the client's DHCP request reaches the server and that the server's response is properly routed back to the client.

    Rate this question:

  • 5. 

    The minimum requirments for installment of server 2012 are 1024 mb of ram

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The minimum requirements for the installation of Server 2012 are not 1024 MB of RAM. Therefore, the statement "the minimum requirements for the installment of server 2012 are 1024 MB of RAM" is false.

    Rate this question:

  • 6. 

    You have a child organizational unit created in a parent ou.the restrictions on the parant ou are identical for the child ou.what can be the reason for this?

    • A.

      The child ou has bben copied from the parant ou

    • B.

      Inheritance mode has benn disabled on child ou

    • C.

      Ntfs restrictions have been inherited to the child domain

    • D.

      Inheritance mode is enabled on child ou

    Correct Answer
    D. Inheritance mode is enabled on child ou
    Explanation
    The reason for the restrictions on the parent OU being identical for the child OU is that inheritance mode is enabled on the child OU. This means that any restrictions or settings applied to the parent OU will automatically be inherited by the child OU. Therefore, the child OU will have the same restrictions as the parent OU.

    Rate this question:

  • 7. 

    A folder has been created and shared.it was modified on permissions pane to full control for everyone.on the same folder, ntfs permissions where modified to read only for everyone.what will be applied to the folder for any user ?

    • A.

      Read only permissions

    • B.

      Full control

    • C.

      Modify

    • D.

      There will be a conflict between thr permissions

    Correct Answer
    A. Read only permissions
    Explanation
    The folder will have read-only permissions for any user. This is because NTFS permissions take precedence over shared permissions. Even though the shared permissions were modified to full control for everyone, the NTFS permissions were modified to read-only for everyone, causing the folder to have read-only permissions for all users. There will not be a conflict between the permissions as the NTFS permissions will be applied.

    Rate this question:

  • 8. 

    Which is the primary method for transmiting ipv6 traffic over ipv4 network?

    • A.

      Classless

    • B.

      Scavenging

    • C.

      Tunneling

    • D.

      Access lists

    Correct Answer
    C. Tunneling
    Explanation
    Tunneling is the primary method for transmitting IPv6 traffic over an IPv4 network. Tunneling allows IPv6 packets to be encapsulated within IPv4 packets, enabling them to traverse an IPv4 network. This is necessary because IPv4 and IPv6 are not directly compatible, and tunneling provides a solution for transmitting IPv6 traffic over an IPv4 infrastructure.

    Rate this question:

  • 9. 

    Which of the following are not elements of dns

    • A.

      Zones

    • B.

      Root hints

    • C.

      Reservations

    • D.

      Conditional forwardes

    Correct Answer
    C. Reservations
    Explanation
    The correct answer is "reservations". Reservations are not elements of DNS. DNS, which stands for Domain Name System, is responsible for translating domain names into IP addresses. Zones, root hints, and conditional forwarders are all components of DNS. Zones are used to define administrative boundaries for a portion of the DNS namespace. Root hints are a list of IP addresses for root DNS servers. Conditional forwarders are used to forward specific DNS queries to specific DNS servers. However, reservations are not a part of DNS and are typically associated with DHCP (Dynamic Host Configuration Protocol) to assign specific IP addresses to specific devices on a network.

    Rate this question:

  • 10. 

    Computer 1 has a group policy object that restricts users from using internet services.you log on to computer 1 with a user account which does not have the gpo restriction applied.you open internet explorer - what will happen?

    • A.

      You will be able to browse the internet

    • B.

      You will be restricted from visiting some web sites

    • C.

      You will not be able to browse the internet

    • D.

      You will not be able to browse the internet. but then you log on with a different user with an administrator account an then you are able to browse the internet

    Correct Answer
    C. You will not be able to browse the internet
    Explanation
    The group policy object on computer 1 restricts users from using internet services. Even though you log on with a user account that does not have the GPO restriction applied, the restriction will still be in effect. Therefore, you will not be able to browse the internet. However, if you log on with a different user account that has an administrator privilege, you may be able to bypass the GPO restriction and browse the internet.

    Rate this question:

  • 11. 

    How many layers does the tcp/ip protocol suite have?

    • A.

      3

    • B.

      4

    • C.

      7

    • D.

      9

    Correct Answer
    B. 4
    Explanation
    The TCP/IP protocol suite consists of four layers: the Network Interface layer, the Internet layer, the Transport layer, and the Application layer. Each layer has its own specific functions and protocols to ensure the successful transmission of data over a network. Therefore, the correct answer is 4.

    Rate this question:

  • 12. 

    Which of the following ip`s is  routable on the internet?

    • A.

      10.0.0.1

    • B.

      172.16.11.8

    • C.

      19.168.32.2

    • D.

      8.8.8.8

    Correct Answer
    D. 8.8.8.8
    Explanation
    The IP address 8.8.8.8 is routable on the internet because it belongs to the public IP address range. Public IP addresses are assigned to devices that are directly connected to the internet and can be accessed from anywhere on the network. In contrast, the IP addresses 10.0.0.1, 172.16.11.8, and 19.168.32.2 are all private IP addresses. Private IP addresses are used within local networks and cannot be accessed directly from the internet.

    Rate this question:

  • 13. 

    What are the ipv6 host records in dns?

    • A.

      A record

    • B.

      Soa record

    • C.

      Mx

    • D.

      Aaaa

    Correct Answer
    D. Aaaa
    Explanation
    The correct answer is "aaaa". In DNS, the AAAA record is used to map an IPv6 address to a domain name. It is similar to the A record used for IPv4 addresses but specifically designed for IPv6. The AAAA record allows clients to resolve and connect to hosts using IPv6 addresses.

    Rate this question:

  • 14. 

    What isn`t a function of shadow copies ?

    • A.

      Allow access to recent versions of files

    • B.

      Recover deleted items

    • C.

      Backup your database

    • D.

      Taking a snapshot

    Correct Answer
    C. Backup your database
    Explanation
    Shadow copies, also known as Volume Shadow Copies or Previous Versions, are a feature in Windows that allows users to access previous versions of files. They are primarily used to recover deleted items and provide access to recent versions of files. However, shadow copies are not designed to backup databases. While they can take a snapshot of the file system at a specific point in time, this is not the same as backing up a database. Therefore, the correct answer is that shadow copies do not function as a backup solution for databases.

    Rate this question:

  • 15. 

    How does ipv6 apipa address begining appear on screen?

    • A.

      ::1

    • B.

      Fe80

    • C.

      2001

    • D.

      192

    Correct Answer
    B. Fe80
    Explanation
    The correct answer is "fe80". This is because fe80 is the prefix for link-local addresses in IPv6. Link-local addresses are used for communication within a single network segment and are automatically assigned to devices when they don't have a globally unique address. Therefore, when an IPv6 link-local address is displayed on the screen, it typically starts with fe80.

    Rate this question:

  • 16. 

    If you have a volume smaller then 2 TB you should create a gpt disk.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    If you have a volume smaller than 2 TB, you do not need to create a GPT disk. GPT (GUID Partition Table) is a partitioning scheme that allows for larger disk sizes and more partitions compared to the older MBR (Master Boot Record) partitioning scheme. However, it is not necessary to use GPT for volumes smaller than 2 TB. Therefore, the correct answer is False.

    Rate this question:

  • 17. 

    What statemant about RODC is not correct?

    • A.

      Rodc helps secure active directory info on branch offices

    • B.

      Rodc is a DC with read only copies of AD

    • C.

      Rodc can only be installed as a secondery DC and not a primary in a forest

    • D.

      Rodc does not have to replicate AD database from main office so there are no issues with network bandwidth

    Correct Answer
    D. Rodc does not have to replicate AD database from main office so there are no issues with network bandwidth
    Explanation
    The correct answer is that "RODC does not have to replicate AD database from main office so there are no issues with network bandwidth." This statement is not correct because RODC does replicate the AD database from the main office, but it does so in a controlled and optimized manner to minimize network bandwidth usage. RODC receives a read-only copy of the AD database, which helps secure the active directory information on branch offices while reducing the risk of exposing sensitive information. RODC can be installed as a secondary DC and not as a primary in a forest.

    Rate this question:

  • 18. 

    What is a csv file?

    • A.

      A file in ntds folder

    • B.

      An excel file formated to a csv extention - in the form for scripting for bulk users creation list

    • C.

      A file that we use to bullid ntsf permissions

    • D.

      Gpedit file for comiting polices on hosts

    Correct Answer
    B. An excel file formated to a csv extention - in the form for scripting for bulk users creation list
    Explanation
    A CSV file is a type of file that is formatted as a comma-separated values file. It is commonly used to store tabular data, such as spreadsheets or databases, in a plain text format. This format allows the data to be easily imported and exported between different software applications. In the given answer, it correctly states that a CSV file is an Excel file formatted with a CSV extension. This means that the file can be opened and edited in Excel, but it follows the specific CSV formatting rules, making it suitable for scripting and creating bulk user lists.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 04, 2015
    Quiz Created by
    Shira3101

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.