Network Services

105 Questions  I  By Man04
I wanna kill it

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  What allows businesses to define ,manage,access and secure network resources including fles,printers ,people and applications ?
A.
B.
C.
D.
2.  A window Server 2008 computer that has been configured with the Active Directory DS role  is referred to as
A.
B.
C.
D.
3.  The process of keeping each domain controller in synch with changes that has been made elsewhere on the network is called
A.
B.
C.
D.
4.  The read only domain controller contains a copy of the ntds.dit file that cannot be modified and does not replicate  its changes to other domain controllers within Active DIrectory
A.
B.
C.
D.
5.  The largest container object within Active Directory is a forest
A.
B.
C.
D.
6.  What contains the rules and definitions that are used for creating and modifying object classes and attributes with Active Directory
A.
B.
C.
D.
7.  A site is defined as one or more IP subnets that are connected by fast links
A.
B.
C.
D.
8.  What locator records within DNS  allow clients to locate an Active Directory domain controller or global catalog
A.
B.
C.
D.
9.  What protocol has become an industry standard that enables data exchanges between directory services and applications ?
A.
B.
C.
D.
10.  Windows server 2008 is the highest available forest functional
A.
B.
C.
D.
11.  Active Directory uses trust relationships to allow access between multiple domains and /or forests either within a single forest or across multiple enterprises
A.
B.
C.
D.
12.  What type of trust is new to windows server 2008 and is only available when the forest functionality is set to windows Server 2008
A.
B.
C.
D.
13.  What command can you use to run the Active Directory Installation Wizard ?
A.
B.
C.
D.
14.  What shared folder exists on all domain controllers and is used to store Group Policy objects  login scripts and other files that are replicated domain-wide ?
A.
B.
C.
D.
15.  What is the process of replicating DNS information from one DNS server to another ?
A.
B.
C.
D.
16.  What process can be used by windows server 2008 DNS to clean up the DNS database after DNS records become "stale " or out of date ?
A.
B.
C.
D.
17.  What SRV record information serves as a mechanism to set up load balancing between multiple servers that are advertising the same SRV records ?
A.
B.
C.
D.
18.  What new Windows Server 2008 feature is a special installation option that creates a minimal  environment for running only specific services and roles ?
A.
B.
C.
D.
19.  Read only domain  controllers provide added security in the way  passwords that are stored through what feature ?
A.
B.
C.
D.
20.  What utility is used to manually create trust relationships
A.
B.
C.
D.
21.  What command line tool is used to create delete  ,verify, and reset trust relationships from the windows server 2008 command line ?
A.
B.
C.
D.
22.  Active Directory  sites provide the means by which administrators can control replication traffic
A.
B.
C.
D.
23.  Domain controllers located in different sites will participate  in           replication
A.
B.
C.
D.
24.  When you install the forest root domain controller in an Active Directory forest the Active DIrectory Installation Wizard creates a single site named
A.
B.
C.
D.
25.  Active Directory creates a   with the idea that all writeable domain controllers in a domain should  communicate Active Directory  information to each other in addition to communicating  forest-wide informaton with other domains
A.
B.
C.
D.
26.  When replicating information between sites Active Directory will designate a   server in each site to act as a gatekeeper in managing site to site replication
A.
B.
C.
D.
27.  What describes the amount of time that it takes for all domain controllers in the environment  to contain the most up to date information
A.
B.
C.
D.
28.  Certain operations such as password change or an account lockout. will be transmitted by using  replication which means that the change will be placed at the "beginning of hte line and applied before any other  changes that are waiting to be replicated.
A.
B.
C.
D.
29.  What process is responsible for selecting a bridgehead server and mapping the topology to be  used for replication between sites ?
A.
B.
C.
D.
30.  The primary goal of intersite replication is to mimimize the usage  of
A.
B.
C.
D.
31.  For both intrasite and intersite  replication what protocol does Active Directory use for all replication traffic ?
A.
B.
C.
D.
32.  What defines a chain of site links by which domain controllers from different sites can communicate ?
A.
B.
C.
D.
33.  What holds a subset of forest wide Active Directory objects and acts as a central repository by holding a complete copy of all objects from the host server local domain with a partial copy of all objects from other domains within the same forest ?
A.
B.
C.
D.
34.  What is a partial copy of all objects from other domains within the same forest that is held on a global catalog server
A.
B.
C.
D.
35.  Which of the following is not a function performed by a global catalog server ?
A.
B.
C.
D.
36.  What windows Server 2008 feature stores universal group memberships on a local domain controller that can be used for logon to the domain eliminating the need for frequent access to a global  catalog server ?
A.
B.
C.
D.
37.  Which FSMO role is responsible for reference updates from its domain objects to other domains ?
A.
B.
C.
D.
38.  Which FSMO role has the authority to manage the creation and deletion of domains,domain trees,and application data partitions in the forest ?
A.
B.
C.
D.
39.  Which of these design aspects should you consider when planning the appropriate location of FSMO role holders
A.
B.
C.
D.
40.  What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role
A.
B.
C.
D.
41.  What console must be used to move the domain Naming Master FSMO role ?
A.
B.
C.
D.
42.  What tool is used to seize a FSMO role ?
A.
B.
C.
D.
43.  What is used to uniquely identify an object throughout the Active directory domain ?
A.
B.
C.
D.
44.  What types of memberships are stored in the global catalog?
A.
B.
C.
D.
45.  What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation
A.
B.
C.
D.
46.  What is the process of confirming a user's identity by using a known value such as a password pin number on a smart card, or user's fingerprint  or user's fingerprint in the case of biometric authentication ?
A.
B.
C.
D.
47.  What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources .
A.
B.
C.
D.
48.  What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources ?
A.
B.
C.
D.
49.  Which of the following is not a type of user account that can be configured in Windows Server 2008 ?
A.
B.
C.
D.
50.  The two built in user accounts that are created on a windows server 2008 computer are the Administrator account and the   account
A.
B.
C.
D.
51.  When a user logs on what is created that identifies the user and all of the user's group memberships ?
A.
B.
C.
D.
52.  What describes the process of configuring one or more groups as members of another group ?
A.
B.
C.
D.
53.   groups are a collection of user accounts that are local to one specifci workstation or member server
A.
B.
C.
D.
54.  You cannot manually modify the group membershp of or view the membership lists of groups
A.
B.
C.
D.
55.  What special identify group contains all authenticated users  and domain guests ?
A.
B.
C.
D.
56.  What special identity group is used as a reduced privilege account to allow applications to run on a server without requiring administrative access ?
A.
B.
C.
D.
57.  What special identity group is used by the system to allow permissons to protected system files for services to function properly ?
A.
B.
C.
D.
58.  What command line utility is used to import or export Active Directory information from a comma-separated value (.csv) file
A.
B.
C.
D.
59.  What can be used to add ,delete or modify objects in Active Directory, in addition to modifying the schema if necessary ?
A.
B.
C.
D.
60.                        name refers to each users login name
A.
B.
C.
D.
61.  Password           is  an attempt to discover a users password
A.
B.
C.
D.
62.  What is a credit card sized or token style ,such as USB device that is used with a PIN to enable  logon to the enterprise?
A.
B.
C.
D.
63.  What is a system of digital certificates ,certification authorities (CAs) and other registration authorities (RAs) that verify and  authenticate the validity of each party involved in an electronic transaction through the use of  public key cryptography?
A.
B.
C.
D.
64.  Which of the following is a benefit of implementing a public key infrastructure (PKI)
A.
B.
C.
D.
65.  What command line  tool can be used with a standard user account to reduce the risks associated with the Administrator account?
A.
B.
C.
D.
66.  Which Ou is created by Default when Active Directory  is installed ?
A.
B.
C.
D.
67.  What tool allows you to utilize a simple interface to delegate permissons for domains ,OUs or containers ?
A.
B.
C.
D.
68.  What typically consists of a least four characters or digits that are entered while presenting a physical access token ,such as an ATM card or smart card ?
A.
B.
C.
D.
69.  Password cracking can be accomplised by intelligent  guessing  on the part  of the hacker or through the use of an automated       attack
A.
B.
C.
D.
70.  What method of authentication requires a smart card and a PIN to provide more secure access to company resources ?
A.
B.
C.
D.
71.  To implement PKI what must be installed on your Windows 2008 Server ?
A.
B.
C.
D.
72.  What component issues and manages certificates for individuals ,computers and organizations ?
A.
B.
C.
D.
73.  Where is the certificate database located on a Certification Authority ?
A.
B.
C.
D.
74.  Microsoft windows Server 2008 uses the WIndows Installer with group policy to install  and manage software that is packages into what type of file ?
A.
B.
C.
D.
75.  Mofications to .ms files requier transform files which have the   extension
A.
B.
C.
D.
76.          files are used to apply service packs and hotfixes to installed software .
A.
B.
C.
D.
77.  Before deploying software using Group Policy what must you create ?
A.
B.
C.
78.  What option allows users to install the applications that they consider useful to them ?
A.
B.
C.
D.
79.  What option is helpful when you are deploying required applications to pertinent users and computers ?
A.
B.
C.
D.
80.  What allows  published applications to be organized within specfic  groupings for easy navigation ?
A.
B.
C.
D.
81.  What policies are designed to identify software and control its execution ?
A.
B.
C.
D.
82.  When configuring software restriction policies which option prevents any application from running that requires  administrative rights ,but allows programs  to run that only require resources  that are accesible by normal users ?
A.
B.
C.
D.
83.  By default,the software restriction policies  area has what value in the default  security level settings?
A.
B.
C.
D.
84.  Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network ?
A.
B.
C.
D.
85.  What is a series of bytes with a fixed length that uniquely identifies a program or  file ?
A.
B.
C.
D.
86.  What identifies software by specifying the directory path where the application is stored in the file system ?
A.
B.
C.
D.
87.  What type of rule can be applied to allow only windows installer packages to be installed if they come from a trusted area of the network
A.
B.
C.
D.
88.  When implementing multiple software restriction policy rules which rule is always applied last ?
A.
B.
C.
D.
89.  What software restriction policy properties allow  you to determine whether the policies apply to all files or whether library files ,such as Dynamic Link Library DLL are excluded
A.
B.
C.
D.
90.  What software restriction policy properties allow an administrator to control how certificate rules are handled ?
A.
B.
C.
D.
91.  What type of file can be written to allow non-windows Installer compliant applicatons to be deployed ?
A.
B.
C.
D.
92.  What mmc snap in provides a single access point to all aspects of group policy that were previously spread across other tools such as Active Directory  Users and Computers ,Active Directory sites and services .Resultant set of policy and the group policy  management  editor ?
A.
B.
C.
D.
93.  Which of the following can be done from the Group Policy Management snap in ?
A.
B.
C.
D.
94.  Group policy management started  being natively installed with what version  of windows server ?
A.
B.
C.
D.
95.  Which tab displays groups and users with permission to link ,perform modeling analyses or read group policy results information ?
A.
B.
C.
D.
96.  When a GPO is selected in group policy management which tab allows administrators to view the locations to which the policy is linked ?
A.
B.
C.
D.
97.  When a GPO is selected in Group policy management which tab allows administrators to view  the locations to which the policy is linked?
A.
B.
C.
D.
98.       Gpos can act as templates when creating new GPOs for your organization
A.
B.
C.
D.
99.  What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels ?
A.
B.
C.
D.
100.  What refines the application of a GPO to include or exclude certains users ,groups, or computers  based on the ACL that is applied to the GPO?
A.
B.
C.
D.
101.  What component of the microsoft windows operating system allows administrators  to create queries based on hardware,software,operating system and services?
A.
B.
C.
D.
102.  Which mode in the Resultant set of  Policy wizard is useful for documenting and understanding how combined policies are affecting users and computers ?
A.
B.
C.
D.
103.  Group policy    is used to simulate the effect of a poicy on the user environment
A.
B.
C.
D.
104.  Rather than simulating policy effects like the group policy modeling wizard what obtains RSop information  from the client computer to show the actual effects that policies have on the client computer and user environment
A.
B.
C.
D.
105.  WMI filters cannot be evaluated on which operating system?
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz