Related Topics
Take Another Quiz

Network Services

105 Questions
Network Quizzes & Trivia

I wanna kill it

Questions and Answers
  • 1. 
    What allows businesses to define ,manage,access and secure network resources including fles,printers ,people and applications ?
    • A. 

      Network service

    • B. 

      Directory service

    • C. 

      Directory infrastructure

    • D. 

      NT directory

  • 2. 
    A window Server 2008 computer that has been configured with the Active Directory DS role  is referred to as
    • A. 

      Domain controller

    • B. 

      Domain manager

    • C. 

      Global catalog

    • D. 

      DNS server

  • 3. 
    The process of keeping each domain controller in synch with changes that has been made elsewhere on the network is called
    • A. 

      Copying

    • B. 

      Osmosis

    • C. 

      Transfering

    • D. 

      Replication

  • 4. 
    The read only domain controller contains a copy of the ntds.dit file that cannot be modified and does not replicate  its changes to other domain controllers within Active DIrectory
    • A. 

      Secondary

    • B. 

      Primary

    • C. 

      Read only

    • D. 

      Mandatory

  • 5. 
    The largest container object within Active Directory is a forest
    • A. 

      Organizational unit

    • B. 

      Domain

    • C. 

      Tree

    • D. 

      Forest

  • 6. 
    What contains the rules and definitions that are used for creating and modifying object classes and attributes with Active Directory
    • A. 

      Configuraton NC

    • B. 

      Schema NC

    • C. 

      Domain NC

    • D. 

      DC NC

  • 7. 
    A site is defined as one or more IP subnets that are connected by fast links
    • A. 

      Domain

    • B. 

      Network

    • C. 

      Site

    • D. 

      Forest

  • 8. 
    What locator records within DNS  allow clients to locate an Active Directory domain controller or global catalog
    • A. 

      A records

    • B. 

      MX records

    • C. 

      SRV records

    • D. 

      SOA records

  • 9. 
    What protocol has become an industry standard that enables data exchanges between directory services and applications ?
    • A. 

      NTDS

    • B. 

      LDAP

    • C. 

      NDIS

    • D. 

      AD

  • 10. 
    Windows server 2008 is the highest available forest functional
    • A. 

      Windows 2008

    • B. 

      Windows server 2003

    • C. 

      Windows server 2008

    • D. 

      Windows 2009

  • 11. 
    Active Directory uses trust relationships to allow access between multiple domains and /or forests either within a single forest or across multiple enterprises
    • A. 

      Trusts

    • B. 

      Domain

    • C. 

      Forest

    • D. 

      Global

  • 12. 
    What type of trust is new to windows server 2008 and is only available when the forest functionality is set to windows Server 2008
    • A. 

      Parent child trust

    • B. 

      Two way transitive trust

    • C. 

      Cross-forest trust

    • D. 

      Simple trust

  • 13. 
    What command can you use to run the Active Directory Installation Wizard ?
    • A. 

      Dcpromo

    • B. 

      Adpromo

    • C. 

      Domainpromo

    • D. 

      Adcreate

  • 14. 
    What shared folder exists on all domain controllers and is used to store Group Policy objects  login scripts and other files that are replicated domain-wide ?
    • A. 

      SYSVOL

    • B. 

      AD

    • C. 

      C$

    • D. 

      VOLMGR

  • 15. 
    What is the process of replicating DNS information from one DNS server to another ?
    • A. 

      Replication

    • B. 

      DNS push

    • C. 

      Zone transfer

    • D. 

      DNS update

  • 16. 
    What process can be used by windows server 2008 DNS to clean up the DNS database after DNS records become "stale " or out of date ?
    • A. 

      Searching and destroying

    • B. 

      Aging and scavenging

    • C. 

      Seeking and removing

    • D. 

      Finding and deleting

  • 17. 
    What SRV record information serves as a mechanism to set up load balancing between multiple servers that are advertising the same SRV records ?
    • A. 

      Priority

    • B. 

      Time to live

    • C. 

      Weight

    • D. 

      Port

  • 18. 
    What new Windows Server 2008 feature is a special installation option that creates a minimal  environment for running only specific services and roles ?
    • A. 

      Minimal Installation Option

    • B. 

      Server Core

    • C. 

      Server Standard

    • D. 

      Minimal Server Environment (MSE)

  • 19. 
    Read only domain  controllers provide added security in the way  passwords that are stored through what feature ?
    • A. 

      Password Integration Policy

    • B. 

      Password caching Policy

    • C. 

      Password Storage Policy

    • D. 

      Password Replication Policy

  • 20. 
    What utility is used to manually create trust relationships
    • A. 

      Active Directory Trust Console

    • B. 

      Active Directory Wizard

    • C. 

      Active Directory domains and trusts MMC snap in trust

    • D. 

      Active directory domains and trusts MMC control panel

  • 21. 
    What command line tool is used to create delete  ,verify, and reset trust relationships from the windows server 2008 command line ?
    • A. 

      Adtrust

    • B. 

      Netdom

    • C. 

      Csvde

    • D. 

      Nslookup

  • 22. 
    Active Directory  sites provide the means by which administrators can control replication traffic
    • A. 

      Services

    • B. 

      Sites

    • C. 

      Domains

    • D. 

      Forests

  • 23. 
    Domain controllers located in different sites will participate  in           replication
    • A. 

      Intersite

    • B. 

      Extrasite

    • C. 

      Extersite

    • D. 

      Intrasite

  • 24. 
    When you install the forest root domain controller in an Active Directory forest the Active DIrectory Installation Wizard creates a single site named
    • A. 

      Default Site

    • B. 

      SIte Default

    • C. 

      Default Site Name

    • D. 

      Default First Site Name

  • 25. 
    Active Directory creates a   with the idea that all writeable domain controllers in a domain should  communicate Active Directory  information to each other in addition to communicating  forest-wide informaton with other domains
    • A. 

      Replication topology

    • B. 

      Domain topology

    • C. 

      Replication strategy

    • D. 

      Domain strategy

  • 26. 
    When replicating information between sites Active Directory will designate a   server in each site to act as a gatekeeper in managing site to site replication
    • A. 

      Primary

    • B. 

      Masterhead

    • C. 

      Bridgehead

    • D. 

      Global catalog

  • 27. 
    What describes the amount of time that it takes for all domain controllers in the environment  to contain the most up to date information
    • A. 

      Replication

    • B. 

      Convergence

    • C. 

      Completion

    • D. 

      Propogation

  • 28. 
    Certain operations such as password change or an account lockout. will be transmitted by using  replication which means that the change will be placed at the "beginning of hte line and applied before any other  changes that are waiting to be replicated.
    • A. 

      Urgent

    • B. 

      Immediate

    • C. 

      Fast

    • D. 

      Pushed

  • 29. 
    What process is responsible for selecting a bridgehead server and mapping the topology to be  used for replication between sites ?
    • A. 

      Intersite Bridgehead Replicator

    • B. 

      Interste Replication Generator

    • C. 

      Intersite Bridgehead Generator

    • D. 

      Intersite Topology Generator

  • 30. 
    The primary goal of intersite replication is to mimimize the usage  of
    • A. 

      Active Directory

    • B. 

      Administrative labor

    • C. 

      Bandwidth

    • D. 

      Financial support

  • 31. 
    For both intrasite and intersite  replication what protocol does Active Directory use for all replication traffic ?
    • A. 

      RPC over SMTP

    • B. 

      RPC over TCP

    • C. 

      RPC over IP

    • D. 

      RPC over ARP

  • 32. 
    What defines a chain of site links by which domain controllers from different sites can communicate ?
    • A. 

      Site link bridge

    • B. 

      Site chain

    • C. 

      Site chain bridge

    • D. 

      Site link chain

  • 33. 
    What holds a subset of forest wide Active Directory objects and acts as a central repository by holding a complete copy of all objects from the host server local domain with a partial copy of all objects from other domains within the same forest ?
    • A. 

      Domain controller

    • B. 

      Global catalog

    • C. 

      DNS server

    • D. 

      DHCP Server

  • 34. 
    What is a partial copy of all objects from other domains within the same forest that is held on a global catalog server
    • A. 

      Partial attribute set

    • B. 

      Partial domain set

    • C. 

      Partial attribute listing

    • D. 

      Partial domain listing

  • 35. 
    Which of the following is not a function performed by a global catalog server ?
    • A. 

      Facilitating searches for objects in the forest

    • B. 

      Maintaining universal group membership information

    • C. 

      Maintaining a backup of all data stored on a domain controller

    • D. 

      Maintaining a copy of all objects in the domain

  • 36. 
    What windows Server 2008 feature stores universal group memberships on a local domain controller that can be used for logon to the domain eliminating the need for frequent access to a global  catalog server ?
    • A. 

      Global group membership caching

    • B. 

      Domain group membership caching

    • C. 

      Local group membership caching

    • D. 

      Universal group membership caching

  • 37. 
    Which FSMO role is responsible for reference updates from its domain objects to other domains ?
    • A. 

      Relative Identifier Master

    • B. 

      Infrastructure Master

    • C. 

      Domain Naming Master

    • D. 

      Schema Master

  • 38. 
    Which FSMO role has the authority to manage the creation and deletion of domains,domain trees,and application data partitions in the forest ?
    • A. 

      Relative Identifier Master

    • B. 

      Infrastructure Master

    • C. 

      Domain Naming Master

    • D. 

      Schema Master

  • 39. 
    Which of these design aspects should you consider when planning the appropriate location of FSMO role holders
    • A. 

      Role seizure

    • B. 

      Role transfer

    • C. 

      Role migration

    • D. 

      Role separation

  • 40. 
    What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role
    • A. 

      Role transfer

    • B. 

      Role migration

    • C. 

      Role seizure

    • D. 

      Role separation

  • 41. 
    What console must be used to move the domain Naming Master FSMO role ?
    • A. 

      Active DIrectory Users and Computers

    • B. 

      Active DIrectory Forests and Domains

    • C. 

      Active Directory Schema

    • D. 

      Active Directory Domains and Trusts

  • 42. 
    What tool is used to seize a FSMO role ?
    • A. 

      Ntosutil

    • B. 

      Ntdsutil

    • C. 

      Dcpromo

    • D. 

      Adutil

  • 43. 
    What is used to uniquely identify an object throughout the Active directory domain ?
    • A. 

      Security identifier

    • B. 

      Relative identifier

    • C. 

      Intermediate identifier

    • D. 

      Domain identifier

  • 44. 
    What types of memberships are stored in the global catalog?
    • A. 

      Domain local

    • B. 

      Universal

    • C. 

      Global

    • D. 

      Local workstation

  • 45. 
    What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation
    • A. 

      Cached login

    • B. 

      Cached credentials

    • C. 

      Stored login

    • D. 

      Stored credentials

  • 46. 
    What is the process of confirming a user's identity by using a known value such as a password pin number on a smart card, or user's fingerprint  or user's fingerprint in the case of biometric authentication ?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Administration

    • D. 

      Allocation

  • 47. 
    What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources .
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Administration

    • D. 

      Allocation

  • 48. 
    What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources ?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Administration

    • D. 

      Allocation

  • 49. 
    Which of the following is not a type of user account that can be configured in Windows Server 2008 ?
    • A. 

      Local accounts

    • B. 

      Domain accounts

    • C. 

      Network accounts

    • D. 

      Built in accounts

  • 50. 
    The two built in user accounts that are created on a windows server 2008 computer are the Administrator account and the   account
    • A. 

      Network

    • B. 

      Interactive

    • C. 

      Power User

    • D. 

      Guest

  • 51. 
    When a user logs on what is created that identifies the user and all of the user's group memberships ?
    • A. 

      Access card

    • B. 

      Access token

    • C. 

      Access key

    • D. 

      Access session

  • 52. 
    What describes the process of configuring one or more groups as members of another group ?
    • A. 

      Group nesting

    • B. 

      Group hierarchy

    • C. 

      Group leveling

    • D. 

      Group forests

  • 53. 
     groups are a collection of user accounts that are local to one specifci workstation or member server
    • A. 

      Distribution

    • B. 

      Local

    • C. 

      Built in

    • D. 

      Security

  • 54. 
    You cannot manually modify the group membershp of or view the membership lists of groups
    • A. 

      Distributions

    • B. 

      Domain local

    • C. 

      Special identity

    • D. 

      Universal

  • 55. 
    What special identify group contains all authenticated users  and domain guests ?
    • A. 

      Power Users

    • B. 

      Everyone

    • C. 

      Batch

    • D. 

      Authenticated Users

  • 56. 
    What special identity group is used as a reduced privilege account to allow applications to run on a server without requiring administrative access ?
    • A. 

      Network

    • B. 

      Dialup

    • C. 

      Network service

    • D. 

      Restricted

  • 57. 
    What special identity group is used by the system to allow permissons to protected system files for services to function properly ?
    • A. 

      Network Service

    • B. 

      Restricted

    • C. 

      Service

    • D. 

      Self

  • 58. 
    What command line utility is used to import or export Active Directory information from a comma-separated value (.csv) file
    • A. 

      Netdiag

    • B. 

      Nslookup

    • C. 

      Csvde

    • D. 

      Dcpromo

  • 59. 
    What can be used to add ,delete or modify objects in Active Directory, in addition to modifying the schema if necessary ?
    • A. 

      Dcpromo

    • B. 

      Ldife

    • C. 

      Csvde

    • D. 

      Nslookup

  • 60. 
                          name refers to each users login name
    • A. 

      Common

    • B. 

      Distinguished

    • C. 

      SAM account

    • D. 

      Ad Name

  • 61. 
    Password           is  an attempt to discover a users password
    • A. 

      Recovery

    • B. 

      Tracing

    • C. 

      Sniffing

    • D. 

      Cracking

  • 62. 
    What is a credit card sized or token style ,such as USB device that is used with a PIN to enable  logon to the enterprise?
    • A. 

      RSA SecureID

    • B. 

      Password token

    • C. 

      Smart chip

    • D. 

      Smart card

  • 63. 
    What is a system of digital certificates ,certification authorities (CAs) and other registration authorities (RAs) that verify and  authenticate the validity of each party involved in an electronic transaction through the use of  public key cryptography?
    • A. 

      CKI

    • B. 

      PKI

    • C. 

      DKI

    • D. 

      PCI

  • 64. 
    Which of the following is a benefit of implementing a public key infrastructure (PKI)
    • A. 

      Users no longer need to remember passwords

    • B. 

      All informaton is stored on the smart card,making it difficult for anyone except the intended user to use or access it

    • C. 

      Smart Cards can be used from remote locations such as a home office,to provide authentication services

    • D. 

      All of the above

  • 65. 
    What command line  tool can be used with a standard user account to reduce the risks associated with the Administrator account?
    • A. 

      Runas

    • B. 

      Su

    • C. 

      Runadmin

    • D. 

      Launchas

  • 66. 
    Which Ou is created by Default when Active Directory  is installed ?
    • A. 

      Domain Controllers

    • B. 

      Users

    • C. 

      Computers

    • D. 

      Member Servers

  • 67. 
    What tool allows you to utilize a simple interface to delegate permissons for domains ,OUs or containers ?
    • A. 

      Delegation Wizard

    • B. 

      Delegation of Control Wizard

    • C. 

      Delegation of Administration Wizard

    • D. 

      Administration Wizard

  • 68. 
    What typically consists of a least four characters or digits that are entered while presenting a physical access token ,such as an ATM card or smart card ?
    • A. 

      Password

    • B. 

      PIN

    • C. 

      Smart card

    • D. 

      RSA smartID

  • 69. 
    Password cracking can be accomplised by intelligent  guessing  on the part  of the hacker or through the use of an automated       attack
    • A. 

      Brute force

    • B. 

      Dictionary

    • C. 

      Cracking

    • D. 

      Work

  • 70. 
    What method of authentication requires a smart card and a PIN to provide more secure access to company resources ?
    • A. 

      Two -factor authentication

    • B. 

      Dual authentication

    • C. 

      Complex authentication

    • D. 

      Strong authentication

  • 71. 
    To implement PKI what must be installed on your Windows 2008 Server ?
    • A. 

      Actve DIrectory Users and Computers

    • B. 

      Microsoft AdminPak

    • C. 

      Active Directory Certificate Services

    • D. 

      Microsoft Advanced Security Pack

  • 72. 
    What component issues and manages certificates for individuals ,computers and organizations ?
    • A. 

      Enrollment agent

    • B. 

      PKI server

    • C. 

      Certificate server

    • D. 

      Certification Authority

  • 73. 
    Where is the certificate database located on a Certification Authority ?
    • A. 

      C:/Windows\system\Certlog

    • B. 

      C:\Windows\system32\Certlog

    • C. 

      C;\WIndows\Certlog

    • D. 

      C:\Windows \system32\Certlog32

  • 74. 
    Microsoft windows Server 2008 uses the WIndows Installer with group policy to install  and manage software that is packages into what type of file ?
    • A. 

      .exe

    • B. 

      .msi

    • C. 

      .mse

    • D. 

      .inf

  • 75. 
    Mofications to .ms files requier transform files which have the   extension
    • A. 

      .msit

    • B. 

      .mse

    • C. 

      .msx

    • D. 

      .mst

  • 76. 
            files are used to apply service packs and hotfixes to installed software .
    • A. 

      Update

    • B. 

      Patch

    • C. 

      Upgrade

    • D. 

      Enhanced

  • 77. 
    Before deploying software using Group Policy what must you create ?
    • A. 

      Deployment share

    • B. 

      Deployment point

    • C. 

      Distribution share

  • 78. 
    What option allows users to install the applications that they consider useful to them ?
    • A. 

      Assign

    • B. 

      Require

    • C. 

      Amend

    • D. 

      Publish

  • 79. 
    What option is helpful when you are deploying required applications to pertinent users and computers ?
    • A. 

      Assign

    • B. 

      Require

    • C. 

      Amend

    • D. 

      Publish

  • 80. 
    What allows  published applications to be organized within specfic  groupings for easy navigation ?
    • A. 

      Sofware classifications

    • B. 

      Software methods

    • C. 

      Software categories

    • D. 

      Software assignment

  • 81. 
    What policies are designed to identify software and control its execution ?
    • A. 

      Software Restriction

    • B. 

      Software Execution Prevention

    • C. 

      Malicious Software Detection

    • D. 

      Malicious Software Removal Policies

  • 82. 
    When configuring software restriction policies which option prevents any application from running that requires  administrative rights ,but allows programs  to run that only require resources  that are accesible by normal users ?
    • A. 

      Unrestricted

    • B. 

      Restricted

    • C. 

      Basic User

    • D. 

      Disallowed

  • 83. 
    By default,the software restriction policies  area has what value in the default  security level settings?
    • A. 

      Unrestricted

    • B. 

      Restricted

    • C. 

      Basic User

    • D. 

      Disallowed

  • 84. 
    Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network ?
    • A. 

      Hash rule

    • B. 

      Certifcation rule

    • C. 

      Path rule

    • D. 

      All of the above

  • 85. 
    What is a series of bytes with a fixed length that uniquely identifies a program or  file ?
    • A. 

      Algorithm

    • B. 

      Hash

    • C. 

      Policy

    • D. 

      Ip address

  • 86. 
    What identifies software by specifying the directory path where the application is stored in the file system ?
    • A. 

      Hash rule

    • B. 

      Certificate rule

    • C. 

      Path rule

    • D. 

      Network zone rule

  • 87. 
    What type of rule can be applied to allow only windows installer packages to be installed if they come from a trusted area of the network
    • A. 

      Hash rule

    • B. 

      Certificate rule

    • C. 

      Path rule

    • D. 

      Network zone rules

  • 88. 
    When implementing multiple software restriction policy rules which rule is always applied last ?
    • A. 

      Hash rule

    • B. 

      Certificate rule

    • C. 

      Path rule

    • D. 

      Network zone rules

  • 89. 
    What software restriction policy properties allow  you to determine whether the policies apply to all files or whether library files ,such as Dynamic Link Library DLL are excluded
    • A. 

      Enforcement

    • B. 

      Designated file types

    • C. 

      Security settings

    • D. 

      Trusted publishers

  • 90. 
    What software restriction policy properties allow an administrator to control how certificate rules are handled ?
    • A. 

      Enforcement

    • B. 

      Designated file types

    • C. 

      Security settings

    • D. 

      Trusted publishers

  • 91. 
    What type of file can be written to allow non-windows Installer compliant applicatons to be deployed ?
    • A. 

      .msi

    • B. 

      .exe

    • C. 

      .zap

    • D. 

      .ini

  • 92. 
    What mmc snap in provides a single access point to all aspects of group policy that were previously spread across other tools such as Active Directory  Users and Computers ,Active Directory sites and services .Resultant set of policy and the group policy  management  editor ?
    • A. 

      Group policy editor

    • B. 

      Group policy management

    • C. 

      GPedit

    • D. 

      Gpupdata

  • 93. 
    Which of the following can be done from the Group Policy Management snap in ?
    • A. 

      Import and copy GPO settings to and from the file system

    • B. 

      Search for GPOs based on name,permissions ,WMI filter,GUID or policy extension est in the GPOs

    • C. 

      Search for individual settings within a GPO by keyword and search for only thoese settings that have been configured

    • D. 

      All of the above

  • 94. 
    Group policy management started  being natively installed with what version  of windows server ?
    • A. 

      NT4

    • B. 

      2000

    • C. 

      2003

    • D. 

      2008

  • 95. 
    Which tab displays groups and users with permission to link ,perform modeling analyses or read group policy results information ?
    • A. 

      Linked group policy objects

    • B. 

      Group policy inheritance

    • C. 

      Delegation

    • D. 

      Management

  • 96. 
    When a GPO is selected in group policy management which tab allows administrators to view the locations to which the policy is linked ?
    • A. 

      Scope

    • B. 

      Details

    • C. 

      Delegation

    • D. 

      Management

  • 97. 
    When a GPO is selected in Group policy management which tab allows administrators to view  the locations to which the policy is linked?
    • A. 

      Scope

    • B. 

      Details

    • C. 

      Setings

    • D. 

      Delegation

  • 98. 
         Gpos can act as templates when creating new GPOs for your organization
    • A. 

      Template

    • B. 

      Base

    • C. 

      Starter

    • D. 

      Set

  • 99. 
    What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels ?
    • A. 

      Block Policy propagaton

    • B. 

      Block policy inheritance

    • C. 

      Remove policy inheritance

    • D. 

      Remove policy propagation

  • 100. 
    What refines the application of a GPO to include or exclude certains users ,groups, or computers  based on the ACL that is applied to the GPO?
    • A. 

      Block policy inheritance

    • B. 

      Policy delegation

    • C. 

      Group based filtering

    • D. 

      Security group filtering

  • 101. 
    What component of the microsoft windows operating system allows administrators  to create queries based on hardware,software,operating system and services?
    • A. 

      Effective Permissions

    • B. 

      Resultant set of polccy

    • C. 

      Effective set of policy

    • D. 

      Applied policy

  • 102. 
    Which mode in the Resultant set of  Policy wizard is useful for documenting and understanding how combined policies are affecting users and computers ?
    • A. 

      Logging

    • B. 

      Planning

    • C. 

      Implementation

    • D. 

      Audting

  • 103. 
    Group policy    is used to simulate the effect of a poicy on the user environment
    • A. 

      Simulator

    • B. 

      Planning

    • C. 

      Modeling

    • D. 

      Results

  • 104. 
    Rather than simulating policy effects like the group policy modeling wizard what obtains RSop information  from the client computer to show the actual effects that policies have on the client computer and user environment
    • A. 

      Group policy simulator

    • B. 

      Group policy planning

    • C. 

      Group policy modeling

    • D. 

      Group policy results

  • 105. 
    WMI filters cannot be evaluated on which operating system?
    • A. 

      Windows xp

    • B. 

      Windows 2000

    • C. 

      Windows server 2003

    • D. 

      Windows vista