Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  What must be done to allow a user to be able to access a file encrypted with EFS over a network connection?
A.
B.
C.
D.
2.  What would you use to prevent GPOs linked to parent containers from affecting child containers?
A.
B.
C.
D.
3.  What does round robin do?
A.
B.
C.
D.
4.  If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect?
A.
B.
C.
D.
5.  You are in charge of a domain that contains several office rooms and one large computer commons area.  In order to secure accounts in the domain, you want to apply separate account policies for the computers in the commons area, while maintaining the policies that are used in the office rooms.  Currently, all computers are in the Computers folder.  What is the most efficent way to accomplish this task?
A.
B.
C.
D.
6.  Which of these is not a new GPO in Windows Vista and Server 2008?
A.
B.
C.
D.
7.  To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.
A.
B.
C.
D.
8.  What subnet mask would correspond to a CIDR notation of /24?
A.
B.
C.
D.
9.  The _____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.
A.
B.
C.
D.
10.  For several hours now, your IT staff has been trying to troubleshoot an issue on AppSrv1.  AppSrv1 uses an application that requires it to access SQL database on a server named DBSrv1 but recent changes in the network topology have outdated previous DNS entries. Initially, the problem is believed related to the DNS database, but after using nslookup, you find that the DNS entry is correct.  AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. What is most likely the issue?
A.
B.
C.
D.
11.  Which of the following is NOT a reason why some devices can't be placed on the network map?
A.
B.
C.
D.
12.  When configuring GPO's, which node contains the majority of account policies?
A.
B.
C.
D.
13.  If your creating a shortcut trust between domains in different forests, this must exist first:
A.
B.
C.
D.
14.  When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
A.
B.
C.
D.
15.  Which of the following Windows Server 2008 editions supports the hot-add processor feature?
A.
B.
C.
D.
16.  You work for the large Example.com corporation.  Recently, Example.com has been adding new branch offices at a steady rate.  Just last week, a new branch office was created and now you have been put in charge of configuring group policy settings for the branch office.  Because this branch office will be fairly large, it will be set up as a separate domain. Since there are several branch offices with similar GPO requirements, you want to be able to make use of GPOs that have already proven to be useful.  What is the easiest way to make the policies in this new branch office similar to those already in place?
A.
B.
C.
D.
17.  What command can you type to perform a system state backup?
A.
B.
C.
D.
18.  Which of the following is a GUI tool that enables you to view the replication topology graphically and monitor replication performance and status?
A.
B.
C.
D.
19.  Select the answer below that is not a service a public key infrastructure provides to a network:
A.
B.
C.
D.
20.  The main purpose of Active Directory is to _.
A.
B.
C.
D.
21.  When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.
A.
B.
C.
D.
22.  What is the default location of the ADMX files?
A.
B.
C.
D.
23.  Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?
A.
B.
C.
D.
24.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
25.  Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?
A.
B.
C.
D.
26.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
27.  A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.
A.
B.
C.
D.
28.  Which of the following Windows Server 2008 editions has no upgrade path?
A.
B.
C.
D.
29.  When using HTTPS, after the web client finds that  CA is trusted and the signature on a certficate is verified, the web client sends additional parameters to the server that are encrypted with the server's ....
A.
B.
C.
D.
30.  The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.
A.
B.
C.
D.
31.  What IP address class does the address 128.0.31.50 belong to?
A.
B.
C.
D.
32.  A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.
A.
B.
C.
D.
33.  One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server.  Your intern asks what command is used to do this.  Which command do you tell him to use?
A.
B.
C.
D.
34.  Which of the following statements is true regarding RODC replication?
A.
B.
C.
D.
35.  _____ are used in Microsoft operating systems to provide a consistent working environment for one or more users.
A.
B.
C.
D.
36.  File Server Resource Manager (FSRM) provides ____.
A.
B.
C.
D.
37.  You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.
A.
B.
C.
D.
38.  Which of the following is not a common way to configure DNS for a forest trust?
A.
B.
C.
D.
39.  Which command below can be used to add your Server Core system as a domain member?
A.
B.
C.
D.
40.  Which of the following best describes a directory service?
A.
B.
C.
D.
41.  What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?
A.
B.
C.
D.
42.  A _____ is typically used to enable one or two way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers.
A.
B.
C.
D.
43.  What can be done to solve the issue of server sprawl?
A.
B.
C.
D.
44.  Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
A.
B.
C.
D.
45.  The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:
A.
B.
C.
D.
46.  Your intern would like to know which of the following situations would be ideal for a Server Core installation:
A.
B.
C.
D.
47.  The ______ stores information about every object within a forest.
A.
B.
C.
D.
48.  If multiple default gateways are assigned to a computer (such as a multihomed server), what determines which default gateway will be used?
A.
B.
C.
D.
49.  Last Friday, your organization deployed a brand new Server Core installation of Windows Server 2008.  To simplify adminstrative tasks and to prevent downtime your organization makes use of monitoring software that continually tests connectivity.  This monitoring software then sends text messages to a specific group of administrators if it should detect that a server is unreachable for any reason. On Monday, when the Server Core's IP address was placed into the monitoring software, the group of administrators received a text almost immediately telling them that the Server Core machine was unreachable.  The administrator on-call says that on Friday, he was able to ping the Server Core box to a well known internet address, as well as several servers on the local network.  On Monday, he attempts to ping the Server Core installation from his workstation for the first time and does not receive a response. Assuming that the Server Core installation is using default settings, what is most likely the issue?
A.
B.
C.
D.
50.  You're in charge of a high-end, enterprise class server running Windows Server 2008 Datacenter edition.  Lately you've noticed that the server's memory utilization is too high, so you've decided to add an additional few sticks of RAM into the server's free slots. To reduce downtime, you should check if your server supports _____.
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz