Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  The computer or print server device offering the printer share is the _____.
A.
B.
C.
D.
2.  Under what MMC would you create new connection objects?
A.
B.
C.
D.
3.  Which description best fits the CA Administrator role?
A.
B.
C.
D.
4.  You have created a subnetted network and left 4 bits for host IDs.  How many hosts can you have per subnet?
A.
B.
C.
D.
5.  In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.
A.
B.
C.
D.
6.  The forest _____ refers to the Active Directory functions supported forest-wide.
A.
B.
C.
D.
7.  What is the default no-refresh interval set to on DNS record timestamps?
A.
B.
C.
D.
8.  What must be done to allow a user to be able to access a file encrypted with EFS over a network connection?
A.
B.
C.
D.
9.  Which of the following is an important requirement for running Hyper-V?
A.
B.
C.
D.
10.  What is the only real downside of stub zone?
A.
B.
C.
D.
11.  If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect?
A.
B.
C.
D.
12.  When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.
A.
B.
C.
D.
13.  The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.
A.
B.
C.
D.
14.  Which of the following features is not present in Windows Server 2003 domain functional level?
A.
B.
C.
D.
15.  Under what circumstances are the built-in user accounts no longer local user accounts?
A.
B.
C.
D.
16.  When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.
A.
B.
C.
D.
17.  When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
A.
B.
C.
D.
18.  The ______ stores information about every object within a forest.
A.
B.
C.
D.
19.  If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
A.
B.
C.
D.
20.  Installing DNS on a RODC creates a ...
A.
B.
C.
D.
21.  You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.
A.
B.
C.
D.
22.  A _____ contains one or more domains that are in a common relationship.
A.
B.
C.
D.
23.  Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server.
A.
B.
C.
D.
24.  Select the answer below that is not a service a public key infrastructure provides to a network:
A.
B.
C.
D.
25.  A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.
A.
B.
C.
D.
26.  Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
A.
B.
C.
D.
27.  What would you use to prevent GPOs linked to parent containers from affecting child containers?
A.
B.
C.
D.
28.  Which of the following Windows Server 2008 editions supports the hot-add processor feature?
A.
B.
C.
D.
29.  A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.
A.
B.
C.
D.
30.  The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:
A.
B.
C.
D.
31.  At what interval does the Knwoledge Consistency Checker recalculate the replication topology by defalut?
A.
B.
C.
D.
32.  One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
A.
B.
C.
D.
33.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
34.  If multiple servers are specified in the forwarders tab of a server's Properties, what happens if a query is made and none of the forwarders provide a response?
A.
B.
C.
D.
35.  You are in charge of a domain that contains several office rooms and one large computer commons area.  In order to secure accounts in the domain, you want to apply separate account policies for the computers in the commons area, while maintaining the policies that are used in the office rooms.  Currently, all computers are in the Computers folder.  What is the most efficent way to accomplish this task?
A.
B.
C.
D.
36.  Which of the following is not one of Active Directory Migration Tools three main types of migration?
A.
B.
C.
D.
37.  Which of the following is not a common way to configure DNS for a forest trust?
A.
B.
C.
D.
38.  What protocol provides automatic IP address configuration?
A.
B.
C.
D.
39.  Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?
A.
B.
C.
D.
40.  One of your administrators is unfamiliar with using the command line, but needs to be able to manage a Windows Server 2008 Core install. While attemtping to used an MMC snap-in to manage Server Core, he finds that he is unable to do so. He notes that some snap-ins, such as Shared Folders and Services worked perfectly remotely, while MMCs such as Event Viewer do not.  What is most likely the issue?
A.
B.
C.
D.
41.  Which of the following server roles is not available within a Windows Server 2008 Core Installation?
A.
B.
C.
D.
42.  The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.
A.
B.
C.
D.
43.  Last Friday, your organization deployed a brand new Server Core installation of Windows Server 2008.  To simplify adminstrative tasks and to prevent downtime your organization makes use of monitoring software that continually tests connectivity.  This monitoring software then sends text messages to a specific group of administrators if it should detect that a server is unreachable for any reason. On Monday, when the Server Core's IP address was placed into the monitoring software, the group of administrators received a text almost immediately telling them that the Server Core machine was unreachable.  The administrator on-call says that on Friday, he was able to ping the Server Core box to a well known internet address, as well as several servers on the local network.  On Monday, he attempts to ping the Server Core installation from his workstation for the first time and does not receive a response. Assuming that the Server Core installation is using default settings, what is most likely the issue?
A.
B.
C.
D.
44.  You're taking an older server performing the PDC emulator master role out of service and will be replacing it with a new server configured as a domain controller.  What should you do to ensure the smoothest transition?
A.
B.
C.
D.
45.  Which of the following statements is true regarding RODC replication?
A.
B.
C.
D.
46.  A _____ is typically used to enable one or two way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers.
A.
B.
C.
D.
47.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
48.  What does round robin do?
A.
B.
C.
D.
49.  Which of the following tools is the basic application responsible for loading more useful management related snap-ins?
A.
B.
C.
D.
50.  DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______.
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz