Take Another Quiz

Windows Server 2008 Active Directory Configuration

50 Questions
Server Quizzes & Trivia

These are the questions and answers from our final, might not be the same for all books and classes.

Questions and Answers
  • 1. 
    Which of the following server roles is not available within a Windows Server 2008 Core Installation?
    • A. 

      File Services

    • B. 

      Terminal Services

    • C. 

      Hyper V

    • D. 

      Web Server (IIS)

  • 2. 
    The main purpose of Active Directory is to _.
    • A. 

      Provide authentication and authorization to users and computers.

    • B. 

      Provide File and Print services

    • C. 

      Give administrators the ability to control access to restricted hardware

    • D. 

      Allow users to organize their files systems into a cohesive and high performance directory structure

  • 3. 
    Which of the following Windows Server 2008 editions supports the hot-add processor feature?
    • A. 

      Windows Web Server 2008

    • B. 

      Standard Edition

    • C. 

      Enterprise Edition

    • D. 

      Datacenter Edition

  • 4. 
    Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?
    • A. 

      4 nodes

    • B. 

      8 nodes

    • C. 

      16 nodes

    • D. 

      30 nodes

  • 5. 
    One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
    • A. 

      Active Directory Federation Services (AD FS)

    • B. 

      Active Directory Lightweight Directory Services (AD LDS)

    • C. 

      Active Directory Rights Management Services (AD RMS)

    • D. 

      Active Directory Advanced Integration Services (AD AIS)

  • 6. 
    What version of Internet Inforamation Services (IIS) is included with Windows Server 2008?
    • A. 

      IIS 6.0

    • B. 

      IIS 7.0

    • C. 

      IIS 6.9.1

    • D. 

      IIS 7.5

  • 7. 
    Which of the following tools is the basic application responsible for loading more useful management related snap-ins?
    • A. 

      Microsoft Management Console

    • B. 

      Disk Management

    • C. 

      Internet Information Services Manager

    • D. 

      Hyper V Manager

  • 8. 
    When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.
    • A. 

      Domain controller

    • B. 

      Member server

    • C. 

      Stand-alone server

    • D. 

      Stand-alone member server

  • 9. 
    Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
    • A. 

      Virtual Private Network (VPN)

    • B. 

      Secure Socket Tunneling Protocol (SSTP)

    • C. 

      Secure HTTP (HTTPS)

    • D. 

      Network Address Translation (NAT)

  • 10. 
    Which is not a benefit of using virtual machines?
    • A. 

      Virtual machines consolidate resources

    • B. 

      Virtualization isolates critical applications for testing and troubleshooting purposes

    • C. 

      Virtual machines can be used to provide access to multiple OSs in an educational environment

    • D. 

      Virtual machines have reduced hardware and software requirements

  • 11. 
    File Server Resource Manager (FSRM) provides ____.
    • A. 

      Storage reports, configuration of disk quotas, and use of filters for files users can store on the server

    • B. 

      An interface for viewing status and monitoring and configuring shared folders and serve volumes

    • C. 

      High availability, reliable, shared storage

    • D. 

      A method to perform complete server backups form a simplified and centralized interface

  • 12. 
    A network interface is composed of two parts:
    • A. 

      Device driver software and network media

    • B. 

      Network interface and network medium

    • C. 

      Device driver software and network interface

    • D. 

      Network interface and client software

  • 13. 
    Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?
    • A. 

      30 days

    • B. 

      15 days

    • C. 

      60 days

    • D. 

      90 days

  • 14. 
    • A. 

      Over the weekend, Windows Update ran and downloaded a driver update for the ethernet card without disabling the original driver, causing it to malfunction. Using the command waus.exe /purge /recent should fix the issue

    • B. 

      The Server Core machine has the TCP/IP protocol enabled on the outgoing protocol list for the configured network interface, but not for the incoming list. It must be added in the interface's Properties dialog box

    • C. 

      The network cable is installed for the server has failed over the weekend, and should be replaced to restore normal network connectivity.

    • D. 

      Windows Server 2008's firewall is blocking ICMP Echo Request packets by default. To fix the issue, you must type netsh firewall set icmpsetting 8

  • 15. 
    Which command below can be used to add your Server Core system as a domain member?
    • A. 

      Netdom

    • B. 

      Dcpromo

    • C. 

      Netsh

    • D. 

      Domjoin

  • 16. 
    Select below a vaild requirement for the installation of Hyper-V:
    • A. 

      Windows Server 2008 Datacenter must be installed to use Hyper-V

    • B. 

      Your CPU must support virtualization extensions

    • C. 

      You require a Hyper-V license key

    • D. 

      You must have at least 128MB of RAM installed

  • 17. 
    • A. 

      Hot-add memory

    • B. 

      Hot-replace memory

    • C. 

      External memory slot controller

    • D. 

      Ho-add cpu

  • 18. 
    If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
    • A. 

      Windows Update

    • B. 

      IP address assignment

    • C. 

      Program performance

    • D. 

      User authentication

  • 19. 
    Which of the following Windows Server 2008 editions has no upgrade path?
    • A. 

      Standard Edition

    • B. 

      Enterprise Edition

    • C. 

      Datacenter Edition

    • D. 

      Web Server Edition

  • 20. 
    You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.
    • A. 

      SCSI

    • B. 

      SATA

    • C. 

      PATA

    • D. 

      SAS

  • 21. 
    Which of the following is an important requirement for running Hyper-V?
    • A. 

      Must have at least Windows Server 2008 Web Edition installed

    • B. 

      Must have a multi core CPU

    • C. 

      Must have a multi socket motherboard

    • D. 

      Must have at least Windows Server 2008 64-bit Standard Edition

  • 22. 
    Your intern would like to know which of the following situations would be ideal for a Server Core installation:
    • A. 

      You're installing the first server in a network

    • B. 

      You're upgrading from Windows Server 2003

    • C. 

      You want to run Windows Web Server 2003

    • D. 

      You want to install an RODC in a branch office

  • 23. 
    What can be done to solve the issue of server sprawl?
    • A. 

      Add new servers

    • B. 

      Consolidate the servers with virtualization

    • C. 

      Install potentially conflicting applications on seperate servers

    • D. 

      Reducing server uptime

  • 24. 
    Where can you view a list of installed updates?
    • A. 

      Update and Service Pack Manager

    • B. 

      Installed Updates Manager

    • C. 

      Programs and Features applet

    • D. 

      View/updates command

  • 25. 
    Which of the following defines the types of information stored in an Active Directory object?
    • A. 

      Attribute value

    • B. 

      Schema classes

    • C. 

      Schema attributes

    • D. 

      GPO's

  • 26. 
    Under what circumstances are the built-in user accounts no longer local user accounts?
    • A. 

      When accessing a network resource in a workgroup environment

    • B. 

      After installing Active Directory

    • C. 

      This is impossible, built-in user accounts cannot be converted

    • D. 

      When using dsadd on the built-in accounts

  • 27. 
    When configuring GPO's, which node contains the majority of account policies?
    • A. 

      Computer Configuration node, Windows Settings folder, Security Settings node

    • B. 

      Computer Configuration node, Administrative Templates folder, Windows Component node

    • C. 

      The User Configuration node, Administrative Templates folder

    • D. 

      The User Configuration node, Windows Settings folder, Security Settings node

  • 28. 
    You are in charge of a domain that contains several office rooms and one large computer commons area.  In order to secure accounts in the domain, you want to apply separate account policies for the computers in the commons area, while maintaining the policies that are used in the office rooms.  Currently, all computers are in the Computers folder.  What is the most efficent way to accomplish this task?
    • A. 

      Create a new OU called "CommonsArea" and move the commons area computer accounts into it. Create a new GPO and configure the desired account policies. Link the new GPO to the CommonsArea OU

    • B. 

      Create a new domain on a new domain controller to service the commons area

    • C. 

      The policy settings must be assigned manually on the local computer GPO's in the commons area

    • D. 

      Create a new GPO and specify the computer accounts of the computers in the commons area then apply the desired account policies. Finally, link the new GPO to the domain.

  • 29. 
    A forest is _____.
    • A. 

      A grouping of information that describes a network resource, such as a shared printer, or an organizing structure, such as a domain or OU

    • B. 

      The core structural unit of Active Directory, contains OUs and represents administrative security, and policy boundries

    • C. 

      A collection of one or more Active Directory trees

    • D. 

      A database that stores information about a computer network and includes features for retrieving and managing that information

  • 30. 
    At about what interval are GPOs updated on domain controllers?
    • A. 

      5 seconds

    • B. 

      5 minutes

    • C. 

      30 minutes

    • D. 

      5 hours

  • 31. 
    Which of the following best describes a directory service?
    • A. 

      Similar to a list of information in a text file

    • B. 

      Similar to a database program but with the capability to manage objects in it

    • C. 

      A program for managing the user interface on a server

    • D. 

      A program for managing folders, files, and permissions on a distributed server

  • 32. 
    The ______ stores information about every object within a forest.
    • A. 

      Global catalog

    • B. 

      Global master

    • C. 

      Schema master

    • D. 

      Master catalog

  • 33. 
    DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______.
    • A. 

      Address resolution

    • B. 

      Name resolution

    • C. 

      Domain resolution

    • D. 

      Host resolution

  • 34. 
    A ______ is one in which every child object contains the name of the parent object.
    • A. 

      Disjointed namespace

    • B. 

      Logical namespace

    • C. 

      Contained namespace

    • D. 

      Contiguous namespace

  • 35. 
    The forest _____ refers to the Active Directory functions supported forest-wide.
    • A. 

      Functional level

    • B. 

      Operational level

    • C. 

      Functional master

    • D. 

      Operational master

  • 36. 
    A _____ contains one or more domains that are in a common relationship.
    • A. 

      Forest

    • B. 

      Root

    • C. 

      Tree

    • D. 

      Branch

  • 37. 
    A(n) _____ means that if A and B have a trust and B and C have a trust, A and C automatically have a trust as well.
    • A. 

      One-way trust

    • B. 

      Transitive trust

    • C. 

      Linear trust

    • D. 

      Implied trust

  • 38. 
    A _____ is a  TCP/IP-based concept (container) within Active Directory that is linked to IP subnets.
    • A. 

      Forest

    • B. 

      Domain

    • C. 

      Site

    • D. 

      Tree

  • 39. 
    A _____ is typically used to enable one or two way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers.
    • A. 

      Realm trust

    • B. 

      Transitive trust

    • C. 

      Shortcut trust

    • D. 

      Linear trust

  • 40. 
    A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.
    • A. 

      Domain security group

    • B. 

      Global security group

    • C. 

      Universal security group

    • D. 

      Domain local group

  • 41. 
    _____ are used in Microsoft operating systems to provide a consistent working environment for one or more users.
    • A. 

      Environments

    • B. 

      Settings

    • C. 

      Templates

    • D. 

      Profiles

  • 42. 
    A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.
    • A. 

      Restricted Domain Controller

    • B. 

      Limited Access Domain Controller

    • C. 

      Read-Only Domain Controller

    • D. 

      Replication-Limited Domain Controller

  • 43. 
    A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.
    • A. 

      ACL

    • B. 

      ACE

    • C. 

      Attribute list

    • D. 

      GPO

  • 44. 
    The _____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.
    • A. 

      Read-only

    • B. 

      System

    • C. 

      Backup

    • D. 

      Archive

  • 45. 
    An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
    • A. 

      Encrypting File System

    • B. 

      Advanced Encryption Standard

    • C. 

      Data Encryption Standard

    • D. 

      Block Encryption System

  • 46. 
    When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
    • A. 

      General

    • B. 

      Edit

    • C. 

      Modify

    • D. 

      Tools

  • 47. 
    Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
    • A. 

      Archiving

    • B. 

      Logging

    • C. 

      Tracking

    • D. 

      Auditing

  • 48. 
    To _____ an object means to make it available for users to access when they view Active Directory contents.
    • A. 

      Inherit

    • B. 

      Control

    • C. 

      Present

    • D. 

      Publish

  • 49. 
    The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
    • A. 

      Encrypted File System

    • B. 

      Distributed File System

    • C. 

      Dispersed File System

    • D. 

      Extended File System

  • 50. 
    In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others.
    • A. 

      Distribution

    • B. 

      Replication

    • C. 

      Load balancing

    • D. 

      Redundancy

Related Topics