Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which of the following best describes a directory service?
A.
B.
C.
D.
2.  In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others.
A.
B.
C.
D.
3.  One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
A.
B.
C.
D.
4.  In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.
A.
B.
C.
D.
5.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
6.  A forest is _____.
A.
B.
C.
D.
7.  What does round robin do?
A.
B.
C.
D.
8.  What option under the General tab in the Properties dialog box of a forest trust is only availble for use betweeon two Windows Server 2008 domains?
A.
B.
C.
D.
9.  At what interval does the Knwoledge Consistency Checker recalculate the replication topology by defalut?
A.
B.
C.
D.
10.  A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.
A.
B.
C.
D.
11.  Under what circumstances are the built-in user accounts no longer local user accounts?
A.
B.
C.
D.
12.  What subnode under Security Settings applies to wireless network policies?
A.
B.
C.
D.
13.  What command can you type to perform a system state backup?
A.
B.
C.
D.
14.  Which of the following is NOT a reason why some devices can't be placed on the network map?
A.
B.
C.
D.
15.  What is the only real downside of stub zone?
A.
B.
C.
D.
16.  The ______ stores information about every object within a forest.
A.
B.
C.
D.
17.  A _____ is typically used to enable one or two way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers.
A.
B.
C.
D.
18.  The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as ....
A.
B.
C.
D.
19.  What is the IPv6 equivalent of IPv4's loop back address of 127.0.0.1?
A.
B.
C.
D.
20.  Which of the following is not considered an urgent replication event (one that triggers change notifications immediately, without waiting the normal 15 seconds)
A.
B.
C.
D.
21.  Which of the following is not one of Active Directory Migration Tools three main types of migration?
A.
B.
C.
D.
22.  File Server Resource Manager (FSRM) provides ____.
A.
B.
C.
D.
23.  You are troubleshooting a network issue a user is having.  After having changed his network adapter to static addressing, he can no longer reach the internet.  However, the machine resolves Internet names to IP addresses.  Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254
A.
B.
C.
D.
24.  A _____ contains one or more domains that are in a common relationship.
A.
B.
C.
D.
25.  You're in charge of a high-end, enterprise class server running Windows Server 2008 Datacenter edition.  Lately you've noticed that the server's memory utilization is too high, so you've decided to add an additional few sticks of RAM into the server's free slots. To reduce downtime, you should check if your server supports _____.
A.
B.
C.
D.
26.  A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.
A.
B.
C.
D.
27.  Which of the following features is not present in Windows Server 2003 domain functional level?
A.
B.
C.
D.
28.  A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.
A.
B.
C.
D.
29.  The computer or print server device offering the printer share is the _____.
A.
B.
C.
D.
30.  A network interface is composed of two parts:
A.
B.
C.
D.
31.  What would you use to prevent GPOs linked to parent containers from affecting child containers?
A.
B.
C.
D.
32.  One of the below IP address / subnet mask pairs is invalid; find the invalid answer.
A.
B.
C.
D.
33.  When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.
A.
B.
C.
D.
34.  The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
A.
B.
C.
D.
35.  Your intern would like to know which of the following situations would be ideal for a Server Core installation:
A.
B.
C.
D.
36.  One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server.  Your intern asks what command is used to do this.  Which command do you tell him to use?
A.
B.
C.
D.
37.  A _____ is a  TCP/IP-based concept (container) within Active Directory that is linked to IP subnets.
A.
B.
C.
D.
38.  What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?
A.
B.
C.
D.
39.  A new employee, Alice, has been hired to work at a branch office configured with RODC.  This RODC connects to a DC over a WAN link back at the head office.  Just as Alice is about to log onto her machine for the first time, she finds that she is unable to authenticate despite using the correct user name and pasword given to her. Other users in the branch office can log in fine, but Alice cannot.  What is most likely the issue?
A.
B.
C.
D.
40.  You're taking an older server performing the PDC emulator master role out of service and will be replacing it with a new server configured as a domain controller.  What should you do to ensure the smoothest transition?
A.
B.
C.
D.
41.  The acronym CIDR stands for what?
A.
B.
C.
D.
42.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
43.  A(n) _____ means that if A and B have a trust and B and C have a trust, A and C automatically have a trust as well.
A.
B.
C.
D.
44.  GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?
A.
B.
C.
D.
45.  When using HTTPS, after the web client finds that  CA is trusted and the signature on a certficate is verified, the web client sends additional parameters to the server that are encrypted with the server's ....
A.
B.
C.
D.
46.  Which of the following is not a common way to configure DNS for a forest trust?
A.
B.
C.
D.
47.  If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
A.
B.
C.
D.
48.  An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
A.
B.
C.
D.
49.  Select the answer below that is not a service a public key infrastructure provides to a network:
A.
B.
C.
D.
50.  Where can you view a list of installed updates?
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz