Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
Please take the quiz to rate it.

Server Quizzes & Trivia
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.
A.
B.
C.
D.
2.  The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.
A.
B.
C.
D.
3.  One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
A.
B.
C.
D.
4.  Last Friday, your organization deployed a brand new Server Core installation of Windows Server 2008.  To simplify adminstrative tasks and to prevent downtime your organization makes use of monitoring software that continually tests connectivity.  This monitoring software then sends text messages to a specific group of administrators if it should detect that a server is unreachable for any reason. On Monday, when the Server Core's IP address was placed into the monitoring software, the group of administrators received a text almost immediately telling them that the Server Core machine was unreachable.  The administrator on-call says that on Friday, he was able to ping the Server Core box to a well known internet address, as well as several servers on the local network.  On Monday, he attempts to ping the Server Core installation from his workstation for the first time and does not receive a response. Assuming that the Server Core installation is using default settings, what is most likely the issue?
A.
B.
C.
D.
5.  The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.
A.
B.
C.
D.
6.  A _____ contains one or more domains that are in a common relationship.
A.
B.
C.
D.
7.  Select below a vaild requirement for the installation of Hyper-V:
A.
B.
C.
D.
8.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
9.  The ______ stores information about every object within a forest.
A.
B.
C.
D.
10.  You are troubleshooting a network issue a user is having.  After having changed his network adapter to static addressing, he can no longer reach the internet.  However, the machine resolves Internet names to IP addresses.  Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254
A.
B.
C.
D.
11.  If multiple servers are specified in the forwarders tab of a server's Properties, what happens if a query is made and none of the forwarders provide a response?
A.
B.
C.
D.
12.  What is the default location of the ADMX files?
A.
B.
C.
D.
13.  One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server.  Your intern asks what command is used to do this.  Which command do you tell him to use?
A.
B.
C.
D.
14.  An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
A.
B.
C.
D.
15.  What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?
A.
B.
C.
D.
16.  A forest is _____.
A.
B.
C.
D.
17.  What version of Internet Inforamation Services (IIS) is included with Windows Server 2008?
A.
B.
C.
D.
18.  Which is not a benefit of using virtual machines?
A.
B.
C.
D.
19.  To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.
A.
B.
C.
D.
20.  What command can you type to perform a system state backup?
A.
B.
C.
D.
21.  Your intern would like to know which of the following situations would be ideal for a Server Core installation:
A.
B.
C.
D.
22.  Which command below can be used to add your Server Core system as a domain member?
A.
B.
C.
D.
23.  Which of the following Windows Server 2008 editions supports the hot-add processor feature?
A.
B.
C.
D.
24.  For several hours now, your IT staff has been trying to troubleshoot an issue on AppSrv1.  AppSrv1 uses an application that requires it to access SQL database on a server named DBSrv1 but recent changes in the network topology have outdated previous DNS entries. Initially, the problem is believed related to the DNS database, but after using nslookup, you find that the DNS entry is correct.  AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. What is most likely the issue?
A.
B.
C.
D.
25.  What IP address class does the address 128.0.31.50 belong to?
A.
B.
C.
D.
26.  Select the answer below that is not a service a public key infrastructure provides to a network:
A.
B.
C.
D.
27.  When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.
A.
B.
C.
D.
28.  The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
A.
B.
C.
D.
29.  If a software package is assigned to a group of targeted computers via the Computer Configuration node, what happens?
A.
B.
C.
D.
30.  If your creating a shortcut trust between domains in different forests, this must exist first:
A.
B.
C.
D.
31.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
32.  The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as ....
A.
B.
C.
D.
33.  Windows Internet Name Service (WINS) is a legacy name service used to resolve ...
A.
B.
C.
D.
34.  What protocol provides automatic IP address configuration?
A.
B.
C.
D.
35.  A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.
A.
B.
C.
D.
36.  How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?
A.
B.
C.
D.
37.  What subnode under Security Settings applies to wireless network policies?
A.
B.
C.
D.
38.  What must be done to allow a user to be able to access a file encrypted with EFS over a network connection?
A.
B.
C.
D.
39.  DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______.
A.
B.
C.
D.
40.  GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?
A.
B.
C.
D.
41.  A ______ is one in which every child object contains the name of the parent object.
A.
B.
C.
D.
42.  Under Password policies, what is the default maximum password age?
A.
B.
C.
D.
43.  The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:
A.
B.
C.
D.
44.  Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
A.
B.
C.
D.
45.  The _____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.
A.
B.
C.
D.
46.  Where can you view a list of installed updates?
A.
B.
C.
D.
47.  A network interface is composed of two parts:
A.
B.
C.
D.
48.  What subnet mask would correspond to a CIDR notation of /24?
A.
B.
C.
D.
49.  Installing DNS on a RODC creates a ...
A.
B.
C.
D.
50.  What type of information does a resource record of type A contain?
A.
B.
C.
D.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.