Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
Please take the quiz to rate it.

Server Quizzes & Trivia
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Questions and Answers Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  A network interface is composed of two parts:
A.
B.
C.
D.
2.  Which of the following statements is true regarding RODC replication?
A.
B.
C.
D.
3.  A new employee, Alice, has been hired to work at a branch office configured with RODC.  This RODC connects to a DC over a WAN link back at the head office.  Just as Alice is about to log onto her machine for the first time, she finds that she is unable to authenticate despite using the correct user name and pasword given to her. Other users in the branch office can log in fine, but Alice cannot.  What is most likely the issue?
A.
B.
C.
D.
4.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
5.  A _____ is a  TCP/IP-based concept (container) within Active Directory that is linked to IP subnets.
A.
B.
C.
D.
6.  If multiple servers are specified in the forwarders tab of a server's Properties, what happens if a query is made and none of the forwarders provide a response?
A.
B.
C.
D.
7.  Which of the following is not considered an urgent replication event (one that triggers change notifications immediately, without waiting the normal 15 seconds)
A.
B.
C.
D.
8.  If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
A.
B.
C.
D.
9.  What option under the General tab in the Properties dialog box of a forest trust is only availble for use betweeon two Windows Server 2008 domains?
A.
B.
C.
D.
10.  Which of the following Windows Server 2008 editions has no upgrade path?
A.
B.
C.
D.
11.  What does round robin do?
A.
B.
C.
D.
12.  GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?
A.
B.
C.
D.
13.  Which of the following best describes a directory service?
A.
B.
C.
D.
14.  This command is used to display and modify the boot configuration data store.
A.
B.
C.
D.
15.  What subnet mask would correspond to a CIDR notation of /24?
A.
B.
C.
D.
16.  Which of the following is not a common way to configure DNS for a forest trust?
A.
B.
C.
D.
17.  Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?
A.
B.
C.
D.
18.  A(n) _____ means that if A and B have a trust and B and C have a trust, A and C automatically have a trust as well.
A.
B.
C.
D.
19.  DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______.
A.
B.
C.
D.
20.  You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.
A.
B.
C.
D.
21.  The computer or print server device offering the printer share is the _____.
A.
B.
C.
D.
22.  Under Password policies, what is the default maximum password age?
A.
B.
C.
D.
23.  When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
A.
B.
C.
D.
24.  An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
A.
B.
C.
D.
25.  The main purpose of Active Directory is to _.
A.
B.
C.
D.
26.  Which of the following is a GUI tool that enables you to view the replication topology graphically and monitor replication performance and status?
A.
B.
C.
D.
27.  The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.
A.
B.
C.
D.
28.  What is the default location of the ADMX files?
A.
B.
C.
D.
29.  File Server Resource Manager (FSRM) provides ____.
A.
B.
C.
D.
30.  Which of the following features is not present in Windows Server 2003 domain functional level?
A.
B.
C.
D.
31.  Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server.
A.
B.
C.
D.
32.  For several hours now, your IT staff has been trying to troubleshoot an issue on AppSrv1.  AppSrv1 uses an application that requires it to access SQL database on a server named DBSrv1 but recent changes in the network topology have outdated previous DNS entries. Initially, the problem is believed related to the DNS database, but after using nslookup, you find that the DNS entry is correct.  AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. What is most likely the issue?
A.
B.
C.
D.
33.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
34.  The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:
A.
B.
C.
D.
35.  At about what interval are GPOs updated on domain controllers?
A.
B.
C.
D.
36.  What is the only real downside of stub zone?
A.
B.
C.
D.
37.  How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?
A.
B.
C.
D.
38.  When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.
A.
B.
C.
D.
39.  You work at Example.com, and are in charge of a fairly large forest and multidomain structure consisting of Windows Server 2003 domain controllers running at the Windows Server 2003 functional level.  One of your interns finished installing the forest's first Windows Server 2008 server, and has placed it in a branch office to act as a RODC.  The intern has already run the adprep /forestprep command. Unfortunately for some reason, the RODC Server cannot be installed.  What is most likely the issue, based on the information provided?
A.
B.
C.
D.
40.  Which MMC is used to transfer the domain naming master operations role?
A.
B.
C.
D.
41.  Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?
A.
B.
C.
D.
42.  A user has been on a 7 month long sabbatical. Upon return, you discover that her user object was deleted by accident on the same day she left.  Assuming that Active Directory is configured with the default tombstone lifetime, how much longer do you have before you can no longer recover her username object with an authoritative restore?
A.
B.
C.
D.
43.  Your intern would like to know which of the following situations would be ideal for a Server Core installation:
A.
B.
C.
D.
44.  What type of information does a resource record of type A contain?
A.
B.
C.
D.
45.  The acronym CIDR stands for what?
A.
B.
C.
D.
46.  Which of the following Windows Server 2008 editions supports the hot-add processor feature?
A.
B.
C.
D.
47.  One of the below IP address / subnet mask pairs is invalid; find the invalid answer.
A.
B.
C.
D.
48.  A(n) _____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.
A.
B.
C.
D.
49.  The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as ....
A.
B.
C.
D.
50.  The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.
A.
B.
C.
D.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.