Windows Server 2008 Active Directory Configuration

50 Questions  I  By E2D3
Server Quizzes & Trivia
These are the questions and answers from our final, might not be the same for all books and classes.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  You're in charge of a high-end, enterprise class server running Windows Server 2008 Datacenter edition.  Lately you've noticed that the server's memory utilization is too high, so you've decided to add an additional few sticks of RAM into the server's free slots. To reduce downtime, you should check if your server supports _____.
A.
B.
C.
D.
2.  The computer or print server device offering the printer share is the _____.
A.
B.
C.
D.
3.  An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.
A.
B.
C.
D.
4.  Which of the following server roles is not available within a Windows Server 2008 Core Installation?
A.
B.
C.
D.
5.  Which of the following Windows Server 2008 editions has no upgrade path?
A.
B.
C.
D.
6.  What is the only real downside of stub zone?
A.
B.
C.
D.
7.  DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______.
A.
B.
C.
D.
8.  When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.
A.
B.
C.
D.
9.  When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.
A.
B.
C.
D.
10.  When using HTTPS, after the web client finds that  CA is trusted and the signature on a certficate is verified, the web client sends additional parameters to the server that are encrypted with the server's ....
A.
B.
C.
D.
11.  What is a major drawback to enabling the auditing of object access?
A.
B.
C.
D.
12.  How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?
A.
B.
C.
D.
13.  The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.
A.
B.
C.
D.
14.  Which of the following statements is true regarding RODC replication?
A.
B.
C.
D.
15.  When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.
A.
B.
C.
D.
16.  Which is not a benefit of using virtual machines?
A.
B.
C.
D.
17.  At about what interval are GPOs updated on domain controllers?
A.
B.
C.
D.
18.  A ______ is one in which every child object contains the name of the parent object.
A.
B.
C.
D.
19.  A colleague of yours is setting up backups for Windows Server 2008 servers on your network.  However, because he is new to Windows Server 2008, he encounters and issue.  Your colleague wants to schedule backups to the server's drive containing the C:\ partition.  When he selects the "Show All Available Disks" button in the Backup Schedule Wizard, the drive containing C:\ is not listed. What is most likely the issue?
A.
B.
C.
D.
20.  To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.
A.
B.
C.
D.
21.  What does round robin do?
A.
B.
C.
D.
22.  A _____ contains one or more domains that are in a common relationship.
A.
B.
C.
D.
23.  The acronym CIDR stands for what?
A.
B.
C.
D.
24.  The main purpose of Active Directory is to _.
A.
B.
C.
D.
25.  Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server.
A.
B.
C.
D.
26.  A(n) _____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.
A.
B.
C.
D.
27.  You are in charge of a domain that contains several office rooms and one large computer commons area.  In order to secure accounts in the domain, you want to apply separate account policies for the computers in the commons area, while maintaining the policies that are used in the office rooms.  Currently, all computers are in the Computers folder.  What is the most efficent way to accomplish this task?
A.
B.
C.
D.
28.  Windows Internet Name Service (WINS) is a legacy name service used to resolve ...
A.
B.
C.
D.
29.  Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
A.
B.
C.
D.
30.  A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.
A.
B.
C.
D.
31.  If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?
A.
B.
C.
D.
32.  When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.
A.
B.
C.
D.
33.  Which of the following is not one of Active Directory Migration Tools three main types of migration?
A.
B.
C.
D.
34.  A(n) _____ means that if A and B have a trust and B and C have a trust, A and C automatically have a trust as well.
A.
B.
C.
D.
35.  One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server.  Your intern asks what command is used to do this.  Which command do you tell him to use?
A.
B.
C.
D.
36.  Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
A.
B.
C.
D.
37.  One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?
A.
B.
C.
D.
38.  What IP address class does the address 128.0.31.50 belong to?
A.
B.
C.
D.
39.  Which of the following defines the types of information stored in an Active Directory object?
A.
B.
C.
D.
40.  Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?
A.
B.
C.
D.
41.  When a computer learns another computer's MAC address, it keeps the address in its ...
A.
B.
C.
D.
42.  You are troubleshooting a network issue a user is having.  After having changed his network adapter to static addressing, he can no longer reach the internet.  However, the machine resolves Internet names to IP addresses.  Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254
A.
B.
C.
D.
43.  If multiple default gateways are assigned to a computer (such as a multihomed server), what determines which default gateway will be used?
A.
B.
C.
D.
44.  What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?
A.
B.
C.
D.
45.  What is the default no-refresh interval set to on DNS record timestamps?
A.
B.
C.
D.
46.  Installing DNS on a RODC creates a ...
A.
B.
C.
D.
47.  What subnode under Security Settings applies to wireless network policies?
A.
B.
C.
D.
48.  One of the below IP address / subnet mask pairs is invalid; find the invalid answer.
A.
B.
C.
D.
49.  The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.
A.
B.
C.
D.
50.  What must be done to allow a user to be able to access a file encrypted with EFS over a network connection?
A.
B.
C.
D.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.