MCSE 70-294 Practice Questions Quiz!

86 Questions

Settings
MCSE Quizzes & Trivia

MCSE 70-294 Practice Questions: Practice questions on Microsoft Exam 70-294 "Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure". After completing these practice questions, also try the MCSE 70-294 Practice Exams at ProProfs quiz school. Free MCSE 70-294 practice questions and other study aids are available from ProProfs MCSE certification school. All the best!


Related Topics
Questions and Answers
  • 1. 
    Which of the following can be managed using Active Directory Users and Computers snap-in?
    • A. 

      Domain trusts and domain forest trusts

    • B. 

      Information in Active Directory

    • C. 

      Directory data replication

    • D. 

      Active Directory schema

  • 2. 
    Which of the following is a part of the Active Directory design process?
    • A. 

      The Active Directory design process includes determining design specifications based on the location of the organization.

    • B. 

      The Active Directory design process includes planning implementation based on the hardware infrastructure.

    • C. 

      The Active Directory design process includes considering one design option that meets all the requirements.

    • D. 

      Active Directory design process includes reviewing the selected design repetitively.

  • 3. 
    Which of the following can be configured to contain the AD database?
    • A. 

      A resource server acting as DHCP.

    • B. 

      Microsoft Windows Server 2003 Standard, Enterprise, or the Datacenter edition.

    • C. 

      A resource server acting as IIS server.

    • D. 

      A resource server acting as DNS server.

  • 4. 
    Which of the following tasks is not performed by the Active Directory installation process?
    • A. 

      Creating the Active Directory database and log files

    • B. 

      Configuring the membership of the domain controller in an appropriate site

    • C. 

      Creating or replicates Active Directory partitions

    • D. 

      Creating the shared system root folder

    • E. 

      Enabling security on the operating system files

  • 5. 
    Which of the following should you consider when installing a replica domain controller?
    • A. 

      You should replicate Active Directory from backup media if you are installing the replica domain controller at a location where another domain controller exists.

    • B. 

      You should replicate Active Directory over the network if you are installing the Active Directory at a site connected to an existing site by a high-speed network.

    • C. 

      You should replicate Active Directory over a network if you are installing the domain controller in a remote location for an existing domain.

    • D. 

      You should restore the System State backup on the server from which you are installing Active Directory.

  • 6. 
    Which of the following should you consider when removing a domain controller that is also a Global Catalog server from Active Directory?
    • A. 

      Ensure that another global catalog is accessible to users before you demote the domain controller

    • B. 

      Ensure that the new domain controller name is added only to the DNS database

    • C. 

      Ensure that you have the normal user rights while removing a domain controller on Windows Server 2003

    • D. 

      Ensure that the demoted domain controller holds one operation masters role

  • 7. 
    Which of the following commands can display the list of the shared folders on the system?
    • A. 

      Net share

    • B. 

      Sysvol

    • C. 

      Ntds

    • D. 

      Netlogon

  • 8. 
    You have just installed ADS and are receiving an error message that “the domain cannot be contacted”. What should could the problem be?
    • A. 

      Incorrect user credentials

    • B. 

      Faulty DNS

    • C. 

      Corrupted log files of ADS

    • D. 

      Physical network connectivity

  • 9. 
    Which folder contains Active Directory database and log files?
    • A. 

      NTDS

    • B. 

      SYSVOL

    • C. 

      NetLogon

    • D. 

      NetShare

  • 10. 
    Which of the following correctly defines the purpose of SRV Resource Records?
    • A. 

      SRV records are used to store information about the servers providing services on the ADS.

    • B. 

      Records are registered when the domain controller is installed.

    • C. 

      SRV records are used by the DNS client computer to locate the DHCP server.

    • D. 

      SRV records are required to run the Backup utility.

  • 11. 
    Which of the following is a feature of the Windows 2000 mixed domain functional level?
    • A. 

      The Windows 2000 mixed domain functional level Supports Active Directory features such as SID history, group nesting, and universal groups.

    • B. 

      The Windows 2000 mixed domain functional level supports only the domain controllers running Windows 2000 and Windows Server 2003 family.

    • C. 

      The Windows 2000 mixed domain functional level is the default domain functional level for all domains.

    • D. 

      The Windows 2000 mixed domain functional level can only be raised to the Windows 2000 native domain functional level.

  • 12. 
    Which of the following should be manually set up to access resources of a domain in a different forest?
    • A. 

      External trust

    • B. 

      Shortcut trust

    • C. 

      Forest trust

    • D. 

      Realm trust

  • 13. 
    Which of the following is needed when creating trust with a domain in another forest?
    • A. 

      The DNS name of another forest.

    • B. 

      The DNS name of the domain.

    • C. 

      The DNS name of the domain.

    • D. 

      The NetBIOS name of the domain.

  • 14. 
    • A. 

      In the delegation of administration, responsibility gets decentralized, which allows other administrators to manage organizational units.

    • B. 

      In delegation of administration, administrators create many Active Directory domains to control access to the lowest level of an organization.

    • C. 

      In delegation of administration, authority can be only delegated at the organizational unit level.

    • D. 

      In the delegation of administration, service autonomy allows administrators to independently manage all or some part of the data within Active Directory.

  • 15. 
    When the option �Delegate the following common tasks� is selected in the Delegation wizard, which of the following can be carried out?
    • A. 

      Select the tasks that you want to delegate

    • B. 

      Verify that the specified tasks are correctly delegated

    • C. 

      Select some of the Active Directory object types for the user

    • D. 

      Select the permissions for a user to perform the delegated tasks

  • 16. 
    Which of the following is a combination of two or more administrative models?
    • A. 

      Hybrid administration

    • B. 

      Administration based on geographic location

    • C. 

      Administration based on the organization

    • D. 

      Administration based on business functions

  • 17. 
    Which of the following statement is true regarding organizational unit structure planning?
    • A. 

      In an organization, a department-based IT administration requires the Active Directory to be based on the structure of the organization.

    • B. 

      In an organization with department-based IT administration, designing an organization-based Active Directory requires you to follow the organizational chart.

    • C. 

      In an organization that is highly distributed with a centralized IT administration, the Active Directory structure should be based on the business functions of the organization.

    • D. 

      D. In an organization that is small in size with decentralized IT administration and job functions spanning several departments, the Active Directory structure based on the hybrid model is the most suitable.

  • 18. 
    Which of the following is a result of delegating administrative control?
    • A. 

      Limit the number of domain administrators

    • B. 

      Assign control at the lowest OU level possible and use inheritance

    • C. 

      Assign control at the property or task level

    • D. 

      Deny access permissions to groups

  • 19. 
    Which of the following is a feature of subnet objects?
    • A. 

      Recognize network addresses

    • B. 

      Control logon traffic

    • C. 

      Control replication traffic

    • D. 

      Control client computer requests

  • 20. 
    Which of the following is a feature of a global catalogue server?
    • A. 

      Global catalog server enables network logon for users with specific credentials.

    • B. 

      Global catalogs contain information about global group memberships

    • C. 

      A single forest can contain only a single global catalog

    • D. 

      Each domain of a forest should have a separate global catalog

  • 21. 
    Which of the following can resolve a problem relating to a high response time of a GC?
    • A. 

      Placing another global catalog server on the domain

    • B. 

      Increasing the hard disk size for the server

    • C. 

      Backing-up copy of the global catalog server

    • D. 

      Configuring all the domain controllers as global catalog servers

  • 22. 
    UG membership information cannot be cached. T/F?
    • A. 

      True

    • B. 

      False

  • 23. 
    SIDs cannot be encrypted. T/F?
    • A. 

      True

    • B. 

      False

  • 24. 
    It is highly secure if the KDC issues TGT without Universal Group membership. T/F?
    • A. 

      True

    • B. 

      False

  • 25. 
    In which of the following scenarios would you enable universal group membership caching?
    • A. 

      Hardware and bandwidth limitations prevent you from placing global catalog servers on a site

    • B. 

      Bandwidth limitations obstruct the conversion of local domain controllers to global catalog servers

    • C. 

      There is no domain controller or global catalog server on a domain

    • D. 

      There is a single domain in the forest

  • 26. 
    Which of the following will be used by the DNS server for replication?
    • A. 

      Domain Partition

    • B. 

      Application Partition

    • C. 

      Schema Partition

    • D. 

      Configuration Partition

  • 27. 
    Single master replication means there will be only one DC for the entire domain. T/F?
    • A. 

      True

    • B. 

      False

  • 28. 
    Which of the following will not participate on the forest level of the hierarchy?
    • A. 

      Infrastructure Master

    • B. 

      PDC Emulator

    • C. 

      Schema Master

    • D. 

      Domain Naming Master

  • 29. 
    Each object created in the ADS is governed by the Domain Partition. T/F?
    • A. 

      True

    • B. 

      False

  • 30. 
    In the ADS environment, User groups are created and linked to specific DCs on which they get created. T/F?
    • A. 

      True

    • B. 

      False

  • 31. 
    To deploy an application to a set of computers you need to create it in the form of a batch file. T/F?
    • A. 

      True

    • B. 

      False

  • 32. 
    Which of the following menus do you have to select to force the KCC to run?
    • A. 

      Active Directory Sites and Services console by selecting the Performance command on the Administrative Tasks menu

    • B. 

      Shortcut menu for NT Directory Service (NTDS) Settings and then select the Check Replication Topology command on the All Tasks menu

    • C. 

      Shortcut menu for the connection used to replicate directory information and then select the Replicate Now command

    • D. 

      Shortcut menu for NTDS Site Settings and then select the Properties command.

  • 33. 
    Which of the following would not be required for the DCs of a 2003 domain that will be supporting a few 100 users and very limited data resources to be accessed?
    • A. 

      Windows Server 2003 Standard Edition

    • B. 

      Windows Server 2003 Enterprise Edition

    • C. 

      Windows Server 2003 Data Center Edition

    • D. 

      Window Server 2003 Web Edition

  • 34. 
    The best way to utilize a DC as a file server is to ensure security by implementing strict IPSec policies. T/F?
    • A. 

      True

    • B. 

      False

  • 35. 
    Which of the following types of DFS is the least fault tolerant?
    • A. 

      Standalone DFS

    • B. 

      Root DFS

    • C. 

      Replica DFS

    • D. 

      Subordinate DFS

  • 36. 
    Which of the following can help user accounts to migrate across domains?
    • A. 

      Dsmove

    • B. 

      Dsquery

    • C. 

      Dsadd

    • D. 

      Dsmod

  • 37. 
    Which of the following relates to memory issues on a server?
    • A. 

      RAM utilization

    • B. 

      Disk drive utilization

    • C. 

      CPU utilization

    • D. 

      Page files

  • 38. 
    Which of the following would indicate hardware failures in the server?
    • A. 

      System log

    • B. 

      Application log

    • C. 

      Security log

    • D. 

      None of the above

  • 39. 
    Which of the following are valid administrative groupings? [Check all correct answers]
    • A. 

      Domain

    • B. 

      Forest

    • C. 

      Organizational unit

    • D. 

      Site

    • E. 

      Tree

  • 40. 
    The user jones has been granted administrative rights over the Marketing organizational unit. Marketing contains two additional organizational units: Media and Talent. Will jones be able to administer resources within the Talent organizational unit?
    • A. 

      Yes

    • B. 

      No

  • 41. 
    By default, Windows 2000 trusts are two-way and nontransitive.
    • A. 

      True

    • B. 

      False

  • 42. 
    Which of the FSMO roles should not be assigned to a global catalog server?
    • A. 

      Domain Naming Master

    • B. 

      Infrastructure Master

    • C. 

      PDC Emulator

    • D. 

      RID Master

    • E. 

      Schema Master

  • 43. 
    Which of the following groupings encompasses all of the others?
    • A. 

      Domain

    • B. 

      Forest

    • C. 

      Organizational unit

    • D. 

      Tree

  • 44. 
    The Schema Master server in the root domain is responsible for synchronizing the time through an enterprise.
    • A. 

      True

    • B. 

      False

  • 45. 
    You are an enterprise administrator for Acme Enterprises. The Acme corporate network consists of a domain tree named Acme.Local.My Corp Financial is a financial services company that is a subsidiary of Acme Corp. The My Corp Financial network consists of a domain tree named MyCorp.net within the Acme forest. The network layout is shown in the exhibit (See the exhibit below). A team of programmers in the East office of Acme Enterprises is developing an application for the South office of My Corp Financial. The programmers have user accounts in the East.Acme.Local domain. As part of the development process, they often have to log into Terminal Servers in the South.MyCorp.com domain. Programmers are complaining that Authentication and resource access is extremely slow. When you check network usage, you find that network links have significant available bandwidth. What should you do to correct the problem?
    • A. 

      Install a Global Catalog server in the East.Acme.Local domain.

    • B. 

      Install a Global Catalog server in the South.MyCorp.net domain.

    • C. 

      Create an explicit trust between the East and South domains.

    • D. 

      Move the programmer's user accounts to the South.MyCorp.net domain.

  • 46. 
    Your Windows Server 2003 network has 3 locations, A central office, an East Coast office, and West Coast Office. Each location is configured as an Active Directory Site. Because bandwidth is limited, you configure site replication to occur at night. You schedule replication as follows: - A link called EastLink between the EastCoast site and the Central site has replication scheduled from 1:00 AM to 4:00 AM with a replication frequency of 120 minutes.- A link called WestLink between the WestCoast site and the Central site has replication scheduled from 3:00 AM to 6:00 AM with a replication frequency of 120 minutes. You notice that updates to Active Directory objects made in the West Coast office sometimes do not appear in the East Coast office for two days. You need to ensure that updates in any office are seen in all offices by the next day. What should you do?
    • A. 

      Change the replication frequency of EastLink to 90 minutes.

    • B. 

      Change the replication frequency of WestLink to 90 minutes.

    • C. 

      Change the replication schedule of EastLink to 1:00 to 4:30

    • D. 

      Change the replication schedule of WestLink to 2:30 to 6:00

  • 47. 
    You are the network administrator for a Windows 2000 network. The network contains a single domain which spans three sites. Each site has two domain controllers, and each site is configured as a site in Active Directory. You have recently begun publishing shared resources in active directory to facilitate network navigation. Users are complaining that Active Directory searches are too slow. What can you do to increase the response time for directory searches?
    • A. 

      Add at least one DNS server to each site.

    • B. 

      Decrease replication intervals between domain controllers.

    • C. 

      Make sure that one computer at each site is acting as a Global Catalog server.

    • D. 

      Make sure that only one computer is acting as a Global Catalog server.

  • 48. 
    Choose the command-line tool that is interactive and helps to manage OUs?
    • A. 

      Directory service tools

    • B. 

      Active Directory Users and Computers

    • C. 

      Windows Script Host

    • D. 

      None of the above

  • 49. 
    Which of the following is the correct file extension that is recognized by the WSH?
    • A. 

      TXT

    • B. 

      EXE

    • C. 

      BAT

    • D. 

      VBS

  • 50. 
    Which of the following account types allows you to uniquely identify a computer on a network and authenticate access to network resources?
    • A. 

      Local user account

    • B. 

      Group account

    • C. 

      Computer account

    • D. 

      Built-in user account

  • 51. 
    Which of the following tools can assist in creating bulk Active Directory accounts?
    • A. 

      Active Directory Users and Computers

    • B. 

      Dsadd

    • C. 

      Dsmod

    • D. 

      CSVDE

  • 52. 
    Which of the following can the Active Directory Users and Computers snap-in help to achieve?
    • A. 

      Modifying the attribute values for multiple accounts using ADSI

    • B. 

      Managing accounts using a line-separated input file

    • C. 

      Managing a small number of user accounts

    • D. 

      Creating accounts using a comma-delimited input file

  • 53. 
    Comma Separated Value Directory Exchange (CSVDE) tool cannot be used to create enabled user accounts if the domain password policy requires a minimum password length or requires complex passwords. T/f?
    • A. 

      True

    • B. 

      False

  • 54. 
    Which of the following does the WSH use when accounts need to be created??
    • A. 

      Clipboard

    • B. 

      Notepad

    • C. 

      MS WORD.EXE.

    • D. 

      None of the above

  • 55. 
    Globally Unique Identifier (GUID) is assigned to an object every time the object is moved from the original location in which it was created. T/F?
    • A. 

      True

    • B. 

      False

  • 56. 
    Which of the following statements is true?
    • A. 

      A user name needs to be unique within that domain only

    • B. 

      A user name needs to be unique in that tree only

    • C. 

      A user name needs to be unique for the entire forest.

    • D. 

      None of the above

  • 57. 
    Which of the following is a feature of the GP Management console?
    • A. 

      You can use the GP Management console to manage only Windows 2003 domains.

    • B. 

      You can migrate GPOs only between trusted forests.

    • C. 

      You can add forests and domains that share a one-way trust.

    • D. 

      The Windows Server 2003 computer on which you want to install GPMC must have a .NET framework.

    • E. 

      You cannot add domains lying in forests that do not share a trust with your forest.

  • 58. 
    You are the network administrator of a Windows 2000 network with four domains as shown in the exhibit. Department Managers within the company need to access a financial reporting application on a server named FinServer1 in the East domain. You create a domain local group called FinAppEast in the east domain and configure access to the application. You add Global groups containing managers from all of the other locations into this domain local group. What can you do to ensure that no other groups are added to the final east Domain local group?
    • A. 

      Create a Group Policy Object for the east.Acme.The local domain that restricts group access to the Finapp east group.

    • B. 

      Create a Group Policy Object for the Acme. The local domain that restricts group access to the FinAppEast group.

    • C. 

      Create an OU in the east.Acme.Local Domain, and place FinServer1 in the OU. Create a Group Policy Object on the OU that restricts group access to the FinAppEast group.

    • D. 

      Create an OU in the Acme. Local Domain, and place FinServer1 in the OU. Create a Group Policy Object on the OU that restricts group access to the FinAppEast group.

  • 59. 
    Which of the following can ensure that only a specific group of users can access the control panel, whereas the rest cannot?
    • A. 

      Create a group named NoControl, and add all regular computer accounts in the administration office to this group. Assign the Apply Group Policy for the NoControlPanel GPO only to this group.

    • B. 

      Create a group named NoControl, and add all regular user accounts in the administration office to this group. Assign the Apply Group Policy for the NoControlPanel GPO only to this group.

    • C. 

      Grant the CorpHelp group full control access to the NoControlPanel Group Policy Object.

    • D. 

      Add the CorpHelp group to the security list on the NoControlPanel Group Policy Object, and ensure that the Apply Group Policy setting is not checked.

  • 60. 
    You are assigning permissions to a user for a specific OU to be able to create, delete and edit user accounts. While adding such a user account to this OU, what should the 'Apply Onto' setting for these permissions be?
    • A. 

      This object only

    • B. 

      This object and all child objects

    • C. 

      Child Objects only

    • D. 

      User Objects

  • 61. 
    Your Windows 2003 network has two domains: Metro.local and Corp.Metro.local.The Corp.Metro.local domain has a single domain controller. You need to add a second domain controller to the Corp.Metro.local domain to provide redundancy. You want to add a second domain controller to the Corp.Metro.local domain. What group must you be a member of to accomplish this task?
    • A. 

      Enterprise Admins.

    • B. 

      Domain Admins for the Metro.local domain.

    • C. 

      Domain Admins for the Corp.Metro.local domain.

    • D. 

      The local Administrators group on the server.

  • 62. 
    Which of the following must be done to a group of users who will be installing images that are residing in a folder in the RIS server?
    • A. 

      Create an OU under the RIS admin group and link the relevant GPO to it.

    • B. 

      Grant the users group Read and Write access to the RemoteInstall folder on the RIS server.

    • C. 

      Grant the user's group Full Control permissions to the RIS server's computer account in Active Directory Users and Computers.

    • D. 

      Grant the users group the right to 'Log on as a service' to the RIS server.

    • E. 

      Grant the users group Full Control of the RIPrep folder on the RIS server.

  • 63. 
    You are the network administrator for a Community College. All student user accounts are in an OU called Students. The domain also contains a group called SecStudents.Members of the SecStudents group are able to configure access to resources for students. You now want to enable members of the SecStudents group to modify group policy settings for the Students OU. You do not want this group to be able to add or modify student accounts. What should you do? (Choose two)
    • A. 

      Grant the SecStudents group Modify access to any existing GPOs linked to the Students OU.

    • B. 

      On the Students OU, assign Apply Group Policy permission to SecStudents

    • C. 

      On the Students, OU, delegate the task named 'Manage Group Policy Links' to the SecStudents group.

    • D. 

      Grant the SecStudents Group the 'Create Child Objects' permission to the Students OU.

    • E. 

      Join the SecStudents group to the Group Policy Creator Owner Group.

  • 64. 
    You are the network administrator for your company. Tom is in the human resources office in the east office. Tom is a member of the METROEast Global Group, which has been granted access to a shared folder named METROEastData.Tom is transferring to the west office. You remove Tom from the METROEast Global Group and add Tom to the MetroWest Global Group. Tom informs you that he can still access files in the METROEastData share. Other members of the MetroWest group cannot access this share. What could be the reason why Tom can still access these files? (Choose all that apply)
    • A. 

      Tom is a Creator Owner of the files in the METROEastData folder.

    • B. 

      Tom has been granted explicit permissions to the METROEastData folder.

    • C. 

      Tom has been granted access through a domain policy.

    • D. 

      Tom is a member of another group that has access to the files.

    • E. 

      The METROEastData folder is on a FAT32 partition.

  • 65. 
    81. You are the network administrator for an accounting firm. The network consists of a single Windows 20003 domain. You have created a Servers OU that contains all of the member servers in your network. In the Servers OU you have created a ClientData OU that holds the computer accounts for three Windows 2000 servers that contain sensitive client financial information. You want to increase the security settings for these servers with the minimum effect on network performance. What should you do? (Choose three)
    • A. 

      Place a GPO on the Servers OU.

    • B. 

      Place a GPO on the ClientData OU.

    • C. 

      Increase maximum service ticket lifetime in the GPO

    • D. 

      Decrease maximum service ticket lifetime in the GPO

    • E. 

      Decrease maximum lifetime that a user ticket can be renewed in the GPO.

  • 66. 
    You are the network administrator for a Windows 20003 domain. Company written policies do not allow most of your users to access the Internet. The public relations specialist uses a dial-up connection from her desktop computer to access the Internet. You need to prevent this connection from being shared by other users while still allowing this user to connect to network resources and the Internet. What should you do? (Choose two)
    • A. 

      Create a Group Policy Object that defines a high security zone for Internet Explorer.

    • B. 

      Create a Group Policy Object that disables the configuration of Internet connection sharing.

    • C. 

      Create a Group Policy Object that removes the Internet connection object from the user's desktop.

    • D. 

      Ensure that everyone besides this user has Read and Apply access to this GPO.

    • E. 

      Ensure that only this user has Read and Apply access to this GPO.

  • 67. 
    You are the network administrator for a Windows 2003 domain. Company written policies do not allow most of your users to access the Internet. The public relations specialist uses a dial-up connection from her desktop computer to access the Internet. You need to prevent this connection from being shared by other users while still allowing this user to connect to network resources and the Internet. What should you do? (Choose two)
    • A. 

      Create a Group Policy Object that defines a high security zone for Internet Explorer.

    • B. 

      Create a Group Policy Object that disables the configuration of Internet connection sharing.

    • C. 

      Create a Group Policy Object that removes the Internet connection object from the user's desktop.

    • D. 

      Ensure that everyone besides this user has Read and Apply access to this GPO.

    • E. 

      Ensure that only this user has Read and Apply access to this GPO.

  • 68. 
    You are the administrator of a Windows 2003 domain. You are having a problem with unauthorized users adding computer accounts to the domain. You want only domain administrators to be able to add computer accounts into the domain. What should you do? (Choose all that apply)
    • A. 

      For the default domain policy, change the Add Workstations to the Domain setting to include only Domain Admins.

    • B. 

      For the default domain controllers policy, change the Add Workstations to the Domain setting to include only Domain Admins

    • C. 

      Remove the Authenticated Users group from the permissions of the computers container in the domain.

    • D. 

      Add the Domain Admins group with Full Control permissions to the computers container in the domain.

  • 69. 
    You are the administrator of a Windows 2003 domain with two domain controllers named DC1 and DC2. You have an OU in your domain called Templates, which contains 25 different account templates that are used to create new user accounts. While training a new intern on account creation procedures on DC1, the Templates OU is accidentally deleted. can you recover the Templates OU?
    • A. 

      In Active Directory Users and Computers, select 'Undo last change'

    • B. 

      On DC2, force replication of Active Directory Objects with DC1.

    • C. 

      Restart DC1 in Active Directory Restore mode, and perform an authoritative restore from the last backup.

    • D. 

      Turn on the Advanced Options in Active Directory Users and Computers, and move the Templates OU from the Lost and Found container to the Active Directory domain root.

  • 70. 
    You are required to set up a Windows 2003 network for a new medical research company. The company has a main corporate office in New York, and two research facilities located in Atlanta and Seattle. All locations will have local administrators to administer local servers and network resources. For security reasons, however, only administrators in the main office will be able to create and manage user accounts. What steps should be taken to establish this Active Directory environment? (Choose all that apply)
    • A. 

      Create a domain tree with one domain for each location.

    • B. 

      Create a single domain for the entire network and an OU for each location.

    • C. 

      Create an OU to hold user accounts.

    • D. 

      Deny Domain Admins the right to create user accounts in the remote domains.

    • E. 

      Grant local administrators the right to administer the OU for their location.

  • 71. 
    Which of the following do you achieve when you copy an existing GPO to create a new one?
    • A. 

      The new GPO contains only the settings of the source GPO.

    • B. 

      The new GPO contains the links contained in the source GPO.

    • C. 

      The new GPO is always placed in a domain different from the source domain.

    • D. 

      The new GPO uses the GUID of the source GPO.

  • 72. 
    • A. 

      The Windows Installer service automates the software installation process.

    • B. 

      The Windows Installer package contains information needed to install or uninstall software.

    • C. 

      Windows Installer automatically acquires a new copy of a corrupted file from the installation source.

    • D. 

      While uninstalling an application, Windows Installer removes shared files used by other applications.

    • E. 

      The Windows Installer service contains a reference to an installation directory where the application files reside.

  • 73. 
    Which of the following options does not modify software installation?
    • A. 

      You can specify whether you want the setup to use default values during installation or prompt users to enter values.

    • B. 

      You can define the software distribution point where you want to store the .msi package files.

    • C. 

      You can specify that a software package should be removed when it does not apply to users or computers.

    • D. 

      You can choose the order in which Windows will invoke applications when a user opens a document.

    • E. 

      You can publish OLE information in Active Directory and make 64-bit applications available on 32-bit platforms.

  • 74. 
    Which of the following types cannot be used for upgradation/deployment of software?
    • A. 

      Mandatory software upgrades

    • B. 

      Optional software upgrades

    • C. 

      Selective software upgrades

    • D. 

      Group Policy software upgrades

  • 75. 
    Which of the following are not methods for administering software redeployment?
    • A. 

      You redeploy a software package depending on how it was installed.

    • B. 

      You redeploy a software package by using the GPO originally used to deploy the package.

    • C. 

      While redeploying a software package, you should ensure that a new .msi file exists in the update.

    • D. 

      If a software package is installed, its desktop shortcut is automatically updated when the user logs on.

    • E. 

      If a software is assigned to a computer, its registry settings are automatically updated when the user starts the package.

  • 76. 
    Which of the following are steps in the Software deployment phase using GPO?
    • A. 

      Identifying the factors that might prevent the installation of the software package.

    • B. 

      Copying the Windows Installer package to a central location.

    • C. 

      Creating a GPO.

    • D. 

      Assigning the software to the appropriate group policy object for the desired container

  • 77. 
    Which of the following are not methods for verifying Group Policy settings?
    • A. 

      The Domain Controller Selection page in the Group Policy Modeling Wizard allows you to specify a domain controller.

    • B. 

      The User and Computer Selection page in the Group Policy Modeling Wizard allows you to select users and computers.

    • C. 

      The WMI Filters for Users page in the Group Policy Results Wizard allows you to include WMI filters in a simulation.

    • D. 

      None of the above

  • 78. 
    Which of the following statements is true regarding the optional software upgrade option?
    • A. 

      Optional software upgrade option upgrades the software automatically when the system is restarted or logged on by a user.

    • B. 

      Optional software upgrade option enables you to upgrade software for specific users.

    • C. 

      Optional software upgrade option automatically replaces the older version of the software with the upgraded version.

    • D. 

      Optional software upgrade option allows you to decide if you want to upgrade the current software to its latest version.

  • 79. 
    What can be the reason for an application to be not listed in the Start menu?
    • A. 

      Computer policy overrides the user policy

    • B. 

      Application is assigned but not published

    • C. 

      Software distribution point is not accessible

    • D. 

      Application is published but not assigned

  • 80. 
    Which of the following could be the problem if The application does not appear in the Add or Remove Programs dialog box.
    • A. 

      The application is published but not assigned or the GPO has not been applied.

    • B. 

      The software distribution point is not accessible.

    • C. 

      The application is assigned but not published or the GPO has not been applied.

    • D. 

      None of the above

  • 81. 
    What can you do to determine the cause of problems that occur during software deployment with Group Policy?
    • A. 

      Determine whether the software distribution point is available by connecting a client to the software distribution point

    • B. 

      Uninstall the existing .msi package manually

    • C. 

      Determine the GPO application by using RSoP

    • D. 

      Disable Windows Installer logging

  • 82. 
    The result parameters Gpresult /s relates to which of the following?
    • A. 

      Displays all available information about Group Policy.

    • B. 

      Displays verbose policy information.

    • C. 

      Executes the command with account permissions of the user that is specified by User or Domain\User.

    • D. 

      Specifies the name or the IP address of a remote computer.

  • 83. 
    Which of the following guidelines enables you to plan custom installations for specific users?
    • A. 

      Configuring NTFS permissions for users

    • B. 

      Using transform files wherever required

    • C. 

      Deploying the package files in phases

    • D. 

      Specifying a software upgrade as optional

  • 84. 
    Which of the following are NOT the possible causes for the Active Directory database size not decreasing even if a large number of objects had been deleted recently?
    • A. 

      The objects were marked for deletion or tombstoned, and the tombstone takes up space in Active Directory.

    • B. 

      Online defragmentation does not reduce the database size.

    • C. 

      The garbage collection process did not perform an online defragmentation.

    • D. 

      The size of the database does not decrease unless you defragment Active Directory offline.

  • 85. 
    How do you determine the size of the database and log files, and what can you do to reduce their size?
    • A. 

      Determine the size of the database and log files by viewing the amount of free disk space in Windows Explorer. You can reduce the size of the database and log files by setting the compressed attribute on the database and log files.

    • B. 

      Determine the size of the database and log files by viewing the file sizes in the %systemroot%\NTDS folder. You can reduce the size of the database and log files by defragmenting the database offline.

    • C. 

      You cannot determine the size or reduce the size of the database and log files.

    • D. 

      Determine the size of the database and log files by using Performance Monitor to track additions and deletions. You can reduce the size of the database and log files by performing a restore.

  • 86. 
    How do you free the disk space used by the global catalog?
    • A. 

      Restart the domain controller in directory services restore mode, and then perform an offline defragmentation.

    • B. 

      Do nothing. The online defragmentation is performed automatically and frees the disk space.

    • C. 

      Restart the domain controller in directory services restore mode, and then perform a normal restore from a domain controller that is not a global catalog server.

    • D. 

      Do nothing. The garbage collection process automatically removes the additional global catalog objects and frees the disk space after the tombstone lifetime expires.