Do You Have The Knowledge Of Active Directory And Cloud Computing?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 605,175
Questions: 27 | Attempts: 14,211

SettingsSettingsSettings
Do You Have The Knowledge Of Active Directory And Cloud Computing? - Quiz


This quiz has been prepared to assess your technical expertise related to Active directory, Computer System, Online Data Management and Cloud Computing in a business or firm. It's a 30-question quiz covering most of the topics in Active Directory. So, let's try out the quiz. All the best!


Questions and Answers
  • 1. 

    You are the administrator of a small business Active Directory domain server. Your users complain that they are unable to add more than 1 GB to their “My Documents” folders on their computers. What is the most likely cause of the issue?

    • A.

      Incorrect folder redirection configuration

    • B.

      Insufficient disk space on local machines

    • C.

      Incorrect configuration of disk management

    • D.

      Insufficient user credentials

    • E.

      User error

    Correct Answer
    A. Incorrect folder redirection configuration
    Explanation
    The most likely cause of the issue is an incorrect folder redirection configuration. Folder redirection allows administrators to redirect specific folders, such as "My Documents," to a network location. If the folder redirection is not configured properly, it may limit the amount of storage available for users to add files to their "My Documents" folders. This could result in users being unable to add more than 1 GB of data to their folders.

    Rate this question:

  • 2. 

    Your manager asks you to implement a solution that would allow for the creation of two separate logical groupings of networked computers, both of which fall under a single, general company tree. Which of the following will accomplish this goal?

    • A.

      Create two forests and one domain

    • B.

      Create two trees and one domain

    • C.

      Create three domains

    • D.

      Create one forest and two domains

    • E.

      Create one forest, two trees, and four domains

    Correct Answer
    D. Create one forest and two domains
    Explanation
    Creating one forest and two domains will allow for the creation of two separate logical groupings of networked computers, both of which fall under a single, general company tree. A forest is a collection of one or more domain trees, and a domain is a logical grouping of networked computers that share a common directory database. By creating one forest and two domains, each domain can have its own separate set of users, resources, and security policies while still being part of the same overall company tree. This allows for efficient management and organization of the networked computers.

    Rate this question:

  • 3. 

    Your manager asks you to configure Internet Explorer to display the banner “Provided by Company X.” How will you accomplish this?

    • A.

      Within group policy

    • B.

      Through Windows SUS

    • C.

      Using Local Security Policy of each machine

    • D.

      Using Computer Management of the domain server

    • E.

      This is not feasible

    Correct Answer
    A. Within group policy
    Explanation
    You can configure Internet Explorer to display the banner "Provided by Company X" within group policy. Group policy allows you to centrally manage and configure settings for multiple computers in a domain. By configuring the appropriate group policy settings, you can customize the branding and appearance of Internet Explorer across all machines in the domain, including displaying the desired banner.

    Rate this question:

  • 4. 

    You are the administrator of a domain whose users are experiencing difficulties in properly updating their respective Windows installations with the latest upgrades and patches. Which of the following is the best solution?

    • A.

      Disable Active Directory and manage the machines as a workgroup

    • B.

      Disable the “Manage my Own Security” option within Control Panel

    • C.

      Use Group Policy to require the regular automatic updating of Windows

    • D.

      Employ Windows Server Update Services in conjunction with Group Policy

    • E.

      Increase user education and awareness about the dangers of not patching their computers

    Correct Answer
    D. Employ Windows Server Update Services in conjunction with Group Policy
    Explanation
    The best solution for the administrator of the domain to address the difficulties in updating Windows installations is to employ Windows Server Update Services (WSUS) in conjunction with Group Policy. WSUS allows the administrator to centrally manage and distribute updates to the Windows machines in the domain, ensuring that they are properly updated with the latest upgrades and patches. Group Policy can be used to enforce the regular automatic updating of Windows on the machines. This solution provides a centralized and efficient method for managing updates, ensuring that all users are kept up to date with the necessary patches.

    Rate this question:

  • 5. 

    Which of the following is not a potential advantage of an active directory domain?

    • A.

      Centralized user management

    • B.

      Single sign-in login

    • C.

      Enhanced security management

    • D.

      Ability to deploy software and settings on a large scale

    • E.

      Cross-platform compatibility

    Correct Answer
    E. Cross-platform compatibility
    Explanation
    Cross-platform compatibility is not a potential advantage of an active directory domain. Active directory is a Microsoft technology that is primarily designed for managing Windows-based systems. It provides centralized user management, single sign-in login, enhanced security management, and the ability to deploy software and settings on a large scale. However, it does not offer native support for managing non-Windows platforms, making cross-platform compatibility not a potential advantage of an active directory domain.

    Rate this question:

  • 6. 

    You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?

    • A.

      Insufficient login credentials

    • B.

      He is a member of the Administrators group

    • C.

      He is not a member of the domain

    • D.

      The property “User cannot change password” has been enabled in Active Directory Users and Computers

    • E.

      The property “Password never expires” has been enabled in Active Directory Users and Computers

    Correct Answer
    D. The property “User cannot change password” has been enabled in Active Directory Users and Computers
    Explanation
    The most likely cause of the problem is that the property "User cannot change password" has been enabled in Active Directory Users and Computers. This property restricts the user from changing their password, which would explain why the user is unable to do so.

    Rate this question:

  • 7. 

    Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

    • A.

      Forest, Domain, Tree, Branch, Computer

    • B.

      Tree, Forest, Domain, Computer

    • C.

      Computer, Forest, Domain, Tree

    • D.

      Forest, Tree, Computer, Domain

    • E.

      Forest, Tree, Domain, Computer

    Correct Answer
    E. Forest, Tree, Domain, Computer
    Explanation
    The correct answer is "Forest, Tree, Domain, Computer." In Active Directory, the forest is the highest level of organization, consisting of multiple trees. Each tree contains one or more domains, and each domain can have multiple computers. Therefore, the correct order is Forest (largest), Tree, Domain, and Computer (smallest).

    Rate this question:

  • 8. 

    Which of the following protocols are Active Directory-based upon?

    • A.

      LDAP

    • B.

      L2TP

    • C.

      PPTP

    • D.

      PPP

    • E.

      IPSec

    Correct Answer
    A. LDAP
    Explanation
    Active Directory is a directory service developed by Microsoft for Windows domain networks. It is based on the Lightweight Directory Access Protocol (LDAP), which is a protocol used for accessing and managing directory information. LDAP provides a standardized way to access and query directory services, making it an integral part of Active Directory. Therefore, the correct answer is LDAP.

    Rate this question:

  • 9. 

    Which of the following is a potential issue when converting a network from a workgroup to a domain?

    • A.

      Ensuring that computers correctly join the domain and users migrate from local to domain profiles

    • B.

      Reduced security as a result of domain login

    • C.

      Difficulty in users logging into the new, decentralized system

    • D.

      High difficulty in converting a Windows 2003 Server from a workgroup to domain server

    • E.

      Inability to effectively configure group security policy in a domain

    Correct Answer
    A. Ensuring that computers correctly join the domain and users migrate from local to domain profiles
    Explanation
    When converting a network from a workgroup to a domain, one potential issue is ensuring that computers correctly join the domain and users migrate from local to domain profiles. This process involves properly configuring the network settings on each computer to connect to the domain controller and ensuring that user profiles are transferred from the local accounts to the domain accounts. Failure to do so can result in computers not being able to access domain resources and users not being able to log in with their domain credentials.

    Rate this question:

  • 10. 

    Which of the following modes is associated with the backup and saving of critical domain server information?

    • A.

      Safe mode

    • B.

      Safe mode with networking

    • C.

      Safe mode with command prompt

    • D.

      Last known good configuration mode

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    The correct answer is "None of the above" because none of the modes mentioned (Safe mode, Safe mode with networking, Safe mode with command prompt, Last known good configuration mode) are specifically associated with the backup and saving of critical domain server information. These modes are typically used for troubleshooting and fixing issues with the operating system, but not for backing up or saving server information.

    Rate this question:

  • 11. 

    You are the manager and administrator of a large network using both Windows Server 2003 and UNIX infrastructure. Which of the following allows for limited cross-platform compatibility between the company domain COMPANY and the Unix nodes?

    • A.

      GPEDIT

    • B.

      SAMBA

    • C.

      IPCHAINS

    • D.

      KEREBOS

    • E.

      BASH

    Correct Answer
    B. SAMBA
    Explanation
    Samba is a software suite that allows for interoperability between Windows and Unix/Linux systems. It provides file and print services, allowing Windows clients to access files and printers on Unix/Linux servers. Therefore, using Samba would enable limited cross-platform compatibility between the Windows Server 2003 domain and the Unix nodes in the COMPANY network.

    Rate this question:

  • 12. 

    You are the administrator of a small business network that wishes to use an email server program, Microsoft Exchange, in conjunction with the domain you have established. You already use the domain server as both a DHCP server/gateway and a Windows domain controller. Which of the following is a potential issue when setting up the email server?

    • A.

      Domains are not compatible with other messaging services such as email and SMS servers

    • B.

      Domains operate on a different layer of the seven-layer network hierarchy

    • C.

      Computers on domains must be assigned the same IP address as the domain server

    • D.

      The firewall on the domain server could block the traffic from the email application

    • E.

      The DHCP server will assign the exchange server the same IP address as the domain controller

    Correct Answer
    D. The firewall on the domain server could block the traffic from the email application
    Explanation
    The potential issue when setting up the email server is that the firewall on the domain server could block the traffic from the email application. This means that the email server may not be able to send or receive emails properly if the firewall is blocking the necessary network traffic.

    Rate this question:

  • 13. 

    Which of the following groups can always login to a server via Directory Services Restore Mode?

    • A.

      Administrators only

    • B.

      Administrators and Power Users

    • C.

      Administrators, Power Users, and Backup Operators

    • D.

      Power Users and Backup Operators

    • E.

      Administrators and Backup Operators

    Correct Answer
    E. Administrators and Backup Operators
    Explanation
    Administrators and Backup Operators can always login to a server via Directory Services Restore Mode. This mode is used to restore Active Directory on a Windows Server. Administrators have full control and permissions over the server, including the ability to restore the directory. Backup Operators, on the other hand, have the necessary privileges to perform backup and restore operations on the server. Therefore, both Administrators and Backup Operators are granted access to the server in this mode.

    Rate this question:

  • 14. 

    A user complains that after repeated attempts at logging onto his domain account, he continues to receive the message that the username and/or password are incorrect. You are positive that he is entering the correct credentials to log in to the domain server. Which of the following is the most likely explanation for this issue?

    • A.

      His network connection is not working correctly

    • B.

      The domain server is not recognizing his computer as a registered node

    • C.

      He is logging onto his computer and not the actual domain

    • D.

      The domain controller’s login server is not working correctly

    • E.

      He has a faulty Windows installation

    Correct Answer
    C. He is logging onto his computer and not the actual domain
    Explanation
    The most likely explanation for the user's issue is that he is logging onto his computer and not the actual domain. This means that he is not authenticating his credentials with the domain server, resulting in the message that the username and/or password are incorrect.

    Rate this question:

  • 15. 

    What is a potential issue with allowing multiple concurrent connections to an IIS server that is used on the same server as a domain controller?

    • A.

      Security could be breached by a buffer overflow error

    • B.

      The bandwidth and processing power used to access IIS could take away from the available bandwidth/processing power of the domain controller

    • C.

      IIS often interferes with the correct operation of a domain controller

    • D.

      The SAM Security Database will undergo over-extension as it is being accessed too much by both the IIS and the domain servers

    • E.

      None of the above are potential issues

    Correct Answer
    E. None of the above are potential issues
    Explanation
    None of the above are potential issues.

    Rate this question:

  • 16. 

    A user complains to you that he is experiencing difficulties with his Windows installation and wishes to re-install Windows. Which of the following utilities would you use to remotely perform an installation via network?

    • A.

      Netprep

    • B.

      Riprep

    • C.

      Config

    • D.

      Netconfig

    • E.

      None of the above

    Correct Answer
    B. Riprep
    Explanation
    Riprep is the correct answer because it is a utility that allows for remote installation of Windows via a network. This utility is commonly used in enterprise environments where administrators need to install Windows on multiple computers simultaneously. By using Riprep, the user can remotely initiate and manage the installation process, saving time and effort. Netprep, Config, and Netconfig are not relevant to remote installation of Windows, and therefore, are not the correct answers.

    Rate this question:

  • 17. 

    Which of the following is a typical concern involved in migrating from Windows 2000 Server to Windows Server 2003 with regard to Active Directory functionality?

    • A.

      Difficulty in migrating existing user accounts

    • B.

      Difficulty in migrating existing group policy

    • C.

      Reduced cross-platform compliance in Windows Server 2003

    • D.

      Compatibility of legacy applications on the new server

    • E.

      Compliance of Server 2003 with LDAP specifications

    Correct Answer
    D. Compatibility of legacy applications on the new server
    Explanation
    One typical concern involved in migrating from Windows 2000 Server to Windows Server 2003 with regard to Active Directory functionality is the compatibility of legacy applications on the new server. This means that there may be issues with running older applications on the new server, which could impact the overall functionality and performance of the system.

    Rate this question:

  • 18. 

    Your company runs Windows Server 2003 with an Active Directory domain controller and group policy. A user complains that he is experiencing trouble with his desktop, and explains that he is unable to change the image of the background of the screen. His username is JOHN and his group is USERS. Your manager asks you to resolve the issue. How can you best resolve this issue?

    • A.

      Disable group policy management for USERS

    • B.

      Disable group policy management for JOHN

    • C.

      Disable the desktop control policy option for USERS

    • D.

      Disable the desktop control policy option for JOHN

    • E.

      Add JOHN to a new group SPECIAL USERS, copy the group policy management settings from USERS, and apply it to SPECIAL USERS with the exception of the desktop policy option

    Correct Answer
    E. Add JOHN to a new group SPECIAL USERS, copy the group policy management settings from USERS, and apply it to SPECIAL USERS with the exception of the desktop policy option
    Explanation
    By adding JOHN to a new group called SPECIAL USERS and copying the group policy management settings from the USERS group, the user will inherit the same policies as before. However, by excluding the desktop policy option, JOHN will be able to change the background image of his desktop. This solution allows for a targeted adjustment to the user's group policy settings without affecting other users or the overall group policy management.

    Rate this question:

  • 19. 

    You are the network administrator for a Windows-based network with 100 users. You wish to organize the users by the department in which they work – Accounting, Engineering, and so forth. You also wish to apply access controls to centrally located (server-side) resources based on those assigned groups. Without the installation of additional software, which of the following is not necessary to apply this access control scheme?

    • A.

      Active Directory

    • B.

      TCP/IP

    • C.

      Creation of non-default groups

    • D.

      Creation of group policy settings

    • E.

      Creation of access control list for server resources

    Correct Answer
    D. Creation of group policy settings
  • 20. 

    Which of the following is an advantage of using login scripts in Active Directory?

    • A.

      They allow for routine and forced execution of commands and programs

    • B.

      They allow for scheduled, routine, and forced execution of commands and programs

    • C.

      They allow for scheduled and optional execution of commands and programs

    • D.

      They allow for routine and user-induced execution of commands and programs

    • E.

      They allow for scheduled and forced execution of commands and programs

    Correct Answer
    A. They allow for routine and forced execution of commands and programs
    Explanation
    Login scripts in Active Directory allow for routine and forced execution of commands and programs. This means that when a user logs into their account, these scripts can automatically run specific commands or programs without the user having to manually initiate them. This can be useful for automating certain tasks or ensuring that certain actions are performed consistently for all users. Additionally, the ability to force execution means that certain commands or programs can be mandatory and cannot be bypassed by the user.

    Rate this question:

  • 21. 

    Which of the following is not a component of Active Directory?

    • A.

      Group Policy

    • B.

      Internet Information Services

    • C.

      Distribution Groups

    • D.

      Security Groups

    • E.

      All of the above are components of Active Directory

    Correct Answer
    B. Internet Information Services
    Explanation
    Internet Information Services (IIS) is not a component of Active Directory. Active Directory is a directory service developed by Microsoft that is used to manage and organize network resources. It provides a centralized database for storing and managing information about network resources such as users, groups, computers, and printers. Group Policy, Distribution Groups, and Security Groups are all components of Active Directory that allow for the management and control of user access and permissions within the network. However, IIS is a web server software that is used to host and manage websites and web applications, and it is not directly related to Active Directory.

    Rate this question:

  • 22. 

    Your manager asks you to crack down on extraneous Internet usage by deviant domain users. You are responsible for the domain controller only; the gateway and routing are administered by one of your peers. What should you tell your manager?

    • A.

      Internet access control is not a function of Active Directory, and therefore the request should be sent to a different administrator

    • B.

      You will install a DHCP server in conjunction with a WINS control server

    • C.

      You will configure Internet Access Control Options via Administrative Tools

    • D.

      You will configure Internet Information Services

    • E.

      You will configure Windows Firewall to restrict network traffic

    Correct Answer
    A. Internet access control is not a function of Active Directory, and therefore the request should be sent to a different administrator
    Explanation
    The correct answer is that internet access control is not a function of Active Directory, and therefore the request should be sent to a different administrator. Active Directory is responsible for managing user accounts, permissions, and network resources within a domain, but it does not have the capability to control internet access. This task falls under the responsibility of the administrator who manages the gateway and routing, as they have control over the network infrastructure that connects the domain to the internet.

    Rate this question:

  • 23. 

    Which of the following is true of Active Directory in regard to the seven-layer OIC networking hierarchy?

    • A.

      Active Directory operates in the Data Link layer

    • B.

      Active Directory operates in the Physical layer

    • C.

      Active Directory operates in the Network layer

    • D.

      Active Directory operates in the Presentation layer

    • E.

      None of the above

    Correct Answer
    E. None of the above
    Explanation
    Active Directory does not operate in any of the layers mentioned in the options. Active Directory is a directory service developed by Microsoft and it operates at the application layer of the OSI model. It provides a centralized and standardized way to manage and organize resources in a network environment.

    Rate this question:

  • 24. 

    A user complains that he cannot access his account on the domain COMPANY and that the server reports that his account has been disabled. How would you best go about correcting the issue?

    • A.

      Delete his current account and create an account with an identical username and password

    • B.

      Copy his disabled account, rename the old account, and change the new account to the original name

    • C.

      Uncheck the “Account is Disabled” option under the Properties for his account

    • D.

      Check the “Account is Enabled” option under the Properties for his account

    • E.

      Assign him a new password and ask him to change it when he has logged on

    Correct Answer
    C. Uncheck the “Account is Disabled” option under the Properties for his account
    Explanation
    To correct the issue, the best approach would be to uncheck the "Account is Disabled" option under the Properties for the user's account. By doing so, the user's account will be enabled again, allowing them to access their account on the domain COMPANY. This option is the most direct and efficient way to resolve the problem without the need to delete or create a new account, copy or rename accounts, or assign a new password.

    Rate this question:

  • 25. 

    Which of the following is not an organizational unit within an Active Directory environment?

    • A.

      User

    • B.

      Security Group

    • C.

      Distribution Group

    • D.

      Computer

    • E.

      Administrative Group

    Correct Answer
    E. Administrative Group
    Explanation
    In an Active Directory environment, an Administrative Group is not considered an organizational unit. Organizational units (OU) are used to organize and manage objects such as users, groups, and computers. An Administrative Group, on the other hand, is a logical grouping of servers and other resources in Microsoft Exchange Server, not in Active Directory.

    Rate this question:

  • 26. 

    Which of the following accurately describes the difference between a normal and a fault-tolerant DFS installation?

    • A.

      Fault-tolerant DFS stores all file system topology

    • B.

      Fault-tolerant DFS uses more processing power

    • C.

      Fault-tolerant DFS stores all file system topology on a separate server

    • D.

      Fault-tolerant DFS uses RAID 1

    • E.

      Fault-tolerant DFS is incapable of using RAID

    Correct Answer
    C. Fault-tolerant DFS stores all file system topology on a separate server
    Explanation
    Fault-tolerant DFS stores all file system topology on a separate server, which means that the file system topology information is stored on a different server than the one where the actual data is stored. This separation ensures that even if the server hosting the data fails, the file system topology information remains intact and can be used to recover and restore the data. This approach enhances the fault tolerance of the DFS installation by providing redundancy and ensuring the availability of the file system topology information.

    Rate this question:

  • 27. 

    Which of the following is not a hidden share on a Windows Server 2003 installation?

    • A.

      Admin$

    • B.

      IPC$

    • C.

      Printstor$

    • D.

      Print$

    • E.

      SYSVOL

    Correct Answer
    C. Printstor$
    Explanation
    The correct answer is "Printstor$". This is because "Printstor$" is not a standard hidden share on a Windows Server 2003 installation. Hidden shares are typically identified by a dollar sign ($) at the end of their names, and they are used for administrative purposes or to provide access to specific resources on the server. The other options listed, such as "Admin$", "IPC$", "Print$", and "SYSVOL", are all commonly used hidden shares on Windows Server 2003 installations.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 03, 2007
    Quiz Created by
    Vaibhav Agarwal

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.