Active Directory Trivia Quiz: How Much Do You Know?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By V_gray
V
V_gray
Community Contributor
Quizzes Created: 1 | Total Attempts: 237
| Attempts: 237 | Questions: 87
Please wait...
Question 1 / 87
0 %
0/100
Score 0/100
1. The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of _______traffic between sites.

Explanation

Universal groups add more data to the global catalog, which in turn increases the amount of replication traffic between sites. This means that when universal groups are used, there is a higher volume of data being replicated between different sites within a network. Replication is the process of copying and distributing data across multiple servers or sites, ensuring that all servers have the most up-to-date information. Therefore, the correct answer is replication.

Submit
Please wait...
About This Quiz
Active Directory Trivia Quiz: How Much Do You Know? - Quiz

Challenge your knowledge of Active Directory with this trivia quiz! Explore key concepts like container objects, attributes, group policies, and domain control requirements. Essential for IT professionals enhancing... see moretheir system administration skills. see less

2. To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called __________.

Explanation

Domain controllers stay synchronized by sending database information to each other, a process known as replication. This ensures that all domain controllers have the most up-to-date information and can provide consistent services to users. Replication is crucial in maintaining the integrity and consistency of the Active Directory database across the network.

Submit
3. The overall objective in your Active Directory design process should be to create as few __________ as possible.

Explanation

The goal in Active Directory design is to minimize the number of domains. This is because each domain adds complexity and administrative overhead. By having fewer domains, it becomes easier to manage user accounts, group policies, and resources. Additionally, a smaller number of domains simplifies the overall architecture and improves performance. Therefore, the objective should be to create as few domains as possible.

Submit
4. An access __ __ list is a collection of individual permissions in the form of access control entries.

Explanation

An access control list is a collection of individual permissions in the form of access control entries. These entries determine what actions or operations a user or group can perform on a particular resource. By organizing permissions into a list, it becomes easier to manage and enforce access control policies for various users or groups. The access control list allows administrators to specify who can access a resource, what actions they can perform, and under what conditions. It provides a flexible and granular approach to controlling access to resources within a system or network.

Submit
5. Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?

Explanation

The correct answer is distribution. The distribution group is used for nonsecurity-related functions, such as sending email messages to a collection of users. This group allows for easy communication and collaboration among a specific set of users, making it convenient for sending messages to multiple recipients simultaneously.

Submit
6. The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of _______traffic between sites.

Explanation

Universal groups in Active Directory add more data to the global catalog, which in turn increases the amount of replication traffic between different sites. Replication is the process by which changes made to one domain controller are propagated to other domain controllers in the network. Universal groups are designed to contain users, groups, and computers from multiple domains within a forest, allowing for more efficient management of resources across the network. Therefore, the correct answer is replication as it accurately describes the increased traffic caused by universal groups.

Submit
7. Every object consists of __________ that store information about the object.

Explanation

In object-oriented programming, objects are composed of attributes that store information about the object. Attributes represent the characteristics or properties of an object and can be used to describe its state or behavior. They can hold different types of data such as strings, numbers, or even other objects. By accessing and manipulating these attributes, we can interact with the object and perform various operations on it. Therefore, the correct answer for this question is "attributes".

Submit
8. What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?

Explanation

The correct answer is "disk management" because it is the name of the Microsoft Management Console (MMC) snap-in that is used to perform disk-related tasks. This snap-in allows users to manage and manipulate disks, partitions, and volumes on a computer system. It provides features such as creating, deleting, and formatting partitions, assigning drive letters, and extending or shrinking volumes. With disk management, users can effectively manage their storage resources and optimize disk usage on their system.

Submit
9. If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.

Explanation

When creating domains for remote sites or organizational divisions, the most common practice is to make them all subdomains in the same tree, with a single root domain at the top. This means that each remote site or division will have its own subdomain within the larger domain structure. This allows for easier management and organization of the domains, as well as better control and administration of resources within each subdomain.

Submit
10. __________Policy is one of the most powerful administrative features of Active Directory.  

Explanation

In Active Directory, a group is a collection of user accounts, computer accounts, and other groups. Group Policy is a feature that allows administrators to manage and control the settings of user accounts and computer accounts within a group. It enables administrators to enforce security policies, deploy software, and configure various settings for multiple users or computers simultaneously. Group Policy is considered one of the most powerful administrative features of Active Directory because it provides centralized management and control over a network's resources.

Submit
11. To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called___________.

Explanation

Domain controllers stay synchronized by sending database information to each other, a process known as replication. This ensures that all domain controllers have up-to-date information and can provide consistent services to users. Replication helps maintain the integrity and consistency of the Active Directory database across all domain controllers in a domain or forest. It allows for changes made on one domain controller to be replicated and propagated to other domain controllers, ensuring that all domain controllers have the same information.

Submit
12. The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of __________ traffic between sites.

Explanation

Universal groups add more data to the global catalog, which in turn increases the amount of replication traffic between sites. This means that when universal groups are used, there is a higher volume of data being replicated between different sites in a network. Replication is the process of copying and distributing data across multiple servers or sites to ensure consistency and availability. Therefore, the correct answer is replication.

Submit
13. Each domain in an Active Directory installation is a separate __________ entity.

Explanation

Each domain in an Active Directory installation is a separate administrative entity. This means that each domain has its own set of administrative controls, policies, and permissions that can be managed independently. Administrators can have different levels of control and access within each domain, allowing for efficient management and organization of resources within the Active Directory environment.

Submit
14. Every object consists of _________ that store information about the object.

Explanation

Objects in programming languages are composed of attributes that store information about the object. These attributes can be variables or properties that hold data specific to the object. They define the characteristics or state of the object and can be accessed or modified as needed. By using attributes, objects can have different values or behaviors, making them unique instances of a class or type.

Submit
15. When you assign a __ _ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects

Explanation

When you assign a "Deny" permission to a system element, it means that any Allow permissions that the element might have inherited from its parent objects will be overridden. This means that even if there are Allow permissions set at a higher level, the Deny permission will take precedence and deny access to the system element.

Submit
16. Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?

Explanation

The distribution group is used for nonsecurity-related functions, such as sending email messages to a collection of users. This group allows for easy communication and collaboration among a specific set of users, without the need for individual email addresses. By adding users to a distribution group, messages can be sent to the entire group with just one email address, making it efficient for sending mass emails or announcements to a specific set of users.

Submit
17. What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?

Explanation

Functional levels in Active Directory are designed to provide backward compatibility. This means that they allow domain controllers with older versions of the Windows Server operating system to still function and communicate effectively with domain controllers running newer versions. This ensures that organizations can upgrade their domain controllers gradually without disrupting the overall functionality of the Active Directory environment.

Submit
18. You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.

Explanation

The Net.exe command-line utility can be used to map drive letters to folders.

Submit
19. If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all __________ in the same tree, with a single root domain at the top.

Explanation

When creating domains for remote sites or organizational divisions, the most common practice is to make them all subdomains in the same tree, with a single root domain at the top. This means that each remote site or division will have its own subdomain within the larger domain structure. This allows for easier management and organization of the different sites or divisions while still maintaining a centralized control with the root domain.

Submit
20. A(n) __________ object is one that can have other objects subordinate to it.

Explanation

A container object is one that can have other objects subordinate to it. This means that a container can hold or contain other objects within it. These subordinate objects are typically dependent on the container object and are considered to be part of it. Examples of container objects include data structures like arrays or lists, as well as graphical user interface components like panels or frames.

Submit
21. If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.

Explanation

When creating domains for remote sites or organizational divisions, it is common practice to make them all subdomains in the same tree. This means that they are all connected and organized under a single root domain at the top. This allows for easier management and administration of the domains, as well as better integration and communication between the different divisions or sites.

Submit
22. Each domain in an Active Directory installation is a separate __________ entity.

Explanation

Each domain in an Active Directory installation is a separate administrative entity because it has its own set of administrative controls, policies, and permissions. This allows for centralized management and control over resources, users, and security within that specific domain. Administrators can define and enforce policies, manage user accounts, and allocate resources within their respective domains without affecting other domains in the Active Directory environment. This division of administrative responsibilities helps to maintain security, organization, and efficiency within the overall Active Directory structure.

Submit
23. Every Active Directory domain should have a minimum of __________ domain controllers.

Explanation

Every Active Directory domain should have a minimum of two domain controllers. This is because having multiple domain controllers provides redundancy and fault tolerance. If one domain controller fails, the other one can still handle authentication requests and maintain the availability of the domain services. Additionally, having multiple domain controllers allows for load balancing and better performance by distributing the workload across the controllers. Therefore, having at least two domain controllers ensures the reliability and availability of the Active Directory domain.

Submit
24. When beginning a new Active Directory installation, the first step is to create a new __________.

Explanation

When starting a new Active Directory installation, the first step is to create a new forest. A forest is the highest level of organization in Active Directory and represents a collection of domains that share a common schema, global catalog, and directory configuration. Creating a new forest establishes the foundation for the Active Directory infrastructure and allows for the creation of domains, organizational units, and objects within the network.

Submit
25. DNS naming limitations call for a maximum of how many characters per domain name?

Explanation

DNS naming limitations call for a maximum of 63 characters per domain name. This means that a domain name cannot exceed 63 characters in length, including letters, numbers, hyphens, and periods. This limitation is in place to ensure compatibility and prevent potential issues with DNS servers and systems that handle domain names.

Submit
26. A(n) _________ object is one that can have other objects subordinate to it.

Explanation

A container object is one that can have other objects subordinate to it. This means that a container object is capable of holding or containing other objects within it. It provides a structure or framework for organizing and managing the subordinate objects. The container object acts as a parent or higher-level entity, while the subordinate objects are the child or lower-level entities. This relationship allows for hierarchical organization and control over the objects within the container.

Submit
27. Which of the following is a main group type found in Active Directory?

Explanation

The main group type found in Active Directory is "Security." Active Directory is a directory service developed by Microsoft that is used to manage and organize network resources. Within Active Directory, security groups are used to assign permissions and access rights to users and resources. These groups are created to simplify the management of permissions and provide a centralized way to control access to various network resources.

Submit
28. When beginning a new Active Directory installation, the first step is to create a new __________.

Explanation

When starting a new Active Directory installation, the first step is to create a new forest. A forest is a collection of one or more domain trees that share a common schema, configuration, and global catalog. It represents the highest level of organization in an Active Directory structure and is used to define the security and administrative boundaries within a network. By creating a new forest, administrators can establish a new directory infrastructure and define the scope of the Active Directory deployment.

Submit
29. The overall objective in your Active Directory design process should be to create as few ___________         as possible

Explanation

The overall objective in your Active Directory design process should be to create as few domains as possible. This is because having fewer domains simplifies the management and administration of the Active Directory environment. It reduces the complexity and potential points of failure, improves performance, and enhances security. By minimizing the number of domains, you can streamline the deployment and maintenance processes, resulting in a more efficient and robust Active Directory infrastructure.

Submit
30. You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.

Explanation

The correct answer is "use". The Net.exe command-line utility can be used with the "use" parameter to map drive letters to folders. This allows users to access specific folders on a network drive by assigning a drive letter to them.

Submit
31. Drives can be mapped through Group Policy or though what other method?

Explanation

Drives can be mapped through Group Policy or logon scripts. Logon scripts are a method used to automate the mapping of network drives for users when they log in to a computer or network. These scripts can be configured to run during the logon process and execute commands that map specific drives to network locations. This allows users to easily access shared folders and resources on the network without manually mapping each drive individually.

Submit
32. DNS naming limitations call for a maximum of how many characters per domain name?

Explanation

DNS naming limitations call for a maximum of 63 characters per domain name. This means that a domain name cannot exceed 63 characters in length, including any letters, numbers, hyphens, or periods. This limitation is in place to ensure compatibility and to prevent potential issues with DNS servers and systems that may have restrictions on the maximum length of domain names they can handle.

Submit
33. Which group is used most often when designing an Active Directory infrastructure?

Explanation

The security group is used most often when designing an Active Directory infrastructure because it allows for the efficient management and control of user access and permissions. Security groups help in assigning permissions to resources, such as files, folders, and applications, by grouping users with similar access requirements. This simplifies the administration process and ensures that security policies are effectively implemented within the Active Directory environment.

Submit
34. Drives can be mapped through Group Policy or though what other method?

Explanation

Drives can be mapped through Group Policy or logon scripts. Logon scripts are a method used to automatically execute a series of commands or actions when a user logs into a computer or network. In the context of mapping drives, logon scripts can be used to assign specific drive letters to network locations or shared folders, allowing users to easily access and manage files stored in those locations. This method provides flexibility and control over drive mapping configurations, complementing the capabilities offered by Group Policy.

Submit
35. The disk interface most commonly associated with workstations is called ______.

Explanation

ATA stands for Advanced Technology Attachment, which is the disk interface most commonly associated with workstations. ATA is a standard interface used for connecting storage devices such as hard drives and solid-state drives to computers. It provides a reliable and efficient way to transfer data between the storage device and the workstation. ATA has been widely adopted in the industry and is compatible with various operating systems and hardware configurations, making it a popular choice for workstations.

Submit
36. Every Active Directory domain should have a minimum of _____ domain controllers.

Explanation

Every Active Directory domain should have a minimum of two domain controllers. This is because having multiple domain controllers provides redundancy and fault tolerance. If one domain controller fails, the other one can still handle authentication requests and other domain services. Additionally, having multiple domain controllers allows for better load balancing and improved performance. Therefore, it is recommended to have at least two domain controllers in an Active Directory domain.

Submit
37. What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?

Explanation

Disk Management is the correct answer because it is the name of the Microsoft Management Console (MMC) snap-in that is used to perform disk-related tasks. This tool allows users to manage and configure disk drives, partitions, and volumes on a Windows operating system. With Disk Management, users can create, delete, format, and resize partitions, assign drive letters, and perform other disk-related tasks such as initializing new disks and converting disks between different formats. It is a crucial tool for managing and organizing storage resources on a computer system.

Submit
38. What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?

Explanation

Functional levels in Active Directory are designed to provide backward compatibility. This means that they allow domain controllers with different versions of the Windows Server operating system to coexist and communicate effectively within the same Active Directory environment. By supporting older versions of Windows Server, functional levels ensure that organizations can gradually upgrade their domain controllers without disrupting the overall functionality and compatibility of their Active Directory infrastructure.

Submit
39. When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.

Explanation

Assigning permissions to an organizational unit does not grant access to network resources for a collection of users. Organizational units are used for organizing and managing users, groups, and computers within a domain, but they do not directly control access to network resources. Access to network resources is typically granted by assigning permissions directly to individual users or groups, not to organizational units. Therefore, the correct answer is false.

Submit
40. An Active Directory domain controller can verify a user's identity by which of the following methods?

Explanation

An Active Directory domain controller can verify a user's identity by using smart cards, passwords, and biometrics. Smart cards provide a secure method of authentication by storing user credentials on a physical card. Passwords are the most common method of authentication, where users enter a unique combination of characters to prove their identity. Biometrics, such as fingerprints or facial recognition, use unique physical characteristics to verify a user's identity. By utilizing all of these methods, an Active Directory domain controller can provide a comprehensive and secure authentication process.

Submit
41. A(n) __________ object is one that can have other objects subordinate to it.

Explanation

A container object is one that can have other objects subordinate to it. This means that a container object has the ability to hold or contain other objects within it. These subordinate objects are typically organized or structured in some way within the container object. The container object acts as a higher-level entity that provides a framework or context for the subordinate objects. This relationship allows for a hierarchical structure where the container object is at the top and the subordinate objects are nested within it.

Submit
42. A volume that writes data one stripe at a time , provides improved performance, and does not provide fault tolerance.

Explanation

A striped volume is a type of volume that writes data one stripe at a time, providing improved performance. However, it does not provide fault tolerance, meaning that if one disk in the volume fails, the entire volume may become inaccessible.

Submit
43. Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service.

Explanation

The explanation for the given correct answer is that Active Directory is not one of the easiest technologies to test because it requires a complex and realistic environment to accurately simulate the factors that can impact its performance. An isolated lab environment may not be able to fully replicate all the variables and conditions that can affect a directory service like Active Directory. Therefore, testing Active Directory can be challenging and may require more resources and expertise.

Submit
44. There are two basic classes of objects in an Active Directory domain. Which of the following is an object?

Explanation

In Active Directory, a leaf is an object that represents the lowest level of a hierarchy. It is a type of object that can exist within an Active Directory domain. Leaf objects are typically the end points of the hierarchy and do not have any child objects beneath them. They can be user accounts, computer accounts, or other types of objects that are not containers for other objects. Therefore, the given answer "leaf" correctly identifies an object in an Active Directory domain.

Submit
45. You can drag and drop leaf objects, such as users and computers, between OUs, but not between domains.

Explanation

The statement is true because in Active Directory, Organizational Units (OUs) are used to organize and manage objects within a domain. Objects such as users and computers can be moved or "dragged and dropped" between different OUs within the same domain. However, objects cannot be moved directly between different domains as domains represent separate directory services with their own security boundaries. To move objects between domains, a process called "cross-domain migration" or a trust relationship between the domains needs to be established.

Submit
46. Subdomains in a tree inherit permissions and policies from their parent domains.

Explanation

In a tree structure, subdomains inherit permissions and policies from their parent domains. This means that any permissions or policies set at the parent domain level will be automatically applied to all subdomains within that parent domain. This allows for consistent and efficient management of permissions and policies across the entire tree structure.

Submit
47. Which of the following statements are Not true in reference to converting a basic disk to a dynamic disk?

Explanation

The correct answer states that you cannot convert drives with volumes that use an allocation unit size greater than 512 bytes. This means that if a drive has volumes with an allocation unit size greater than 512 bytes, you cannot convert it from a basic disk to a dynamic disk. This is because dynamic disks have their own unique requirements and limitations, and one of them is that drives with larger allocation unit sizes cannot be converted.

Submit
48. Which of the following statements are requirements for extending a volume on a dynamic disk?

Explanation

To extend a simple volume, you can only utilize the space available on the same disk if you want to keep the volume as a simple volume. However, if the simple volume is not a system volume or boot volume, you can extend it across additional disks. This means that if the simple volume is not critical for the operating system's functioning, it can be extended onto other disks for increased storage capacity.

Submit
49. The drive interface that is preferred for network servers is called

Explanation

SCSI (Small Computer System Interface) is the preferred drive interface for network servers because it offers several advantages. SCSI provides faster data transfer rates, better performance, and more flexibility compared to other drive interfaces like IDE or SATA. It allows for multiple devices to be connected to a single SCSI controller, enabling efficient sharing of resources among multiple servers. Additionally, SCSI supports hot-swapping, meaning drives can be added or removed without shutting down the server. These features make SCSI the ideal choice for network servers that require high-speed data transfer, reliability, and scalability.

Submit
50. Where do users log in when joining an Active Directory domain?

Explanation

When users join an Active Directory domain, they log in to the domain. The domain is the central authority that manages and authenticates user accounts and resources within a network. By logging in to the domain, users gain access to shared resources, such as files, printers, and applications, that are controlled and managed by the domain controller. The domain controller verifies the user's credentials and grants access to the domain resources based on the user's permissions and group memberships.

Submit
51. The Read-Only Domain Controller (RODC) supports only incoming replication traffic. As a result, what is it possible to do when using a Read-Only Domain Controller?

Explanation

When using a Read-Only Domain Controller (RODC), it is not possible to create, modify, or delete Active Directory objects. The purpose of an RODC is to provide a read-only copy of the Active Directory database, which means it can only receive replication traffic from a writeable domain controller. Therefore, it does not have the capability to make any changes to the Active Directory objects.

Submit
52. In the NTFS permission system, ___________ permissions are actually combinations of _______ permissions.

Explanation

In the NTFS permission system, "standard" permissions refer to the basic set of permissions that can be applied to files and folders, such as read, write, and execute. On the other hand, "special" permissions are more specific and allow for more granular control over the access rights, such as changing permissions or taking ownership. Therefore, special permissions are actually combinations or subsets of the standard permissions, providing additional flexibility and customization options within the NTFS permission system.

Submit
53. The features that enables a windows server 2008 computer to maintain up to 64 previous versions of a file is called?

Explanation

Shadow copies is a feature in Windows Server 2008 that allows the computer to maintain up to 64 previous versions of a file. This feature creates snapshots of files at regular intervals, allowing users to easily restore previous versions of files if needed. Shadow copies can be enabled on a per-volume basis and provide a convenient way to recover accidentally deleted or modified files without the need for a complete backup and restore process.

Submit
54.   The ________utility enables you to create a fourth primary permission on a basic disk.

Explanation

Diskpart.exe is a utility that allows users to manage disks, partitions, and volumes on a Windows computer. It provides a command-line interface for performing various disk-related operations. In this context, diskpart.exe enables users to create a fourth primary permission on a basic disk. This means that users can use diskpart.exe to create an additional primary partition on a basic disk, which can be useful for organizing data or installing multiple operating systems on a single disk.

Submit
55. _________folders makes them accessible to network users.

Explanation

Sharing folders makes them accessible to network users. Network users can access and view the contents of the shared folders, allowing for easy collaboration and file sharing among multiple users. This feature is especially useful in a work or educational setting where multiple individuals need access to the same files and documents. By sharing folders, users can conveniently share and retrieve information, enhancing productivity and efficiency within a network environment.

Submit
56. When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.

Explanation

When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to a security group. Organizational units are used for organizing and managing objects within a domain, but they do not directly control access permissions.

Submit
57. __________ volumes are parity information to rebuild data in the event of disk failure

Explanation

RAID 5 is a data storage technology that uses parity information to rebuild data in the event of disk failure. In this RAID configuration, data is distributed across multiple disks along with parity information. The parity information is used to calculate the missing or corrupted data in case of a disk failure. This allows for data redundancy and fault tolerance, ensuring that the system can continue to function even if one disk fails.

Submit
58. Each domain in an Active Directory installation is a separate __________ entity.

Explanation

Each domain in an Active Directory installation is a separate administrative entity. This means that each domain has its own set of administrative controls, policies, and permissions that can be managed independently. Administrators can define and enforce different administrative rules and access levels for each domain, allowing for efficient management and control of resources within the Active Directory environment.

Submit
59. Which of the following statements about the DiskPart command-line utility is Not true?

Explanation

not-available-via-ai

Submit
60. _____ permissions control access to the files and folders stored on disk volumes formatted with the NTFS file system.

Explanation

NTFS permissions are used to control access to files and folders stored on disk volumes formatted with the NTFS file system. NTFS permissions allow administrators to set permissions for individual users or groups, determining who can read, write, modify, or delete files and folders. These permissions provide a more granular level of control and security compared to other file systems.

Submit
61. Folder _______ asks users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server.

Explanation

The term "redirection" accurately describes the process described in the question. It refers to the action of redirecting or sending users to a different location or server. In this case, users are led to believe that they are accessing files stored in a local folder, such as Documents, but in reality, the files are stored on a server. This can be done through various techniques, such as network mapping or symbolic links, where the local folder is linked to the server location.

Submit
62. The process of granting users access to file server shares by reading their permission is called:

Explanation

Authorization is the process of granting users access to file server shares by reading their permission. It involves verifying the identity of the user and determining the level of access they have based on their permissions. This ensures that only authorized individuals can access and modify the files on the server, maintaining security and preventing unauthorized access.

Submit
63. In Windows, the ________file system is limited to volumes no larger than 32 GB.

Explanation

The correct answer is fat 32. FAT32 is a file system used in Windows that has a maximum volume size limit of 32 GB. This means that if you are using the FAT32 file system, you cannot create a volume larger than 32 GB.

Submit
64. The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is called the file's___________ permissions.

Explanation

The combination of permissions assigned to a file, plus the permissions inherited from parent folders and group memberships, is referred to as the file's "effective" permissions. These effective permissions determine the level of access and control that a user or group has over the file. By considering all the permissions involved, including those inherited from higher-level folders and group memberships, the effective permissions provide a comprehensive understanding of the file's accessibility and security settings.

Submit
65. A volume that consits of  a single volume ,u can extend it to create a spanned or striped volume. You can extend into any adjacent unallocated space on the same disk or, with some limitations, shrink the volume by de-allocating any unused space in the volume.

Explanation

A simple volume refers to a basic disk partition that is created using a single disk. It does not involve any form of data redundancy or striping. This type of volume can be extended by utilizing adjacent unallocated space on the same disk or by shrinking the volume to deallocate unused space within it.

Submit
66. Which of  the following statements are Not true about differences between network attached storage (NAS) devices and storage area network (SAN) storage

Explanation

The correct answer is d. NAS devices require a specialized protocol, such as Fiber Channel or iSCSI, while SAN devices use standard networking protocols. This means that NAS devices require additional protocols to communicate with the network, while SAN devices can use existing network protocols.

Submit
67. Unlike organizational units, you cannot assign Group Policy settings to computer objects, nor can you delegate their administration.

Explanation

Group Policy settings are used to manage and configure the operating system and user settings of computers in an organization. However, these settings cannot be directly assigned to computer objects themselves. Instead, Group Policy settings are applied to organizational units (OU) which contain computer objects. This means that you cannot specifically target and assign Group Policy settings to individual computer objects. Additionally, the administration of Group Policy settings cannot be delegated to computer objects, as they are managed at the OU level. Therefore, the statement that you cannot assign Group Policy settings to computer objects and cannot delegate their administration is true.

Submit
68. What type of permissions control access to specific parts of an Active Directory hierarchy?

Explanation

not-available-via-ai

Submit
69. To use a Windows Server 2008 computer as a domain controller, you must configure it to use a(n) __________.

Explanation

To use a Windows Server 2008 computer as a domain controller, it is necessary to configure it with a static IP address. This is because a domain controller requires a consistent and unchanging IP address to ensure that it can be reliably located on the network. A static IP address ensures that the server always has the same IP address, allowing other devices on the network to easily connect to and communicate with the domain controller.

Submit
70. When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.

Explanation

You cannot assign permissions directly to an organizational unit. Organizational units are containers used for organizing and managing Active Directory objects, such as users, groups, and computers. Permissions are assigned to individual users or groups, not organizational units.

Submit
71. Which of the following is not a reason why you should try to create as few domains as possible when designing an Active Directory infrastructure?

Explanation

Creating fewer domains in an Active Directory infrastructure is beneficial because it reduces the cost of purchasing licenses from Microsoft. Each domain requires a separate license, so minimizing the number of domains helps to save on licensing expenses.

Submit
72. Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service.

Explanation

The statement suggests that Active Directory is easy to test because an isolated lab environment can replicate the factors that impact its performance. However, this is not entirely accurate. While an isolated lab environment can simulate some factors, there are certain real-world elements like network latency, user load, and hardware variations that cannot be fully replicated. Therefore, testing Active Directory comprehensively requires a combination of lab testing and real-world scenarios.

Submit
73. Active Directory was first introduced in which operating system?

Explanation

Active Directory was first introduced in Windows Server 2000. This operating system marked the debut of Active Directory, a directory service developed by Microsoft. Active Directory provides a centralized and hierarchical structure for managing and organizing network resources, such as users, computers, and groups. It allows administrators to efficiently manage and control access to resources within a network environment. Windows Server 2000 was the first version of Windows Server to include Active Directory, making it a significant milestone in the evolution of Microsoft's server operating systems.

Submit
74. What type of devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network?

Explanation

Network attached storage (NAS) devices are essentially dedicated file servers that provide file-based storage services directly to clients on the network. These devices are designed to provide a centralized storage solution for multiple users, allowing them to access and share files over the network. NAS devices are typically connected to the network and can be accessed by clients using various protocols such as NFS (Network File System) or SMB (Server Message Block). They offer features like data redundancy, data backup, and remote access, making them ideal for small businesses or home networks that require efficient and reliable file storage and sharing capabilities.

Submit
75. What is the name of the communications protocol called for by the original X.500 standard?

Explanation

The original X.500 standard called for the use of the Directory Access Protocol. This protocol is used for accessing and retrieving information from a directory service, such as the X.500 directory. It allows clients to search for and retrieve information stored in the directory, making it an essential part of the X.500 standard.

Submit
76. A site topology consists of all of the following Active Directory object types except __________.

Explanation

The correct answer is Subnet Links. In a site topology, Active Directory object types include sites, subnets, and site links. Sites represent physical locations, subnets represent IP address ranges, and site links represent the connections between sites. However, subnet links are not a valid Active Directory object type.

Submit
77. Which of the following is not a variable that can affect the performance of an Active Directory installation?

Explanation

The length of the domain name you create does not directly affect the performance of an Active Directory installation. The performance of an Active Directory installation is primarily influenced by factors such as the hardware you select for your domain controllers, the capabilities of your network, and the types of WAN links connecting your remote sites. The length of the domain name may have some impact on the overall performance indirectly, such as in DNS resolution, but it is not a direct variable that affects the performance.

Submit
78. What is the primary difference between global and universal groups?

Explanation

Universal groups are a type of Active Directory group that can contain users, groups, and computers from any domain within a forest. They are used to grant permissions and access across multiple domains. One key difference between global and universal groups is that universal groups add more data to the global catalog. The global catalog is a distributed data repository that contains a subset of attributes for all objects in the forest. By adding more data to the global catalog, universal groups enhance the efficiency of searching and locating objects across the entire forest.

Submit
79. A security principal is

Explanation

The correct answer is "The network element receiving permissions." A security principal refers to the entity or object that is being granted permissions in a network. It can be a user, a group, a computer, or any other network element that needs to access resources or perform certain actions. The security principal is not the person granting permissions, but rather the entity that is receiving those permissions.

Submit
80. When using the subzone method, you can leave the Internet DNS servers in place and use Windows Server 2008 DNS servers to host the zone for the subdomain. Which of the following is a configuration change that you must make?A) You must use your domain controllers as your DNS servers.

Explanation

When using the subzone method, you need to configure the Internet DNS servers to delegate the Active Directory subdomain to the Windows Server 2008 DNS servers. This means that you are assigning the responsibility of handling DNS queries for the subdomain to the Windows Server 2008 DNS servers. This configuration change is necessary in order for the Windows Server 2008 DNS servers to effectively host the zone for the subdomain while leaving the Internet DNS servers in place.

Submit
81. A mirrored drive installation that also uses redundant host adapters is called disk _______.

Explanation

Disk duplexing refers to a mirrored drive installation that also includes redundant host adapters. This means that the data on one drive is simultaneously copied or mirrored onto another drive, providing redundancy and fault tolerance. The redundant host adapters ensure that if one adapter fails, the other can continue to access and write data to the mirrored drives. This setup increases data availability and improves system reliability by ensuring that data can still be accessed even if one component fails.

Submit
82. Which of the following is not a reason for creating an organizational unit?

Explanation

Creating an organizational unit is not done for the purpose of implementing domains. Organizational units are used to organize and manage resources within a domain, such as users, computers, and groups. They help to delegate administrative tasks and apply group policies to specific sets of resources. On the other hand, implementing domains involves creating a logical boundary for network resources, establishing trust relationships, and defining security policies. While organizational units play a role in managing resources within a domain, they are not directly related to the implementation of domains themselves.

Submit
83. Active Directory was first introduced in which operating system?

Explanation

Active Directory was first introduced in Windows 2000 Server. Active Directory is a directory service that provides a centralized location for managing and organizing network resources such as users, computers, and groups. Windows 2000 Server was the first operating system to include Active Directory, making it a significant milestone in the evolution of Microsoft's server operating systems.

Submit
84. A separate netowrk dedicated to file servers and external storage devices

Explanation

The correct answer is SAN Storage attached network. This refers to a separate network that is specifically designed for file servers and external storage devices. SAN (Storage Area Network) allows for the centralized management and sharing of storage resources, providing high-speed connectivity and scalability. It enables multiple servers to access the same storage devices simultaneously, improving performance and efficiency. This dedicated network ensures that storage traffic does not interfere with regular network traffic, optimizing the overall system performance.

Submit
85. A standard interface for connecting storage devices such as hard disk and CD-ROM drives inside personal computer.

Explanation

ATA (Advanced Technology Attachment) is a standard interface used to connect storage devices, such as hard disk drives and CD-ROM drives, inside personal computers. It is a widely adopted technology that allows for the transfer of data between the storage device and the computer's motherboard. ATA provides a standardized way for these devices to communicate and ensures compatibility between different hardware components.

Submit
86. What type of permissions control access to specific parts of an Active Directory hierarchy?

Explanation

The correct answer is Active Directory permissions. Active Directory permissions control access to specific parts of an Active Directory hierarchy. These permissions determine what actions users or groups can perform on objects within the Active Directory, such as creating, modifying, or deleting objects. By assigning appropriate permissions, administrators can ensure that only authorized users have access to specific parts of the Active Directory, helping to maintain security and control over the directory's contents.

Submit
87. What is the primary difference between global and universal groups?

Explanation

Universal groups add more data to the global catalog than global groups. The global catalog is a distributed data repository in Active Directory that contains information about all objects in the directory. Global groups are used to organize and manage user accounts within a single domain, while universal groups are used to organize and manage user accounts across multiple domains. By adding more data to the global catalog, universal groups allow for better cross-domain searching and authentication.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 28, 2011
    Quiz Created by
    V_gray
Cancel
  • All
    All (87)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The primary difference between global and universal groups is that...
To stay synchronized, domain controllers communicate by sending...
The overall objective in your Active Directory design process should...
An access __ __ list is a collection of individual permissions in the...
Which group is used for nonsecurity-related functions, such as sending...
The primary difference between global and universal groups is that...
Every object consists of __________ that store information about the...
What is the name of the Microsoft Management Console (MMC) snap-in...
If you plan to create domains corresponding to remote sites or...
__________Policy is one of the most powerful administrative features...
To stay synchronized, domain controllers communicate by sending...
The primary difference between global and universal groups is that...
Each domain in an Active Directory installation is a separate...
Every object consists of _________ that store information about the...
When you assign a __ _ permission to a system element, it overrides...
Which group is used for nonsecurity-related functions, such as sending...
What type of compatibility are functional levels designed to provide...
You can use the Net.exe command-line utility with the _____ parameter...
If you plan to create domains corresponding to remote sites or...
A(n) __________ object is one that can have other objects subordinate...
If you plan to create domains corresponding to remote sites or...
Each domain in an Active Directory installation is a separate...
Every Active Directory domain should have a minimum of __________...
When beginning a new Active Directory installation, the first step is...
DNS naming limitations call for a maximum of how many characters per...
A(n) _________ object is one that can have other objects subordinate...
Which of the following is a main group type found in Active Directory?
When beginning a new Active Directory installation, the first step is...
The overall objective in your Active Directory design process should...
You can use the Net.exe command-line utility with the _____ parameter...
Drives can be mapped through Group Policy or though what other method?
DNS naming limitations call for a maximum of how many characters per...
Which group is used most often when designing an Active Directory...
Drives can be mapped through Group Policy or though what other method?
The disk interface most commonly associated with workstations is...
Every Active Directory domain should have a minimum of _____ domain...
What is the name of the Microsoft Management Console (MMC) snap-in...
What type of compatibility are functional levels designed to provide...
When you want to grant a collection of users permission to access a...
An Active Directory domain controller can verify a user's identity by...
A(n) __________ object is one that can have other objects subordinate...
A volume that writes data one stripe at a time , provides improved...
Active Directory is one of the easiest technologies to test because an...
There are two basic classes of objects in an Active Directory domain....
You can drag and drop leaf objects, such as users and computers,...
Subdomains in a tree inherit permissions and policies from their...
Which of the following statements are Not true in reference to...
Which of the following statements are requirements for extending a...
The drive interface that is preferred for network servers is called
Where do users log in when joining an Active Directory domain?
The Read-Only Domain Controller (RODC) supports only incoming...
In the NTFS permission system, ___________ permissions are actually...
The features that enables a windows server 2008 computer to maintain...
 ...
_________folders makes them accessible to network users.
When you want to grant a collection of users permission to access a...
__________ volumes are parity information to rebuild data in the event...
Each domain in an Active Directory installation is a separate...
Which of the following statements about the DiskPart command-line...
_____ permissions control access to the files and folders stored on...
Folder _______ asks users to click what appears to be a local folder,...
The process of granting users access to file server shares by reading...
In Windows, the ________file system is limited to volumes no larger...
The combination of permissions assigned to a file, plus the...
A volume that consits of  a single volume ,u can extend it to...
Which of  the following statements are Not true about differences...
Unlike organizational units, you cannot assign Group Policy settings...
What type of permissions control access to specific parts of an Active...
To use a Windows Server 2008 computer as a domain controller, you must...
When you want to grant a collection of users permission to access a...
Which of the following is not a reason why you should try to create as...
Active Directory is one of the easiest technologies to test because an...
Active Directory was first introduced in which operating system?
What type of devices are essentially dedicated file servers that...
What is the name of the communications protocol called for by the...
A site topology consists of all of the following Active Directory...
Which of the following is not a variable that can affect the...
What is the primary difference between global and universal groups?
A security principal is
When using the subzone method, you can leave the Internet DNS servers...
A mirrored drive installation that also uses redundant host adapters...
Which of the following is not a reason for creating an organizational...
Active Directory was first introduced in which operating system?
A separate netowrk dedicated to file servers and external storage...
A standard interface for connecting storage devices such as hard disk...
What type of permissions control access to specific parts of an Active...
What is the primary difference between global and universal groups?
Alert!

Advertisement