2.
To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called __________.
Explanation
Domain controllers stay synchronized by sending database information to each other, a process known as replication. This ensures that all domain controllers have the most up-to-date information and can provide consistent services to users. Replication is crucial in maintaining the integrity and consistency of the Active Directory database across the network.
3.
The overall objective in your Active Directory design process should be to create as few __________ as possible.
Explanation
The goal in Active Directory design is to minimize the number of domains. This is because each domain adds complexity and administrative overhead. By having fewer domains, it becomes easier to manage user accounts, group policies, and resources. Additionally, a smaller number of domains simplifies the overall architecture and improves performance. Therefore, the objective should be to create as few domains as possible.
4.
An access __ __ list is a collection of individual permissions in the form of access control entries.
Explanation
An access control list is a collection of individual permissions in the form of access control entries. These entries determine what actions or operations a user or group can perform on a particular resource. By organizing permissions into a list, it becomes easier to manage and enforce access control policies for various users or groups. The access control list allows administrators to specify who can access a resource, what actions they can perform, and under what conditions. It provides a flexible and granular approach to controlling access to resources within a system or network.
5.
Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?
Explanation
The correct answer is distribution. The distribution group is used for nonsecurity-related functions, such as sending email messages to a collection of users. This group allows for easy communication and collaboration among a specific set of users, making it convenient for sending messages to multiple recipients simultaneously.
6.
The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of _______traffic between sites.
Explanation
Universal groups in Active Directory add more data to the global catalog, which in turn increases the amount of replication traffic between different sites. Replication is the process by which changes made to one domain controller are propagated to other domain controllers in the network. Universal groups are designed to contain users, groups, and computers from multiple domains within a forest, allowing for more efficient management of resources across the network. Therefore, the correct answer is replication as it accurately describes the increased traffic caused by universal groups.
7.
Every object consists of __________ that store information about the object.
Explanation
In object-oriented programming, objects are composed of attributes that store information about the object. Attributes represent the characteristics or properties of an object and can be used to describe its state or behavior. They can hold different types of data such as strings, numbers, or even other objects. By accessing and manipulating these attributes, we can interact with the object and perform various operations on it. Therefore, the correct answer for this question is "attributes".
8.
What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?
Explanation
The correct answer is "disk management" because it is the name of the Microsoft Management Console (MMC) snap-in that is used to perform disk-related tasks. This snap-in allows users to manage and manipulate disks, partitions, and volumes on a computer system. It provides features such as creating, deleting, and formatting partitions, assigning drive letters, and extending or shrinking volumes. With disk management, users can effectively manage their storage resources and optimize disk usage on their system.
9.
If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.
Explanation
When creating domains for remote sites or organizational divisions, the most common practice is to make them all subdomains in the same tree, with a single root domain at the top. This means that each remote site or division will have its own subdomain within the larger domain structure. This allows for easier management and organization of the domains, as well as better control and administration of resources within each subdomain.
10.
__________Policy is one of the most powerful administrative features of Active Directory.
Explanation
In Active Directory, a group is a collection of user accounts, computer accounts, and other groups. Group Policy is a feature that allows administrators to manage and control the settings of user accounts and computer accounts within a group. It enables administrators to enforce security policies, deploy software, and configure various settings for multiple users or computers simultaneously. Group Policy is considered one of the most powerful administrative features of Active Directory because it provides centralized management and control over a network's resources.
11.
To stay synchronized, domain controllers communicate by sending database information to each other, which is a process called___________.
Explanation
Domain controllers stay synchronized by sending database information to each other, a process known as replication. This ensures that all domain controllers have up-to-date information and can provide consistent services to users. Replication helps maintain the integrity and consistency of the Active Directory database across all domain controllers in a domain or forest. It allows for changes made on one domain controller to be replicated and propagated to other domain controllers, ensuring that all domain controllers have the same information.
12.
The primary difference between global and universal groups is that universal groups add more data to the global catalog, thereby increasing the amount of __________ traffic between sites.
Explanation
Universal groups add more data to the global catalog, which in turn increases the amount of replication traffic between sites. This means that when universal groups are used, there is a higher volume of data being replicated between different sites in a network. Replication is the process of copying and distributing data across multiple servers or sites to ensure consistency and availability. Therefore, the correct answer is replication.
13.
Each domain in an Active Directory installation is a separate __________ entity.
Explanation
Each domain in an Active Directory installation is a separate administrative entity. This means that each domain has its own set of administrative controls, policies, and permissions that can be managed independently. Administrators can have different levels of control and access within each domain, allowing for efficient management and organization of resources within the Active Directory environment.
14.
Every object consists of _________ that store information about the object.
Explanation
Objects in programming languages are composed of attributes that store information about the object. These attributes can be variables or properties that hold data specific to the object. They define the characteristics or state of the object and can be accessed or modified as needed. By using attributes, objects can have different values or behaviors, making them unique instances of a class or type.
15.
When you assign a __ _ permission to a system element, it overrides any Allow permissions that the element might have inherited from its parent objects
Explanation
When you assign a "Deny" permission to a system element, it means that any Allow permissions that the element might have inherited from its parent objects will be overridden. This means that even if there are Allow permissions set at a higher level, the Deny permission will take precedence and deny access to the system element.
16.
Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users?
Explanation
The distribution group is used for nonsecurity-related functions, such as sending email messages to a collection of users. This group allows for easy communication and collaboration among a specific set of users, without the need for individual email addresses. By adding users to a distribution group, messages can be sent to the entire group with just one email address, making it efficient for sending mass emails or announcements to a specific set of users.
17.
What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?
Explanation
Functional levels in Active Directory are designed to provide backward compatibility. This means that they allow domain controllers with older versions of the Windows Server operating system to still function and communicate effectively with domain controllers running newer versions. This ensures that organizations can upgrade their domain controllers gradually without disrupting the overall functionality of the Active Directory environment.
18.
You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.
Explanation
The Net.exe command-line utility can be used to map drive letters to folders.
19.
If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all __________ in the same tree, with a single root domain at the top.
Explanation
When creating domains for remote sites or organizational divisions, the most common practice is to make them all subdomains in the same tree, with a single root domain at the top. This means that each remote site or division will have its own subdomain within the larger domain structure. This allows for easier management and organization of the different sites or divisions while still maintaining a centralized control with the root domain.
20.
A(n) __________ object is one that can have other objects subordinate to it.
Explanation
A container object is one that can have other objects subordinate to it. This means that a container can hold or contain other objects within it. These subordinate objects are typically dependent on the container object and are considered to be part of it. Examples of container objects include data structures like arrays or lists, as well as graphical user interface components like panels or frames.
21.
If you plan to create domains corresponding to remote sites or organizational divisions, the most common practice is to make them all ____________in the same tree, with a single root domain at the top.
Explanation
When creating domains for remote sites or organizational divisions, it is common practice to make them all subdomains in the same tree. This means that they are all connected and organized under a single root domain at the top. This allows for easier management and administration of the domains, as well as better integration and communication between the different divisions or sites.
22.
Each domain in an Active Directory installation is a separate __________ entity.
Explanation
Each domain in an Active Directory installation is a separate administrative entity because it has its own set of administrative controls, policies, and permissions. This allows for centralized management and control over resources, users, and security within that specific domain. Administrators can define and enforce policies, manage user accounts, and allocate resources within their respective domains without affecting other domains in the Active Directory environment. This division of administrative responsibilities helps to maintain security, organization, and efficiency within the overall Active Directory structure.
23.
Every Active Directory domain should have a minimum of __________ domain controllers.
Explanation
Every Active Directory domain should have a minimum of two domain controllers. This is because having multiple domain controllers provides redundancy and fault tolerance. If one domain controller fails, the other one can still handle authentication requests and maintain the availability of the domain services. Additionally, having multiple domain controllers allows for load balancing and better performance by distributing the workload across the controllers. Therefore, having at least two domain controllers ensures the reliability and availability of the Active Directory domain.
24.
When beginning a new Active Directory installation, the first step is to create a new __________.
Explanation
When starting a new Active Directory installation, the first step is to create a new forest. A forest is the highest level of organization in Active Directory and represents a collection of domains that share a common schema, global catalog, and directory configuration. Creating a new forest establishes the foundation for the Active Directory infrastructure and allows for the creation of domains, organizational units, and objects within the network.
25.
DNS naming limitations call for a maximum of how many characters per domain name?
Explanation
DNS naming limitations call for a maximum of 63 characters per domain name. This means that a domain name cannot exceed 63 characters in length, including letters, numbers, hyphens, and periods. This limitation is in place to ensure compatibility and prevent potential issues with DNS servers and systems that handle domain names.
26.
A(n) _________ object is one that can have other objects subordinate to it.
Explanation
A container object is one that can have other objects subordinate to it. This means that a container object is capable of holding or containing other objects within it. It provides a structure or framework for organizing and managing the subordinate objects. The container object acts as a parent or higher-level entity, while the subordinate objects are the child or lower-level entities. This relationship allows for hierarchical organization and control over the objects within the container.
27.
Which of the following is a main group type found in Active Directory?
Explanation
The main group type found in Active Directory is "Security." Active Directory is a directory service developed by Microsoft that is used to manage and organize network resources. Within Active Directory, security groups are used to assign permissions and access rights to users and resources. These groups are created to simplify the management of permissions and provide a centralized way to control access to various network resources.
28.
When beginning a new Active Directory installation, the first step is to create a new __________.
Explanation
When starting a new Active Directory installation, the first step is to create a new forest. A forest is a collection of one or more domain trees that share a common schema, configuration, and global catalog. It represents the highest level of organization in an Active Directory structure and is used to define the security and administrative boundaries within a network. By creating a new forest, administrators can establish a new directory infrastructure and define the scope of the Active Directory deployment.
29.
The overall objective in your Active Directory design process should be to create as few ___________
as possible
Explanation
The overall objective in your Active Directory design process should be to create as few domains as possible. This is because having fewer domains simplifies the management and administration of the Active Directory environment. It reduces the complexity and potential points of failure, improves performance, and enhances security. By minimizing the number of domains, you can streamline the deployment and maintenance processes, resulting in a more efficient and robust Active Directory infrastructure.
30.
You can use the Net.exe command-line utility with the _____ parameter to map drive letters to folders.
Explanation
The correct answer is "use". The Net.exe command-line utility can be used with the "use" parameter to map drive letters to folders. This allows users to access specific folders on a network drive by assigning a drive letter to them.
31.
Drives can be mapped through Group Policy or though what other method?
Explanation
Drives can be mapped through Group Policy or logon scripts. Logon scripts are a method used to automate the mapping of network drives for users when they log in to a computer or network. These scripts can be configured to run during the logon process and execute commands that map specific drives to network locations. This allows users to easily access shared folders and resources on the network without manually mapping each drive individually.
32.
DNS naming limitations call for a maximum of how many characters per domain name?
Explanation
DNS naming limitations call for a maximum of 63 characters per domain name. This means that a domain name cannot exceed 63 characters in length, including any letters, numbers, hyphens, or periods. This limitation is in place to ensure compatibility and to prevent potential issues with DNS servers and systems that may have restrictions on the maximum length of domain names they can handle.
33.
Which group is used most often when designing an Active Directory infrastructure?
Explanation
The security group is used most often when designing an Active Directory infrastructure because it allows for the efficient management and control of user access and permissions. Security groups help in assigning permissions to resources, such as files, folders, and applications, by grouping users with similar access requirements. This simplifies the administration process and ensures that security policies are effectively implemented within the Active Directory environment.
34.
Drives can be mapped through Group Policy or though what other method?
Explanation
Drives can be mapped through Group Policy or logon scripts. Logon scripts are a method used to automatically execute a series of commands or actions when a user logs into a computer or network. In the context of mapping drives, logon scripts can be used to assign specific drive letters to network locations or shared folders, allowing users to easily access and manage files stored in those locations. This method provides flexibility and control over drive mapping configurations, complementing the capabilities offered by Group Policy.
35.
The disk interface most commonly associated with workstations is called ______.
Explanation
ATA stands for Advanced Technology Attachment, which is the disk interface most commonly associated with workstations. ATA is a standard interface used for connecting storage devices such as hard drives and solid-state drives to computers. It provides a reliable and efficient way to transfer data between the storage device and the workstation. ATA has been widely adopted in the industry and is compatible with various operating systems and hardware configurations, making it a popular choice for workstations.
36.
Every Active Directory domain should have a minimum of _____ domain controllers.
Explanation
Every Active Directory domain should have a minimum of two domain controllers. This is because having multiple domain controllers provides redundancy and fault tolerance. If one domain controller fails, the other one can still handle authentication requests and other domain services. Additionally, having multiple domain controllers allows for better load balancing and improved performance. Therefore, it is recommended to have at least two domain controllers in an Active Directory domain.
37.
What is the name of the Microsoft Management Console (MMC) snap-in that you use to perform disk-related tasks?
Explanation
Disk Management is the correct answer because it is the name of the Microsoft Management Console (MMC) snap-in that is used to perform disk-related tasks. This tool allows users to manage and configure disk drives, partitions, and volumes on a Windows operating system. With Disk Management, users can create, delete, format, and resize partitions, assign drive letters, and perform other disk-related tasks such as initializing new disks and converting disks between different formats. It is a crucial tool for managing and organizing storage resources on a computer system.
38.
What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system?
Explanation
Functional levels in Active Directory are designed to provide backward compatibility. This means that they allow domain controllers with different versions of the Windows Server operating system to coexist and communicate effectively within the same Active Directory environment. By supporting older versions of Windows Server, functional levels ensure that organizations can gradually upgrade their domain controllers without disrupting the overall functionality and compatibility of their Active Directory infrastructure.
39.
When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit.
Explanation
Assigning permissions to an organizational unit does not grant access to network resources for a collection of users. Organizational units are used for organizing and managing users, groups, and computers within a domain, but they do not directly control access to network resources. Access to network resources is typically granted by assigning permissions directly to individual users or groups, not to organizational units. Therefore, the correct answer is false.
40.
An Active Directory domain controller can verify a user’s identity by which of the following methods?
Correct Answer
A. D) all of the above
Explanation
An Active Directory domain controller can verify a user's identity by using smart cards, passwords, and biometrics. Smart cards provide a secure method of authentication by storing user credentials on a physical card. Passwords are the most common method of authentication, where users enter a unique combination of characters to prove their identity. Biometrics, such as fingerprints or facial recognition, use unique physical characteristics to verify a user's identity. By utilizing all of these methods, an Active Directory domain controller can provide a comprehensive and secure authentication process.
41.
A(n) __________ object is one that can have other objects subordinate to it.
Correct Answer
container
Explanation
A container object is one that can have other objects subordinate to it. This means that a container object has the ability to hold or contain other objects within it. These subordinate objects are typically organized or structured in some way within the container object. The container object acts as a higher-level entity that provides a framework or context for the subordinate objects. This relationship allows for a hierarchical structure where the container object is at the top and the subordinate objects are nested within it.
42.
A volume that writes data one stripe at a time , provides improved performance, and does not provide fault tolerance.
Correct Answer
Striped volume
Explanation
A striped volume is a type of volume that writes data one stripe at a time, providing improved performance. However, it does not provide fault tolerance, meaning that if one disk in the volume fails, the entire volume may become inaccessible.
43.
Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service.
Explanation
The explanation for the given correct answer is that Active Directory is not one of the easiest technologies to test because it requires a complex and realistic environment to accurately simulate the factors that can impact its performance. An isolated lab environment may not be able to fully replicate all the variables and conditions that can affect a directory service like Active Directory. Therefore, testing Active Directory can be challenging and may require more resources and expertise.
44.
There are two basic classes of objects in an Active Directory domain. Which of the following is an object?
Correct Answer
leaf
Explanation
In Active Directory, a leaf is an object that represents the lowest level of a hierarchy. It is a type of object that can exist within an Active Directory domain. Leaf objects are typically the end points of the hierarchy and do not have any child objects beneath them. They can be user accounts, computer accounts, or other types of objects that are not containers for other objects. Therefore, the given answer "leaf" correctly identifies an object in an Active Directory domain.
45.
You can drag and drop leaf objects, such as users and computers, between OUs, but not between domains.
Explanation
The statement is true because in Active Directory, Organizational Units (OUs) are used to organize and manage objects within a domain. Objects such as users and computers can be moved or "dragged and dropped" between different OUs within the same domain. However, objects cannot be moved directly between different domains as domains represent separate directory services with their own security boundaries. To move objects between domains, a process called "cross-domain migration" or a trust relationship between the domains needs to be established.
46.
Subdomains in a tree inherit permissions and policies from their parent domains.
Explanation
In a tree structure, subdomains inherit permissions and policies from their parent domains. This means that any permissions or policies set at the parent domain level will be automatically applied to all subdomains within that parent domain. This allows for consistent and efficient management of permissions and policies across the entire tree structure.
47.
Which of the following statements are Not true in reference to converting a basic disk to a dynamic disk?
Correct Answer
A. B. You cannot convert drives with volumes that use an allocation unit size greater than 512 bytes.
Explanation
The correct answer states that you cannot convert drives with volumes that use an allocation unit size greater than 512 bytes. This means that if a drive has volumes with an allocation unit size greater than 512 bytes, you cannot convert it from a basic disk to a dynamic disk. This is because dynamic disks have their own unique requirements and limitations, and one of them is that drives with larger allocation unit sizes cannot be converted.
48.
Which of the following statements are requirements for extending a volume on a dynamic disk?
Correct Answer
A. If you want to extend a simple volume, you can use only the available space on the same disk if the volume is to remain simple.
You can extend a simple volume across additional disks if it is not a system volume or boot volume.
Explanation
To extend a simple volume, you can only utilize the space available on the same disk if you want to keep the volume as a simple volume. However, if the simple volume is not a system volume or boot volume, you can extend it across additional disks. This means that if the simple volume is not critical for the operating system's functioning, it can be extended onto other disks for increased storage capacity.
49.
The drive interface that is preferred for network servers is called
Correct Answer
SCSI
Explanation
SCSI (Small Computer System Interface) is the preferred drive interface for network servers because it offers several advantages. SCSI provides faster data transfer rates, better performance, and more flexibility compared to other drive interfaces like IDE or SATA. It allows for multiple devices to be connected to a single SCSI controller, enabling efficient sharing of resources among multiple servers. Additionally, SCSI supports hot-swapping, meaning drives can be added or removed without shutting down the server. These features make SCSI the ideal choice for network servers that require high-speed data transfer, reliability, and scalability.