Windows Server Quiz Questions And Answers

Reviewed by Samy Boulos
Samy Boulos, MSc (Computer Science) |
Data Engineer
Review Board Member
Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.
, MSc (Computer Science)
By Santosh Chilwarwar
S
Santosh Chilwarwar
Community Contributor
Quizzes Created: 1 | Total Attempts: 9,635
| Attempts: 9,635 | Questions: 12
Please wait...
Question 1 / 12
0 %
0/100
Score 0/100
1. To find which of the following Active Directory containers can Group Policies be applied?

Explanation

Group Policies can be applied to all of the Active Directory containers mentioned in the options: sites, OUs (Organizational Units), and domains. Group Policies are used to manage and control the settings for users and computers within an Active Directory environment. By applying Group Policies at the site level, they can be enforced across multiple domains. OUs allow for more granular control by applying policies to specific groups of users or computers. Domains also serve as a container for Group Policies, allowing for broader policy application across all objects within the domain. Therefore, all of the mentioned containers can have Group Policies applied to them.

Submit
Please wait...
About This Quiz
Windows Server Quiz Questions And Answers - Quiz

Below is the "Windows server quiz" to test your knowledge of Windows Server 2008 Active Directory. Can you pass the test? The quiz is perfect for seeing how... see morewell you understand the software. It will give you some real-life scenarios that you should find solutions to. Think you can handle it? How about you give it a try and get to see how good you are when it comes to this field.
see less

2. Which of the following is a role that can be installed on a Windows Server?

Explanation



Active Directory Domain Services is a role that can be installed on a Windows Server. It is used for managing users, groups, and resources within a network environment. This role enables centralized authentication, authorization, and administration of network resources, enhancing security and simplifying management tasks.
Submit
3. How many group scopes are there in Active Directory?  

Explanation

Active Directory has three group scopes: domain local, global, and universal. Each scope determines the extent to which a group can be used and managed within a domain or across multiple domains. Domain local groups are used to assign permissions within a single domain, global groups are used to organize users with similar roles across multiple domains, and universal groups are used to grant access to resources in any domain within a forest.

Submit
4. Which of the following terms describes the process of granting users access to file server shares by reading their permissions?

Explanation

Authorization is the correct answer because it refers to the process of granting users access to file server shares by reading their permissions. This involves determining what level of access a user has to specific files or folders on the server based on their assigned permissions. Authentication, on the other hand, is the process of verifying the identity of a user, while enumeration refers to the process of gathering information about a system or network. Assignment does not accurately describe the process of granting access based on permissions.

Submit
5. Which of the following cannot contain multiple Active Directory domains?

Explanation

Organizational units (OU) cannot contain multiple Active Directory domains. OUs are containers used to organize and manage objects within a single domain. While a domain can have multiple OUs, each OU belongs to a single domain and cannot contain multiple domains. In contrast, sites, trees, and forests can all contain multiple Active Directory domains. Sites represent physical locations, trees are collections of domains with a common namespace, and forests are collections of multiple trees.

Submit
6. Which of the following command-line tools are used to join a computer to a domain?

Explanation

Netdom.exe is used to join a computer to a domain. It is a command-line tool that is specifically designed for managing Active Directory domains and trusts. It allows administrators to join a computer to a domain, as well as perform other domain-related tasks such as managing trusts, querying domain information, and managing domain controllers. Netdom.exe is commonly used in Windows environments for domain administration and can be used to automate the process of joining computers to a domain.

Submit
7. Which of the following does an Active Directory client use to locate objects in another domain?

Explanation

An Active Directory client uses the Global Catalog to locate objects in another domain. The Global Catalog is a distributed data repository that contains a subset of attributes for all objects in the forest. It provides a way to search for objects across multiple domains in the forest without the need for referrals. The Global Catalog is essential for cross-domain queries and is used to locate objects such as users, groups, and resources in different domains within the Active Directory forest.

Submit
8. Active Directory is a technology created by ________ that provides a variety of network services, including:

Explanation

Active Directory is a technology created by Microsoft that provides a variety of network services. One of these services is role-based access control, which allows administrators to assign specific roles and permissions to users based on their job responsibilities and organizational needs. This ensures that users only have access to the resources and information that are necessary for their roles, enhancing security and efficiency within the network.

Submit
9. Which type of IP address must a system have to be visible from the Internet?

Explanation

A system must have a registered IP address to be visible from the Internet. A registered IP address is assigned by an Internet Service Provider (ISP) and is unique to that system. It allows the system to communicate with other devices on the Internet and be accessible to users worldwide. Without a registered IP address, the system would not be able to establish connections or receive incoming data from the Internet.

Submit
10. Which of the following is not a type of user account that can be configured in Windows Server 2012 R2?

Explanation

In Windows Server 2012 R2, network accounts are not a type of user account that can be configured. Local accounts are created and managed on individual servers, domain accounts are managed by a domain controller in an Active Directory domain, and built-in accounts are pre-configured accounts that have specific administrative purposes. However, network accounts are not a recognized type of user account in Windows Server 2012 R2.

Submit
11. Which of the following strategies for enforcing software restrictions will prevent any executable from running except for those that have been specifically allowed by an administrator?

Explanation

The correct answer is "Disallowed" because this strategy involves prohibiting the execution of any executable unless it has been explicitly authorized by an administrator. This means that only approved programs will be allowed to run, providing a higher level of security and control over the software environment.

Submit
12. Which of the following tools cannot enable and disable the Network Discovery firewall rules?

Explanation

The Action Center is not able to enable and disable the Network Discovery firewall rules. The Action Center is a notification center in Windows that provides alerts and notifications for various system settings and security issues. While it can notify the user about the status of the Network Discovery firewall rules, it does not have the capability to directly enable or disable them.

Submit
View My Results
Samy Boulos |MSc (Computer Science) |
Data Engineer
Samy Boulos is an experienced Technology Consultant with a diverse 25-year career encompassing software development, data migration, integration, technical support, and cloud computing. He leverages his technical expertise and strategic mindset to solve complex IT challenges, delivering efficient and innovative solutions to clients.

Quiz Review Timeline (Updated): Feb 12, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 12, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Samy Boulos
  • Jun 02, 2020
    Quiz Created by
    Santosh Chilwarwar
Cancel
  • All
    All (12)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
To find which of the following Active Directory containers can Group...
Which of the following is a role that can be installed on a Windows...
How many group scopes are there in Active Directory?  
Which of the following terms describes the process of granting users...
Which of the following cannot contain multiple Active Directory...
Which of the following command-line tools are used to join a computer...
Which of the following does an Active Directory client use to locate...
Active Directory is a technology created by ________ that provides a...
Which type of IP address must a system have to be visible from the...
Which of the following is not a type of user account that can be...
Which of the following strategies for enforcing software restrictions...
Which of the following tools cannot enable and disable the Network...
Alert!

Advertisement