MS Server 2008 Quiz 9

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,281
| Attempts: 961 | Questions: 126
Please wait...
Question 1 / 126
0 %
0/100
Score 0/100
1. Windows Server 2008 computers must run which protocol service to send email messages?

Explanation

A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol (SMTP) service to be able to send email messages.

Submit
Please wait...
About This Quiz
Windows Server 2008 Quizzes & Trivia

This quiz tests knowledge on various aspects of Windows Server 2008, including Active Directory, File Services, Print Services, and Terminal Services.

2. After the printer processes a print job, it stores the job in a print queue that is known as a __________.

Explanation

After the printer processes a print job, it stores the job in a print queue, known as a spooler.

Submit
3. You must install the File Services role to use the Distributed File System.

Explanation

To use the Distributed File System (DFS), it is necessary to install the File Services role. DFS is a feature in Windows Server that allows users to access and manage files across a network. By installing the File Services role, the server gains the capability to provide DFS functionalities such as file replication, load balancing, and fault tolerance. Therefore, the statement "You must install the File Services role to use the Distributed File System" is true.

Submit
4. What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?

Explanation

Smart cards contain a chip that stores user information such as the user’s private key for certificate-related services; user credentials, such as the username; and a public key certificate. This requires the implementation of a public key infrastructure (PKI). PKI is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography.

Submit
5. __________ is the highest available forest functional level

Explanation

The Windows Server 2008 functional level allows no backward compatibility. Only Windows Server 2008 domain controllers are supported.

Submit
6. Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.

Explanation

Active Directory uses trust relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks. As the name implies, a trust relationship allows administrators from a particular domain to grant access to their domain’s resources to users in other domains.

Submit
7. Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.

Explanation

Windows passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length.

Submit
8. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

Explanation

Forward lookup zones are necessary for computer hostname–to–IP address mappings, which are used for name resolution by a variety of services. For example, when a user requests access to a server based on its hostname, the request is passed to a DNS server to resolve the hostname to an IP address. Most queries are based on forward lookups.

Submit
9. A __________ is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource.

Explanation

A password is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource. The primary function of a password is to protect a user’s authentication information, thus ensuring that no one can impersonate a particular user and thereby gain access to resources that the user has been authorized to view or edit.

Submit
10. What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?

Explanation

The schema partition, or Schema NC, contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory.

Submit
11. Configuring role services as you install them saves time and effort later.

Explanation

not-available-via-ai

Submit
12. LPD Services allows UNIX clients running the LPR program to send their print jobs to Windows printers.

Explanation

not-available-via-ai

Submit
13. To use ImageX.exe, you must boot the target computer to Windows PE and run the tool from the command line.

Explanation

not-available-via-ai

Submit
14. How many RID Masters can a domain have?

Explanation

Each domain can have only one RID Master.

Submit
15. Local GPO settings are stored in what folder on a computer?

Explanation

Each computer running Windows Server 2008, Windows Server 2003, Windows XP Professional, or Windows 2000 has only one local GPO, and the settings in that local GPO will apply to all users who log on to the computer. The local GPO settings are stored on the local computer in the %systemroot%/System32/GroupPolicy folder.

Submit
16. What processes can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date?

Explanation

Although not enabled by default, aging and scavenging are processes that can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date. Without this process, the DNS database would require manual maintenance to prevent server performance degradation and potential disk-space issues.

Submit
17. What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?

Explanation

Loopback processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace.

Submit
18. Unlike virtual private network (VPN) or direct dial-up connections, a Terminal Services connection uses relatively little network bandwidth because the applications are running on the server computer.

Explanation

not-available-via-ai

Submit
19. A __________ is defined as one or more IP subnets that are connected by fast links.

Explanation

A site is defined as one or more IP subnets that are connected by fast links. In most circumstances, all computers that are connected via a single LAN will constitute a single site. Within Active Directory, sites are used to optimize the replication of Active Directory information across small or large geographic areas.

Submit
20. The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory.

Explanation

Windows Server 2008 introduces the Read-Only Domain Controller (RODC), a domain controller that contains a copy of the ntds.dit file that cannot be modified and that does not replicate its changes to other domain controllers within Active Directory.

Submit
21. A password should be __________ characters in length to be considered a strong password.

Explanation

A strong password has the following characteristics: at least eight characters in length; contains uppercase and lowercase letters, numbers, and nonalphabetic characters; at least one character from each of the previous character types; and differs significantly from other previously used passwords.

Submit
22. What is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools?

Explanation

Server Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools.

Submit
23. What is the process of replicating DNS information from one DNS server to another?

Explanation

A zone transfer is the process of replicating DNS information from one DNS server to another.

Submit
24. The default location for the Active Directory database and log files is C:\Windows\System32.

Explanation

not-available-via-ai

Submit
25. What typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or smart card?

Explanation

Passwords and personal identification numbers (PINs) are becoming common in many areas of life including banking, email, voice mail, and keyless entry systems, such as garage door openers. A PIN typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or a smart card.

Submit
26. What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivty and replication tests?

Explanation

Dcdiag is a command-line tool used for monitoring Active Directory. When run from a command prompt, this tool can perform connectivity and replication tests, report errors that occur, report DNS registration problems, analyze the permissions required for replication, and analyze the state of domain controllers within the forest.

Submit
27. __________ name refers to each user’s login name.

Explanation

The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.

Submit
28. What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?

Explanation

The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and use the Run as administrator option in the GUI or the runas command-line tool when it is necessary to perform an administrative task.

Submit
29. __________ name refers to each user’s login name.

Explanation

The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.

Submit
30. What is the maximum basic volume size in Windows Server 2008?

Explanation

The maximum basic volume size in Windows Server 2008 is 2 terabytes.

Submit
31. Web servers receiving large amounts of traffic will not need higher-end network adapters or multiple adapters to connect to different subnets.

Explanation

not-available-via-ai

Submit
32. What type of trust relationship allows you to create two-way transitive trusts between separate forests?

Explanation

Cross-forest trust relationships were introduced in Windows Server 2003; they allow you to create two-way transitive trusts between separate forests.

Submit
33. Standard permissions are actually combinations of what other type of permissions, which provide the most granular control over the element?

Explanation

When you open the Properties dialog box for a system element and look at its Security tab, the NTFS permissions you see are called standard permissions. Standard permissions are actually combinations of special permissions that provide the most granular control over the element.

Submit
34. Group policy is divided into two subcategories, or nodes, that are named Computer Configuration and __________.

Explanation

Configuring Group Policy settings enables you to customize the configuration of a user’s desktop, environment, and security settings. The actual settings are divided into two subcategories: Computer Configuration and User Configuration. The subcategories are referred to as Group Policy nodes. A node is simply a parent structure that holds all related settings. In this case, the node is specific to computer configurations and user configurations.

Submit
35. Standard permissions are actually combinations of what other type of permissions, which provide the most granular control over the element?

Explanation

When you open the Properties dialog box for a system element and look at its Security tab, the NTFS permissions you see are called standard permissions. Standard permissions are actually combinations of special permissions that provide the most granular control over the element.

Submit
36. Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).

Explanation

not-available-via-ai

Submit
37. You can manually modify the group membership of special identity groups, but you cannot view their membership lists.

Explanation

not-available-via-ai

Submit
38. For enterprise networks, creating workgroups is the recommended method for managing quota assignments on a large scale.

Explanation

Creating workgroups is not the recommended method for managing quota assignments on a large scale in enterprise networks. Instead, enterprise networks typically use more advanced methods such as directory services or centralized management tools to manage quota assignments efficiently and effectively. Workgroups are generally used in smaller, less complex environments where centralized management is not necessary.

Submit
39. To implement PKI, what must be installed on your Windows 2008 Server?

Explanation

PKI requires you to install Active Directory Certificate Services in your Windows Server 2008 environment. Active Directory Certificate Services is a server role available in Windows Server 2008 that allows you to create and administer PKI certificates for your users, computers, and applications.

Submit
40. What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation?

Explanation

If the user has successfully logged on in the past and you have enabled cached credentials in your environment, a user will be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation.

Submit
41. Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).

Explanation

Windows Server 2008 does not support UNIX and Linux file server clients with Server Message Blocks (SMB).

Submit
42. Windows Server 2008 supports numerous physical interfaces except for which interface?

Explanation

Windows Server 2008 supports numerous physical interfaces, including Universal Serial bus (USB), IEEE 1394 (FireWire), parallel (LPT), serial (COM), Infrared Data Access (IrDA), Bluetooth ports, and network printing services such as lpr, Internet Printing Protocol (IPP), and standard TCP/IP ports.

Submit
43. What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?

Explanation

The Comma-Separated Value Directory Exchange (CSVDE) command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file. These files can be created in any text editor. This command-line utility only imports or exports new objects; it cannot modify or delete existing objects.

Submit
44. What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?

Explanation

A smart card is a credit card-sized device or a token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise.

Submit
45. What port is used by Active Directory to direct search requests to a global catalog server?

Explanation

When a user initiates a search for an object in Active Directory, the request is automatically sent to TCP port 3268, which is used by Active Directory to direct these requests to a global catalog server. One of the SRV records used by Active Directory refers to the global catalog, or _gc, service, which listens on port 3268 to respond to these requests.

Submit
46. What role provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications?

Explanation

Windows Server 2008 includes a new Active Directory Lightweight Directory Services (AD LDS) role that provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications.

Submit
47. What is the process of confirming a user’s identity by using a known value, such as a password, pin number on a smart card, or user’s fingerprint or handprint in the case of biometric authentication?

Explanation

Authentication is the process of confirming a user’s identity using a known value such as a password, the pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication.

Submit
48. What process applies Group Policy settings to various containers within Active Directory?

Explanation

You can configure one or more GPOs within a domain and then use a process called linking, which applies these settings to various containers within Active Directory. You can link multiple GPOs to a single container or link one GPO to multiple containers throughout the Active Directory structure.

Submit
49. Which functional level only allows Windows Server 2003 and Windows 2008 domain controllers?

Explanation

The Windows Server 2003 functional level allows Windows Server 2003 and Windows 2008 domain controllers only. It does not allow the presence of Windows 2000 domain controllers.

Submit
50. The Default Domain Policy is linked to the Domain Controllers OU, and its settings affect all domain controllers in the domain.

Explanation

The Default Domain Policy is not linked to the Domain Controllers OU. It is linked to the root of the domain and its settings affect all objects within the domain, including domain controllers. Therefore, the statement is false.

Submit
51. Inbound replication is when a domain controller transmits replication information to other domain controllers on the network.

Explanation

Inbound replication is not when a domain controller transmits replication information to other domain controllers on the network. Inbound replication refers to the process of receiving replication information from other domain controllers. Therefore, the given statement is false.

Submit
52. __________ groups are nonsecurity-related groups created for the distribution of information to one or more persons.

Explanation

Distribution Groups are nonsecurity-related groups created for the distribution of information to one or more persons.

Submit
53. The Domain Naming Master is responsible for managing changes to the Active Directory schema.

Explanation

not-available-via-ai

Submit
54. Which of the following is not a type of user account that can be configured in Windows Server 2008?

Explanation

Three types of user accounts can be created and configured in Windows Server 2008. They are local accounts, domain accounts, and built-in user accounts.

Submit
55. What mechanism enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations?

Explanation

Folder redirection is a mechanism that enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations. This enables users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server. Because the files in the Documents folder are stored on a server, users can access them from any workstation, and administrators can back up the files easily.

Submit
56. Which UNIX operating system protocol is used for file sharing?

Explanation

Windows operating systems rely on a protocol called Server Message Blocks (SMB) for their file sharing. However, in the UNIX world, the standard is the Network File System (NFS).

Submit
57. The Default Domain Policy is linked to the Domain Controllers OU, and its settings affect all domain controllers in the domain.

Explanation

The Default Domain Policy is not linked to the Domain Controllers OU, but rather to the root of the domain. Therefore, its settings affect all objects within the domain, not just domain controllers.

Submit
58. What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?

Explanation

A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. Without the efficiency of a directory service, businesses would have difficulty keeping up with demands for fast-paced data exchange.

Submit
59. NTFS permissions are located on what tab of a file or folder’s properties?

Explanation

Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.

Submit
60. What device driver converts the print jobs generated by applications into an appropriate string of commands for a specific print device?

Explanation

A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features.

Submit
61. Which console includes several predefined quota templates that can be used to create your own quota template?

Explanation

The File Server Resource Manager console includes several predefined quota templates that you can use to create your own quota template.

Submit
62. The Default Domain Policy is linked to the Domain Controllers OU, and its settings affect all domain controllers in the domain.

Explanation

The Default Domain Policy is not linked to the Domain Controllers OU by default. It is linked to the root of the domain and its settings affect all objects within the domain, including domain controllers. Therefore, the statement is false.

Submit
63. What mechanism enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations?

Explanation

Folder redirection is a mechanism that enables administrators to store elements of user profiles on a server share instead of the local drives on individual workstations. This enables users to click what appears to be a local folder, such as Documents, and access their files that are actually stored on a server. Because the files in the Documents folder are stored on a server, users can access them from any workstation, and administrators can back up the files easily.

Submit
64. What master database contains definitions of all objects in the Active Directory?

Explanation

The schema is a master database that contains definitions of all objects in the Active Directory—in a way, it defines what Active Directory is.

Submit
65. Which FSMO role is responsible for reference updates from its domain objects to other domains?

Explanation

The Infrastructure Master Role is responsible for reference updates from its domain objects to other domains. This assists in tracking which domains own which objects.

Submit
66. A basic file server uses remotely attached storage, that is, a computer with hard drives stored inside it.

Explanation

not-available-via-ai

Submit
67. What directory object includes subcontainers that hold GPO policy information?

Explanation

The content of each nonlocal GPO is actually stored in two locations. One of these is the Group Policy container (GPC), an Active Directory object that stores the properties of the GPO.

Submit
68. You cannot manually modify the group membership of or view the membership lists of __________ groups.

Explanation

You cannot manually modify the group membership of special identity groups, nor can you view their membership lists.

Submit
69. What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?

Explanation

Like CSVDE, the LDAP Data Interchange Format Directory Exchange (LDIFDE) utility can be used to import or export Active Directory information. It can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema, if necessary. It also can be used to import data from other directory services, such as Novell NetWare.

Submit
70. When configuring a site link object, which attribute allows the administrator to define the path that replication will take?

Explanation

Assigning a cost to a site link object allows the administrator to define the path that replication will take. If more than one path can be used to replicate information, cost assignments will determine which path is chosen first.

Submit
71. What role does Windows Server 2008 include that enables users to send faxes from and receive them to their desktops?

Explanation

By installing the Fax Server role, you enable a Windows Server 2008 computer to send and receive faxes for clients. Clients send faxes using a standard printer interface, which connects to a fax server on the network as easily as connecting to a local fax modem.

Submit
72. What type of trust allows you to configure trust relationships between Windows Server 2008 Active Directory and a UNIX MIT Kerberos realm?

Explanation

Realm trusts allow you to configure trust relationships between Windows Server 2008 Active Directory and a UNIX MIT Kerberos realm, which is the UNIX equivalent to an Active Directory domain allowing centralized user and password administration on a UNIX network.

Submit
73. What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources?

Explanation

Authorization is the process of confirming that an authenticated user has the correct permissions to access one or more network resources.

Submit
74. Windows Server 2008 Web Edition does not support what role?

Explanation

Windows Server 2008 Web Edition does not support the UDDI Services server role.

Submit
75. Which FSMO role is responsible for reference updates from its domain objects to other domains?

Explanation

The Infrastructure Master Role is responsible for reference updates from its domain objects to other domains. This assists in tracking which domains own which objects.

Submit
76. Replication groups use which topology to limit the replication traffic to specific pairs of members?

Explanation

By default, replication groups use a full mesh topology, which means that every member in a group replicates with every other member. This is a satisfactory solution for relatively small DFS deployments, but on larger installations, the full mesh topology can generate a huge amount of network traffic. In such cases, you might want to opt for a hub/spoke topology that enables you to limit the replication traffic to specific pairs of members.

Submit
77. What lookup service maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts?

Explanation

The User Name Mapping service was the primary authentication mechanism in previous versions of Windows Services for NFS. It is essentially a lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. The server component of User Name Mapping is not included in Windows Server 2008, but NFS Server still retains the client component that enables it to access an existing User Name Mapping server and perform account lookups.

Submit
78. __________ groups are a collection of user accounts that are local to one specific workstation or member server.

Explanation

A local group is a collection of user accounts that are local to one specific workstation or member server.

Submit
79. What signifies an object’s relative location within an Active Directory OU structure?

Explanation

The distinguished name of an object signifies its relative location within an Active Directory OU structure.

Submit
80. What command-line tool is used to create, delete, verify, and reset trust relationships from the Windows Server 2008 command line?

Explanation

After you establish a manual trust, you can verify the trust using either Active Directory Domains and Trusts or the netdom command-line tool that is used to create, delete, verify, and reset trust relationships from the Windows Server 2008 command line.

Submit
81. What role service of the Print Services role installs the Print Management snap-in for MMC, which provides centralized printer management for an entire enterprise network?

Explanation

The Print Services role includes the Print Server role service that installs the Print Management snap-in for MMC, providing centralized printer management for an entire enterprise network.

Submit
82. Which of the following is not a type of GPO?

Explanation

There are three types of GPOs: local GPOs, domain GPOs, and starter GPOs.

Submit
83. What is the path to the default GPT structure for a domain?

Explanation

The Group Policy templates (GPT) folder structure is located in the shared SYSVOL folder on a domain controller. The path to the default GPT structure for the cohowinery.com domain is %systemroot%\sysvol\sysvol\cohowinery.com\Policies\. Replace %systemroot% with the folder location for the operating system files.

Submit
84. The guiding principle involved in the KCC’s selection of replication partners and its creation of replication objects is the “Rule of Four,” which states that no single domain controller should be more than four network hops away from any domain controller that can originate a change to the Active Directory database.

Explanation

The explanation for the answer "False" is that the statement mentions the "Rule of Four" which states that no single domain controller should be more than four network hops away from any domain controller that can originate a change to the Active Directory database. However, the statement does not mention whether the KCC's selection of replication partners and creation of replication objects follows this rule or not. Therefore, we cannot determine if the statement is true or false based on the given information.

Submit
85. The ISTG automatically assigns one server in each site as the bridgehead server unless you override this by establishing a list of __________ bridgehead servers.

Explanation

The ISTG automatically assigns one server in each site as the bridgehead server unless you override this by establishing a list of preferred bridgehead servers. The advantage of administratively assigning a preferred bridgehead server list is that you can determine which servers have the best processing power for handling replication traffic.

Submit
86. When deploying a server using a WDS installation, the client downloads a boot image that loads __________.

Explanation

Instead of booting from a local drive, the computer in a PXE connects to a server on the network and downloads the boot files it needs to run. In the case of a WDS installation, the client downloads a boot image that loads Windows PE (Preinstallation Environment) 2.1, after which it installs the operating system using another image file.

Submit
87. The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.

Explanation

The Default Domain Policy is linked to the domain, and its settings affect all users and computers in the domain.

Submit
88. What type of trust is new to Windows Server 2008 and is only available when the forest functionality is set to Windows Server 2008?

Explanation

Cross-forest trusts are new to Windows Server 2008, and they are only available when the forest functionality is set to Windows Server 2008. They must be manually created and maintained.

Submit
89. What standardized, highly portable print job format is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems?

Explanation

Enhanced Metafile (EMF) is a standardized, highly portable print job format that is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems. The printer driver converts the application data into an EMF file, and the printer sends it to the print server, which stores it in the spooler. The spooler then uses the printer driver on the print server to render the job into the final PCL format understood by the print device.

Submit
90. What is a mechanism that individual users can employ to maintain access to their server files, even in the event of a network service failure?

Explanation

Offline Files, while technically not a form of fault tolerance, is a mechanism that individual users can employ to maintain access to their server files, even in the event of a network service failure. Windows workstations copy server-based folders that users designate for offline use to the local drive, and the users work with the copies, which remain accessible whether the computer is connected to the network or not. If the network connection fails or the user undocks a portable computer, access to the offline files continues uninterrupted. When the computer reconnects to the network, a synchronization procedure occurs that replicates the files between server and workstation in whichever direction is necessary.

Submit
91. What component issues and manages certificates for individuals, computers, and organizations?

Explanation

The CA issues and manages certificates for individuals, computers, and organizations. Multiple CAs can be linked to form a public key infrastructure.

Submit
92. Aging is the process of removing records that were not refreshed or updated within specified time intervals, which will occur naturally with machines that are removed from the network.

Explanation

not-available-via-ai

Submit
93. Drive letters can be mapped with logon scripts or with __________.

Explanation

Drive letters can be mapped with login scripts or Group Policy.

Submit
94. What enables you to specify the sending parameters for fax transmissions, including cover pages and dialing rules?

Explanation

Outgoing fax-routing policies enable you to specify the sending parameters for fax transmissions, including cover pages and dialing rules.

Submit
95. What Windows Server 2008 feature stores universal group memberships on a local domain controller that can be used for logon to the domain, eliminating the need for frequent access to a global catalog server?

Explanation

For sites that do not have a global catalog server available, Windows Server 2008 offers a feature called universal group membership caching. This stores universal group memberships on a local domain controller that can be used for logon to the domain, eliminating the need for frequent access to a global catalog server.

Submit
96. What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?

Explanation

Prior to deploying smart cards, you must set up at least one computer as a smart card enrollment station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.

Submit
97. What signifies an object’s relative location within an Active Directory OU structure?

Explanation

The distinguished name of an object signifies its relative location within an Active Directory OU structure.

Submit
98. Users accessing the fax server must have an account created on what console?

Explanation

Users accessing the fax server must have an account created on the Fax Service Manager console.

Submit
99. Password-__________ is an attempt to discover a user’s password.

Explanation

Password-cracking is an attempt to discover a users password. Password-cracking tools are widely available on the Internet for download by even the least skilled attacker, and their ability to crack user passwords improves on almost a daily basis.

Submit
100. What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?

Explanation

Repadmin is a command-line tool used to manually create a replication topology if site link bridging is disabled if the network is not fully routed.

Submit
101. What is a partial copy of all objects from other domains within the same forest that is held on a global catalog server?

Explanation

The global catalog holds a subset of forest-wide Active Directory objects and acts as a central repository by holding a complete copy of all objects from the host server’s local domain with a partial copy of all objects from other domains within the same forest, called the partial attribute set (PAS). This partial copy of forest-wide data includes a subset of each object’s attributes. The attributes included in this subset are necessary to provide functionality such as logon, object searches, and universal group memberships.

Submit
102. Each class or attribute that you add to the schema should have a valid __________.

Explanation

Each class or attribute that you add to the schema should have a valid Object Identifier (OID). As part of the X.500 structure on which Active Directory is based, OIDs must be globally unique, and they are represented by a hierarchical dotted-decimal notation string.

Submit
103. Local GPOs support folder redirection and Group Policy software installation.

Explanation

Local GPOs do not support folder redirection and Group Policy software installation. These features are only available in Active Directory-based Group Policy Objects (GPOs). Local GPOs are limited to configuring security settings, auditing policies, and user rights assignments on a single computer.

Submit
104. What Windows Server 2008 role implements Internet Information Services (IIS) 7.0 as its core?

Explanation

The Web Server (IIS) role in Windows Server 2008 implements Internet Information Services 7.0 as its core. IIS 7 provides the basic Web server functionality that enables you to publish a standard Website on the Internet or on a private network.

Submit
105. What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?

Explanation

Prior to deploying smart cards, you must set up at least one computer as a smart card enrollment station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.

Submit
106. Read-Only Domain Controllers provide added security in the way passwords are stored through what feature?

Explanation

A key feature of an RODC is that each RODC can be configured with its own Password Replication Policy for security purposes.

Submit
107. Administration of an OU also can be delegated to a departmental supervisor or manager, and thus can allow that person to manage day-to-day resource access or more mundane tasks, such as resetting passwords. This is referred to as assignment of control.

Explanation

The statement is false because the correct term for allowing a departmental supervisor or manager to manage day-to-day resource access or mundane tasks is not "assignment of control," but rather "delegation of control."

Submit
108. What role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0?

Explanation

The Application Server role is essentially a superset of the Web Server (IIS) role that enables IIS to host Web services developed using environments such as Windows Communication Foundation (WCF) and .NET Framework 3.0.

Submit
109. Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?

Explanation

The Domain Naming Master role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest. When any of these is created, the Domain Naming Master ensures that the name assigned is unique to the forest.

Submit
110. What means that each policy must be read and applied completely before the next policy can be invoked?

Explanation

Synchronous processing of policies means that each policy must be read and applied completely before the next policy can be invoked. The default synchronous behavior can be modified by the system administrator if necessary, although such modification is discouraged.

Submit
111. What feature makes it possible to configure a user as the local administrator of a specific RODC without making the user a Domain Admins with far-reaching authority over all domain controllers in your entire domain and full access to your Active Directory domain data?

Explanation

Read-Only Domain Controllers also offer a feature that has been a top request of Active Directory administrators since the early days of Windows 2000: Admin Role Separation. This means that it is now possible to configure a user as the local administrator of a specific RODC without making the user a Domain Admins with far-reaching authority over all domain controllers in your entire domain and full access to your Active Directory domain data.

Submit
112. Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated __________ attack

Explanation

Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated dictionary attack. Automated password-cracking tools will try every possible combination of characters until the correct sequence of characters is finally discovered.

Submit
113. What protocol conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination?

Explanation

Windows Server 2008 DFS uses Remote Differential Compression (RDC), a protocol that conserves network bandwidth by detecting changes in files and transmitting only the modified data to the destination. This conserves bandwidth and greatly reduces the time needed for the replication process.

Submit
114. What policies work with folder redirection to provide the ability to cache files locally?

Explanation

Offline file storage works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible.

Submit
115. The KCC is responsible for calculating intrasite replication partners. During this process, what is the maximum number of hops that the KCC will allow between domain controllers?

Explanation

The KCC is responsible for calculating intrasite replication partners. During this process, the maximum number of hops that the KCC will allow between domain controllers is three.

Submit
116. If the domains within a forest are separated by slow WAN links and the tree-walking process takes an exceedingly long time to allow user authentication across domains, you can configure a __________ trust.

Explanation

If the domains within a forest are separated by slow WAN links and this tree-walking process takes an exceedingly long time to allow user authentication across domains, you can configure a shortcut trust along a commonly used “trust path.”

Submit
117. The roles provided by the Add Roles Wizard fall into three basic categories. Which of the following is NOT one of them?

Explanation

The three basic categories are Directory services, Infrastructure services, and Application services.

Submit
118. What is the name of the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership?

Explanation

The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership, is called the effective permissions for that element. Because a security principal can receive permissions from so many sources, it is not unusual for those permissions to conflict. Therefore, rules define how the permissions combine to form the effective permissions.

Submit
119. What process is responsible for selecting a bridgehead server and mapping the topology to be used for replication between sites?

Explanation

To create a replication topology in a multisite network, one domain controller within each site runs the Intersite Topology Generator (ISTG), which is a process responsible for selecting a bridgehead server and mapping the topology to be used for replication between sites.

Submit
120. All default groups are __________ groups.

Explanation

All default groups are security groups. Active Directory does not include any default distribution groups.

Submit
121. What can be measured by tangible benefits, such as implementation costs and ongoing support?

Explanation

Return on investment (ROI) can be measured by tangible benefits, such as implementation costs and ongoing support. In addition, it can be measured by intangible benefits, such as increased user productivity, and other factors that are difficult to measure from a financial standpoint. In financial terms, ROI is the amount of money gained (or lost) relative to the amount of money that was invested in a particular project or technology.

Submit
122. The device driver that converts the print jobs generated by applications into a string of commands for a specific print device is called a __________.

Explanation

A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features.

Submit
123.
Network File System (NFS) places the bulk of the file-sharing process on the __________.

Explanation

In NFS, the bulk of the file-sharing process rests on the client. Compared with the Windows SMB file-sharing system, NFS servers are relatively simple and, in technical terms, dumb. NFS servers simply respond to file access requests from clients; they do not maintain any information about the client connections or the files that individual clients have open.

Submit
124. Which of these roles is supported in Windows Server 2008 Server Core?

Explanation

The following roles are supported in Windows Server 2008 Server Core: Active Directory Domain Services, Active Directory Lightweight Directory Services, DHCP Server, DNS Server, File Services, Print Services, and Web Server (IIS).

Submit
125. What advanced technique allows you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups?

Explanation

An advanced technique, called security group filtering, will allow you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups.

Submit
126. What consists of a security principal and the specific permissions assigned to that security principal?

Explanation

Files, folders, shares, registry keys, and Active Directory objects are all protected by permissions. To store the permissions, each of these elements has an access control list (ACL). An ACL is a collection of individual permissions in the form of access control entries (ACEs). Each ACE consists of a security principal (that is, the name of the user, group, or computer granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are actually creating and modifying the ACEs in an ACL.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2008
    Quiz Created by
    Svolore
Cancel
  • All
    All (126)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Windows Server 2008 computers must run which protocol service to send...
After the printer processes a print job, it stores the job in a print...
You must install the File Services role to use the Distributed File...
What is a system of digital ...
__________ is the highest available forest functional level
Active Directory uses __________ ...
Passwords for Windows Server 2008, ...
What type of zone is necessary for ...
A __________ is an alphanumeric sequence ...
What contains the rules and definitions ...
Configuring role services as you install them saves time and effort...
LPD Services allows UNIX clients running the LPR program to send their...
To use ImageX.exe, you must boot the target computer to Windows PE and...
How many RID Masters can a domain have?
Local GPO settings are stored in what folder on a computer?
What processes can be used by Windows ...
What allows the Group Policy processing ...
Unlike virtual private network (VPN) or ...
A __________ is defined as one or more IP subnets that are connected...
The __________ Domain Controller ...
A password should be __________ characters in length to be considered...
What is an MMC console that provides a selection of the most commonly...
What is the process of replicating DNS information from one DNS server...
The default location for the Active Directory database and log files...
What typically consists of at least four ...
What command-line tool used for ...
__________ name refers to each user’s login name.
What command-line tool can be used with a standard user account to...
__________ name refers to each user’s login name.
What is the maximum basic volume size in Windows Server 2008?
Web servers receiving large amounts of ...
What type of trust relationship allows you to create two-way...
Standard permissions are actually ...
Group policy is divided into two subcategories, or nodes, that are...
Standard permissions are actually ...
Windows Server 2008 supports the UNIX and Linux file server clients...
You can manually modify the group membership of special identity...
For enterprise networks, creating workgroups is the recommended method...
To implement PKI, what must be installed on your Windows 2008 Server?
What allows a user to be able to log on ...
Windows Server 2008 supports the UNIX and Linux file server clients...
Windows Server 2008 supports numerous physical interfaces except for...
What command-line utility is used to import or export Active Directory...
What is a credit card–sized or ...
What port is used by Active Directory to direct search requests to a...
What role provides developers with the ...
What is the process of confirming a ...
What process applies Group Policy settings to various containers...
Which functional level only allows Windows Server 2003 and Windows...
The Default Domain Policy is linked to the Domain Controllers OU, and...
Inbound replication is when a domain controller transmits replication...
__________ groups are nonsecurity-related groups created for the...
The Domain Naming Master is responsible for managing changes to the...
Which of the following is not a type of user account that can be...
What mechanism enables administrators to ...
Which UNIX operating system protocol is used for file sharing?
The Default Domain Policy is linked to the Domain Controllers OU, and...
What allows businesses to define, ...
NTFS permissions are located on what tab of a file or folder’s...
What device driver converts the print ...
Which console includes several predefined quota templates that can be...
The Default Domain Policy is linked to the Domain Controllers OU, and...
What mechanism enables administrators to ...
What master database contains definitions of all objects in the Active...
Which FSMO role is responsible for reference updates from its domain...
A basic file server uses remotely attached storage, that is, a...
What directory object includes subcontainers that hold GPO policy...
You cannot manually modify the group membership of or view the...
What can be used to add, delete, or modify objects in Active...
When configuring a site link object, which attribute allows the...
What role does Windows Server 2008 include that enables users to send...
What type of trust allows you to ...
What is the process of confirming that ...
Windows Server 2008 Web Edition does not support what role?
Which FSMO role is responsible for reference updates from its domain...
Replication groups use which topology to limit the replication traffic...
What lookup service maintains a list of ...
__________ groups are a collection of user accounts that are local to...
What signifies an object’s relative location within an Active...
What command-line tool is used to ...
What role service of the Print Services ...
Which of the following is not a type of GPO?
What is the path to the default GPT structure for a domain?
The guiding principle involved in the ...
The ISTG automatically assigns one ...
When deploying a server using a WDS installation, the client downloads...
The __________ Policy is linked to the domain, and its settings affect...
What type of trust is new to Windows ...
What standardized, highly portable print ...
What is a mechanism that individual ...
What component issues and manages certificates for individuals,...
Aging is the process of removing records ...
Drive letters can be mapped with logon scripts or with __________.
What enables you to specify the sending parameters for fax...
What Windows Server 2008 feature stores ...
What dedicated workstation allows an ...
What signifies an object’s relative location within an Active...
Users accessing the fax server must have an account created on what...
Password-__________ is an attempt to discover a user’s password.
What command-line tool can be used to ...
What is a partial copy of all objects from other domains within the...
Each class or attribute that you add to the schema should have a valid...
Local GPOs support folder redirection and Group Policy software...
What Windows Server 2008 role implements Internet Information Services...
What dedicated workstation allows an ...
Read-Only Domain Controllers provide added security in the way...
Administration of an OU also can be ...
What role is essentially a superset of ...
Which FSMO role has the authority to ...
What means that each policy must be read and applied completely before...
What feature makes it possible to ...
Password-cracking can be accomplished by ...
What protocol conserves network ...
What policies work with folder redirection to provide the ability to...
The KCC is responsible for calculating ...
If the domains within a forest are ...
The roles provided by the Add Roles Wizard fall into three basic...
What is the name of the combination of ...
What process is responsible for selecting a bridgehead server and...
All default groups are __________ groups.
What can be measured by tangible benefits, such as implementation...
The device driver that converts the ...
Network File System (NFS) places the bulk of the file-sharing process...
Which of these roles is supported in Windows Server 2008 Server Core?
What advanced technique allows you to ...
What consists of a security principal and the specific permissions...
Alert!

Advertisement