MS Server 2008 Quiz 9

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,234
| Attempts: 961
SettingsSettings
Please wait...
  • 1/126 Questions

    Windows Server 2008 computers must run which protocol service to send email messages?

    • Email Router Protocol (ERP)
    • Default Email Protocol (DEP)
    • Simple Mail Transfer Protocol (SMTP)
    • Simple Modem Target Protocol (SMTP)
Please wait...
Windows Server 2008 Quizzes & Trivia
About This Quiz

This quiz tests knowledge on various aspects of Windows Server 2008, including Active Directory, File Services, Print Services, and Terminal Services.


Quiz Preview

  • 2. 

    After the printer processes a print job, it stores the job in a print queue that is known as a __________.

    • Snap-in

    • Spooler

    • Driver

    • Device

    Correct Answer
    A. Spooler
    Explanation
    After the printer processes a print job, it stores the job in a print queue, known as a spooler.

    Rate this question:

  • 3. 

    You must install the File Services role to use the Distributed File System.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    To use the Distributed File System (DFS), it is necessary to install the File Services role. DFS is a feature in Windows Server that allows users to access and manage files across a network. By installing the File Services role, the server gains the capability to provide DFS functionalities such as file replication, load balancing, and fault tolerance. Therefore, the statement "You must install the File Services role to use the Distributed File System" is true.

    Rate this question:

  • 4. 

    __________ is the highest available forest functional level

    • Windows 2000

    • Windows Server 2003

    • Windows Server 2008

    • Windows 2009

    Correct Answer
    A. Windows Server 2008
    Explanation
    The Windows Server 2008 functional level allows no backward compatibility. Only Windows Server 2008 domain controllers are supported.

    Rate this question:

  • 5. 

    What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?

    • CKI

    • PKI

    • DKI

    • PCI

    Correct Answer
    A. PKI
    Explanation
    Smart cards contain a chip that stores user information such as the user’s private key for certificate-related services; user credentials, such as the username; and a public key certificate. This requires the implementation of a public key infrastructure (PKI). PKI is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography.

    Rate this question:

  • 6. 

    Active Directory uses __________ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks.

    • Trust

    • Domain

    • Forest

    • Global

    Correct Answer
    A. Trust
    Explanation
    Active Directory uses trust relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks. As the name implies, a trust relationship allows administrators from a particular domain to grant access to their domain’s resources to users in other domains.

    Rate this question:

  • 7. 

    Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.

    • 97

    • 68

    • 127

    • 142

    Correct Answer
    A. 127
    Explanation
    Windows passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length.

    Rate this question:

  • 8. 

    A __________ is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource.

    • PIN

    • Password

    • SecureID

    • Biometric

    Correct Answer
    A. Password
    Explanation
    A password is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource. The primary function of a password is to protect a user’s authentication information, thus ensuring that no one can impersonate a particular user and thereby gain access to resources that the user has been authorized to view or edit.

    Rate this question:

  • 9. 

    What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

    • Primary lookup

    • Secondary lookup

    • Forward lookup

    • Reverse lookup

    Correct Answer
    A. Forward lookup
    Explanation
    Forward lookup zones are necessary for computer hostname–to–IP address mappings, which are used for name resolution by a variety of services. For example, when a user requests access to a server based on its hostname, the request is passed to a DNS server to resolve the hostname to an IP address. Most queries are based on forward lookups.

    Rate this question:

  • 10. 

    Configuring role services as you install them saves time and effort later.

    • True

    • False

    Correct Answer
    A. True
  • 11. 

    LPD Services allows UNIX clients running the LPR program to send their print jobs to Windows printers.

    • True

    • False

    Correct Answer
    A. True
  • 12. 

    To use ImageX.exe, you must boot the target computer to Windows PE and run the tool from the command line.

    • True

    • False

    Correct Answer
    A. True
  • 13. 

    What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?

    • Configuration NC

    • Schema NC

    • Domain NC

    • DC NC

    Correct Answer
    A. Schema NC
    Explanation
    The schema partition, or Schema NC, contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory.

    Rate this question:

  • 14. 

    How many RID Masters can a domain have?

    • 1

    • 2

    • 3

    • 5

    Correct Answer
    A. 1
    Explanation
    Each domain can have only one RID Master.

    Rate this question:

  • 15. 

    What processes can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date?

    • Searching and destroying

    • Aging and scavenging

    • Seeking and removing

    • Finding and deleting

    Correct Answer
    A. Aging and scavenging
    Explanation
    Although not enabled by default, aging and scavenging are processes that can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date. Without this process, the DNS database would require manual maintenance to prevent server performance degradation and potential disk-space issues.

    Rate this question:

  • 16. 

    What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?

    • Reverse Processing

    • Switchback Processing

    • Loopback Processing

    • Repeat Processing

    Correct Answer
    A. Loopback Processing
    Explanation
    Loopback processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace.

    Rate this question:

  • 17. 

    Local GPO settings are stored in what folder on a computer?

    • %systemroot%/System32/GroupPolicy

    • %systemroot%/System32/Drivers/GroupPolicy

    • %systemroot%/System32/Drivers/Etc/GroupPolicy

    • %systemroot%/System/GroupPolicy

    Correct Answer
    A. %systemroot%/System32/GroupPolicy
    Explanation
    Each computer running Windows Server 2008, Windows Server 2003, Windows XP Professional, or Windows 2000 has only one local GPO, and the settings in that local GPO will apply to all users who log on to the computer. The local GPO settings are stored on the local computer in the %systemroot%/System32/GroupPolicy folder.

    Rate this question:

  • 18. 

    Unlike virtual private network (VPN) or direct dial-up connections, a Terminal Services connection uses relatively little network bandwidth because the applications are running on the server computer.

    • True

    • False

    Correct Answer
    A. True
  • 19. 

    A __________ is defined as one or more IP subnets that are connected by fast links.

    • Domain

    • Network

    • Site

    • Forest

    Correct Answer
    A. Site
    Explanation
    A site is defined as one or more IP subnets that are connected by fast links. In most circumstances, all computers that are connected via a single LAN will constitute a single site. Within Active Directory, sites are used to optimize the replication of Active Directory information across small or large geographic areas.

    Rate this question:

  • 20. 

    The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory.

    • Secondary

    • Primary

    • Read-Only

    • Mandatory

    Correct Answer
    A. Read-Only
    Explanation
    Windows Server 2008 introduces the Read-Only Domain Controller (RODC), a domain controller that contains a copy of the ntds.dit file that cannot be modified and that does not replicate its changes to other domain controllers within Active Directory.

    Rate this question:

  • 21. 

    What is the process of replicating DNS information from one DNS server to another?

    • Replication

    • DNS push

    • Zone transfer

    • DNS update

    Correct Answer
    A. Zone transfer
    Explanation
    A zone transfer is the process of replicating DNS information from one DNS server to another.

    Rate this question:

  • 22. 

    A password should be __________ characters in length to be considered a strong password.

    • 6

    • 10

    • 12

    • 8

    Correct Answer
    A. 8
    Explanation
    A strong password has the following characteristics: at least eight characters in length; contains uppercase and lowercase letters, numbers, and nonalphabetic characters; at least one character from each of the previous character types; and differs significantly from other previously used passwords.

    Rate this question:

  • 23. 

    What is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools?

    • Role Manager

    • Server Manager

    • Add Role Wizard

    • Server Role Administration

    Correct Answer
    A. Server Manager
    Explanation
    Server Manager is an MMC console that provides a selection of the most commonly used Windows Server 2008 management tools.

    Rate this question:

  • 24. 

    The default location for the Active Directory database and log files is C:\Windows\System32.

    • True

    • False

    Correct Answer
    A. False
  • 25. 

    What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivty and replication tests?

    • Dcdiag

    • Netdiag

    • Dcpromo

    • Netstat

    Correct Answer
    A. Dcdiag
    Explanation
    Dcdiag is a command-line tool used for monitoring Active Directory. When run from a command prompt, this tool can perform connectivity and replication tests, report errors that occur, report DNS registration problems, analyze the permissions required for replication, and analyze the state of domain controllers within the forest.

    Rate this question:

  • 26. 

    __________ name refers to each user’s login name.

    • Common

    • Distinguished

    • SAM account

    • AD Name

    Correct Answer
    A. SAM account
    Explanation
    The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.

    Rate this question:

  • 27. 

    What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?

    • Runas

    • Su

    • Runadmin

    • Launchas

    Correct Answer
    A. Runas
    Explanation
    The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and use the Run as administrator option in the GUI or the runas command-line tool when it is necessary to perform an administrative task.

    Rate this question:

  • 28. 

    What typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or smart card?

    • Password

    • PIN

    • Smart card

    • RSA SmartID

    Correct Answer
    A. PIN
    Explanation
    Passwords and personal identification numbers (PINs) are becoming common in many areas of life including banking, email, voice mail, and keyless entry systems, such as garage door openers. A PIN typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or a smart card.

    Rate this question:

  • 29. 

    What is the maximum basic volume size in Windows Server 2008?

    • 100 GB

    • 1 TB

    • 2 TB

    • 5 TB

    Correct Answer
    A. 2 TB
    Explanation
    The maximum basic volume size in Windows Server 2008 is 2 terabytes.

    Rate this question:

  • 30. 

    Web servers receiving large amounts of traffic will not need higher-end network adapters or multiple adapters to connect to different subnets.

    • True

    • False

    Correct Answer
    A. False
  • 31. 

    What type of trust relationship allows you to create two-way transitive trusts between separate forests?

    • Shortcut

    • Cross-forest

    • External

    • Real

    Correct Answer
    A. Cross-forest
    Explanation
    Cross-forest trust relationships were introduced in Windows Server 2003; they allow you to create two-way transitive trusts between separate forests.

    Rate this question:

  • 32. 

    __________ name refers to each user’s login name.

    • Common

    • Distinguished

    • SAM account

    • AD Name

    Correct Answer
    A. SAM account
    Explanation
    The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.

    Rate this question:

  • 33. 

    Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).

    • True

    • False

    Correct Answer
    A. False
  • 34. 

    You can manually modify the group membership of special identity groups, but you cannot view their membership lists.

    • True

    • False

    Correct Answer
    A. False
  • 35. 

    Standard permissions are actually combinations of what other type of permissions, which provide the most granular control over the element?

    • Extended permissions

    • Altered permissions

    • Special permissions

    • Granular permissions

    Correct Answer
    A. Special permissions
    Explanation
    When you open the Properties dialog box for a system element and look at its Security tab, the NTFS permissions you see are called standard permissions. Standard permissions are actually combinations of special permissions that provide the most granular control over the element.

    Rate this question:

  • 36. 

    Group policy is divided into two subcategories, or nodes, that are named Computer Configuration and __________.

    • Network Configuration

    • Security Configuration

    • User Configuration

    • Domain Configuration

    Correct Answer
    A. User Configuration
    Explanation
    Configuring Group Policy settings enables you to customize the configuration of a user’s desktop, environment, and security settings. The actual settings are divided into two subcategories: Computer Configuration and User Configuration. The subcategories are referred to as Group Policy nodes. A node is simply a parent structure that holds all related settings. In this case, the node is specific to computer configurations and user configurations.

    Rate this question:

  • 37. 

    Standard permissions are actually combinations of what other type of permissions, which provide the most granular control over the element?

    • Extended permissions

    • Altered permissions

    • Special permissions

    • Granular permissions

    Correct Answer
    A. Special permissions
    Explanation
    When you open the Properties dialog box for a system element and look at its Security tab, the NTFS permissions you see are called standard permissions. Standard permissions are actually combinations of special permissions that provide the most granular control over the element.

    Rate this question:

  • 38. 

    Windows Server 2008 supports numerous physical interfaces except for which interface?

    • Universal Serial Bus (USB)

    • Infrared Data Access (IrDA)

    • VGA

    • Bluetooth ports

    Correct Answer
    A. VGA
    Explanation
    Windows Server 2008 supports numerous physical interfaces, including Universal Serial bus (USB), IEEE 1394 (FireWire), parallel (LPT), serial (COM), Infrared Data Access (IrDA), Bluetooth ports, and network printing services such as lpr, Internet Printing Protocol (IPP), and standard TCP/IP ports.

    Rate this question:

  • 39. 

    What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?

    • NETDIAG

    • NSLOOKUP

    • CSVDE

    • DCPROMO

    Correct Answer
    A. CSVDE
    Explanation
    The Comma-Separated Value Directory Exchange (CSVDE) command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file. These files can be created in any text editor. This command-line utility only imports or exports new objects; it cannot modify or delete existing objects.

    Rate this question:

  • 40. 

    What is a credit card–sized or token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise?

    • RSA SecureID

    • Password token

    • Smart chip

    • Smart card

    Correct Answer
    A. Smart card
    Explanation
    A smart card is a credit card-sized device or a token-style device, such as a USB device, that is used with a PIN to enable logon to the enterprise.

    Rate this question:

  • 41. 

    For enterprise networks, creating workgroups is the recommended method for managing quota assignments on a large scale.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Creating workgroups is not the recommended method for managing quota assignments on a large scale in enterprise networks. Instead, enterprise networks typically use more advanced methods such as directory services or centralized management tools to manage quota assignments efficiently and effectively. Workgroups are generally used in smaller, less complex environments where centralized management is not necessary.

    Rate this question:

  • 42. 

    To implement PKI, what must be installed on your Windows 2008 Server?

    • Active Directory Users and Computers

    • Microsoft AdminPak

    • Active Directory Certificate Services

    • Microsoft Advanced Security Pack

    Correct Answer
    A. Active Directory Certificate Services
    Explanation
    PKI requires you to install Active Directory Certificate Services in your Windows Server 2008 environment. Active Directory Certificate Services is a server role available in Windows Server 2008 that allows you to create and administer PKI certificates for your users, computers, and applications.

    Rate this question:

  • 43. 

    What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation?

    • Cached login

    • Cached credentials

    • Stored login

    • Stored credentials

    Correct Answer
    A. Cached credentials
    Explanation
    If the user has successfully logged on in the past and you have enabled cached credentials in your environment, a user will be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation.

    Rate this question:

  • 44. 

    Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).

    • True

    • False

    Correct Answer
    A. False
    Explanation
    Windows Server 2008 does not support UNIX and Linux file server clients with Server Message Blocks (SMB).

    Rate this question:

  • 45. 

    What port is used by Active Directory to direct search requests to a global catalog server?

    • 3629

    • 3389

    • 3268

    • 3232

    Correct Answer
    A. 3268
    Explanation
    When a user initiates a search for an object in Active Directory, the request is automatically sent to TCP port 3268, which is used by Active Directory to direct these requests to a global catalog server. One of the SRV records used by Active Directory refers to the global catalog, or _gc, service, which listens on port 3268 to respond to these requests.

    Rate this question:

  • 46. 

    What role provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications?

    • AD LSD

    • AD SLD

    • AD DLS

    • AD LDS

    Correct Answer
    A. AD LDS
    Explanation
    Windows Server 2008 includes a new Active Directory Lightweight Directory Services (AD LDS) role that provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications.

    Rate this question:

  • 47. 

    Which functional level only allows Windows Server 2003 and Windows 2008 domain controllers?

    • Windows 2000 Native

    • Windows Server 2003

    • Windows Server 2008

    • Windows 2003 Mixed

    Correct Answer
    A. Windows Server 2003
    Explanation
    The Windows Server 2003 functional level allows Windows Server 2003 and Windows 2008 domain controllers only. It does not allow the presence of Windows 2000 domain controllers.

    Rate this question:

  • 48. 

    What is the process of confirming a user’s identity by using a known value, such as a password, pin number on a smart card, or user’s fingerprint or handprint in the case of biometric authentication?

    • Authorization

    • Authentication

    • Administration

    • Allocation

    Correct Answer
    A. Authentication
    Explanation
    Authentication is the process of confirming a user’s identity using a known value such as a password, the pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication.

    Rate this question:

  • 49. 

    What process applies Group Policy settings to various containers within Active Directory?

    • Attaching

    • Linking

    • Connecting

    • Nesting

    Correct Answer
    A. Linking
    Explanation
    You can configure one or more GPOs within a domain and then use a process called linking, which applies these settings to various containers within Active Directory. You can link multiple GPOs to a single container or link one GPO to multiple containers throughout the Active Directory structure.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2008
    Quiz Created by
    Svolore
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.