Network Services

105 Questions | Attempts: 239
Please wait...
Question 1 / 106
🏆 Rank #--
Score 0/100

1. What shared folder exists on all domain controllers and is used to store Group Policy objects  login scripts and other files that are replicated domain-wide ?

Submit
Please wait...
About This Quiz
Network Quizzes & Trivia

Within networking, there are different types and a wide variety of services offered which are mainly based on the section and aspect of networking done. Take up the quiz and gauge your knowledge. All the best.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources .

Submit

3. Where is the certificate database located on a Certification Authority ?

Submit

4. Microsoft windows Server 2008 uses the WIndows Installer with group policy to install  and manage software that is packages into what type of file ?

Submit

5. Active Directory uses trust relationships to allow access between multiple domains and /or forests either within a single forest or across multiple enterprises

Submit

6.         files are used to apply service packs and hotfixes to installed software .

Submit

7. What policies are designed to identify software and control its execution ?

Submit

8. Windows server 2008 is the highest available forest functional

Submit

9. What protocol has become an industry standard that enables data exchanges between directory services and applications ?

Submit

10. What new Windows Server 2008 feature is a special installation option that creates a minimal  environment for running only specific services and roles ?

Submit

11. What typically consists of a least four characters or digits that are entered while presenting a physical access token ,such as an ATM card or smart card ?

Submit

12. The largest container object within Active Directory is a forest

Submit

13. What contains the rules and definitions that are used for creating and modifying object classes and attributes with Active Directory

Submit

14. What command can you use to run the Active Directory Installation Wizard ?

Submit

15. What process can be used by windows server 2008 DNS to clean up the DNS database after DNS records become "stale " or out of date ?

Submit

16. When you install the forest root domain controller in an Active Directory forest the Active DIrectory Installation Wizard creates a single site named

Submit

17. Certain operations such as password change or an account lockout. will be transmitted by using  replication which means that the change will be placed at the "beginning of hte line and applied before any other  changes that are waiting to be replicated.

Submit

18.  groups are a collection of user accounts that are local to one specifci workstation or member server

Submit

19. What locator records within DNS  allow clients to locate an Active Directory domain controller or global catalog

Submit

20. Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network ?

Submit

21. The process of keeping each domain controller in synch with changes that has been made elsewhere on the network is called

Submit

22. A site is defined as one or more IP subnets that are connected by fast links

Submit

23. Which of the following is a benefit of implementing a public key infrastructure (PKI)

Submit

24. What command line  tool can be used with a standard user account to reduce the risks associated with the Administrator account?

Submit

25. What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels ?

Submit

26. For both intrasite and intersite  replication what protocol does Active Directory use for all replication traffic ?

Submit

27. What method of authentication requires a smart card and a PIN to provide more secure access to company resources ?

Submit

28. What mmc snap in provides a single access point to all aspects of group policy that were previously spread across other tools such as Active Directory  Users and Computers ,Active Directory sites and services .Resultant set of policy and the group policy  management  editor ?

Submit

29. Which of the following can be done from the Group Policy Management snap in ?

Submit

30. When replicating information between sites Active Directory will designate a   server in each site to act as a gatekeeper in managing site to site replication

Submit

31. What is the process of confirming a user's identity by using a known value such as a password pin number on a smart card, or user's fingerprint  or user's fingerprint in the case of biometric authentication ?

Submit

32. What command line utility is used to import or export Active Directory information from a comma-separated value (.csv) file

Submit

33. Password           is  an attempt to discover a users password

Submit

34. The primary goal of intersite replication is to mimimize the usage  of

Submit

35. What option allows users to install the applications that they consider useful to them ?

Submit

36. What option is helpful when you are deploying required applications to pertinent users and computers ?

Submit

37. What type of trust is new to windows server 2008 and is only available when the forest functionality is set to windows Server 2008

Submit

38. Active Directory  sites provide the means by which administrators can control replication traffic

Submit

39. What describes the amount of time that it takes for all domain controllers in the environment  to contain the most up to date information

Submit

40. Which Ou is created by Default when Active Directory  is installed ?

Submit

41. Group policy management started  being natively installed with what version  of windows server ?

Submit

42. Domain controllers located in different sites will participate  in           replication

Submit

43. What tool is used to seize a FSMO role ?

Submit

44. What utility is used to manually create trust relationships

Submit

45. What holds a subset of forest wide Active Directory objects and acts as a central repository by holding a complete copy of all objects from the host server local domain with a partial copy of all objects from other domains within the same forest ?

Submit

46. When a user logs on what is created that identifies the user and all of the user's group memberships ?

Submit

47. What special identify group contains all authenticated users  and domain guests ?

Submit

48. What tool allows you to utilize a simple interface to delegate permissons for domains ,OUs or containers ?

Submit

49. Password cracking can be accomplised by intelligent  guessing  on the part  of the hacker or through the use of an automated       attack

Submit

50. The read only domain controller contains a copy of the ntds.dit file that cannot be modified and does not replicate  its changes to other domain controllers within Active DIrectory

Submit

51. What is used to uniquely identify an object throughout the Active directory domain ?

Submit

52. What is a system of digital certificates ,certification authorities (CAs) and other registration authorities (RAs) that verify and  authenticate the validity of each party involved in an electronic transaction through the use of  public key cryptography?

Submit

53. What component issues and manages certificates for individuals ,computers and organizations ?

Submit

54. Active Directory creates a   with the idea that all writeable domain controllers in a domain should  communicate Active Directory  information to each other in addition to communicating  forest-wide informaton with other domains

Submit

55. The two built in user accounts that are created on a windows server 2008 computer are the Administrator account and the   account

Submit

56. What allows  published applications to be organized within specfic  groupings for easy navigation ?

Submit

57. A window Server 2008 computer that has been configured with the Active Directory DS role  is referred to as

Submit

58. Before deploying software using Group Policy what must you create ?

Submit

59. What identifies software by specifying the directory path where the application is stored in the file system ?

Submit

60. Which of the following is not a function performed by a global catalog server ?

Submit

61. What windows Server 2008 feature stores universal group memberships on a local domain controller that can be used for logon to the domain eliminating the need for frequent access to a global  catalog server ?

Submit

62. What types of memberships are stored in the global catalog?

Submit

63. What can be used to add ,delete or modify objects in Active Directory, in addition to modifying the schema if necessary ?

Submit

64. To implement PKI what must be installed on your Windows 2008 Server ?

Submit

65. Which mode in the Resultant set of  Policy wizard is useful for documenting and understanding how combined policies are affecting users and computers ?

Submit

66. What command line tool is used to create delete  ,verify, and reset trust relationships from the windows server 2008 command line ?

Submit

67. What describes the process of configuring one or more groups as members of another group ?

Submit

68. You cannot manually modify the group membershp of or view the membership lists of groups

Submit

69. What is a credit card sized or token style ,such as USB device that is used with a PIN to enable  logon to the enterprise?

Submit

70. WMI filters cannot be evaluated on which operating system?

Submit

71. Which FSMO role has the authority to manage the creation and deletion of domains,domain trees,and application data partitions in the forest ?

Submit

72.                       name refers to each users login name

Submit

73. When configuring software restriction policies which option prevents any application from running that requires  administrative rights ,but allows programs  to run that only require resources  that are accesible by normal users ?

Submit

74. By default,the software restriction policies  area has what value in the default  security level settings?

Submit

75. What SRV record information serves as a mechanism to set up load balancing between multiple servers that are advertising the same SRV records ?

Submit

76. What is a partial copy of all objects from other domains within the same forest that is held on a global catalog server

Submit

77. Which of these design aspects should you consider when planning the appropriate location of FSMO role holders

Submit

78. Read only domain  controllers provide added security in the way  passwords that are stored through what feature ?

Submit

79. What console must be used to move the domain Naming Master FSMO role ?

Submit

80. Mofications to .ms files requier transform files which have the   extension

Submit

81. What process is responsible for selecting a bridgehead server and mapping the topology to be  used for replication between sites ?

Submit

82. What allows businesses to define ,manage,access and secure network resources including fles,printers ,people and applications ?

Submit

83. What is the process of replicating DNS information from one DNS server to another ?

Submit

84. What type of rule can be applied to allow only windows installer packages to be installed if they come from a trusted area of the network

Submit

85. Which FSMO role is responsible for reference updates from its domain objects to other domains ?

Submit

86. What type of file can be written to allow non-windows Installer compliant applicatons to be deployed ?

Submit

87. When a GPO is selected in Group policy management which tab allows administrators to view  the locations to which the policy is linked?

Submit

88. What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation

Submit

89. What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources ?

Submit

90. What is a series of bytes with a fixed length that uniquely identifies a program or  file ?

Submit

91. When implementing multiple software restriction policy rules which rule is always applied last ?

Submit

92. What software restriction policy properties allow  you to determine whether the policies apply to all files or whether library files ,such as Dynamic Link Library DLL are excluded

Submit

93. Group policy    is used to simulate the effect of a poicy on the user environment

Submit

94. What special identity group is used as a reduced privilege account to allow applications to run on a server without requiring administrative access ?

Submit

95.      Gpos can act as templates when creating new GPOs for your organization

Submit

96. What special identity group is used by the system to allow permissons to protected system files for services to function properly ?

Submit

97. What defines a chain of site links by which domain controllers from different sites can communicate ?

Submit

98. What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role

Submit

99. What refines the application of a GPO to include or exclude certains users ,groups, or computers  based on the ACL that is applied to the GPO?

Submit

100. Which of the following is not a type of user account that can be configured in Windows Server 2008 ?

Submit

101. When a GPO is selected in group policy management which tab allows administrators to view the locations to which the policy is linked ?

Submit

102. What component of the microsoft windows operating system allows administrators  to create queries based on hardware,software,operating system and services?

Submit

103. What software restriction policy properties allow an administrator to control how certificate rules are handled ?

Submit

104. Rather than simulating policy effects like the group policy modeling wizard what obtains RSop information  from the client computer to show the actual effects that policies have on the client computer and user environment

Submit

105. Which tab displays groups and users with permission to link ,perform modeling analyses or read group policy results information ?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (105)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What shared folder exists on all domain controllers and is used to...
What is the process of confirming that an authenticated user has the...
Where is the certificate database located on a Certification Authority...
Microsoft windows Server 2008 uses the WIndows Installer with group...
Active Directory uses trust relationships to allow access between...
        files are used to apply...
What policies are designed to identify software and control its...
Windows server 2008 is the highest available forest functional
What protocol has become an industry standard that enables data...
What new Windows Server 2008 feature is a special installation option...
What typically consists of a least four characters or digits that are...
The largest container object within Active Directory is a forest
What contains the rules and definitions that are used for creating and...
What command can you use to run the Active Directory Installation...
What process can be used by windows server 2008 DNS to clean up the...
When you install the forest root domain controller in an Active...
Certain operations such as password change or an account lockout. will...
 groups are a collection of user accounts that are local to one...
What locator records within DNS  allow clients to locate an...
Which of the following is a software restriction rule that can be used...
The process of keeping each domain controller in synch with changes...
A site is defined as one or more IP subnets that are connected by fast...
Which of the following is a benefit of implementing a public key...
What command line  tool can be used with a standard user account...
What setting will prevent policy settings from applying to all child...
For both intrasite and intersite  replication what protocol does...
What method of authentication requires a smart card and a PIN to...
What mmc snap in provides a single access point to all aspects of...
Which of the following can be done from the Group Policy Management...
When replicating information between sites Active Directory will...
What is the process of confirming a user's identity by using a known...
What command line utility is used to import or export Active Directory...
Password          ...
The primary goal of intersite replication is to mimimize the...
What option allows users to install the applications that they...
What option is helpful when you are deploying required applications to...
What type of trust is new to windows server 2008 and is only available...
Active Directory  sites provide the means by which administrators...
What describes the amount of time that it takes for all domain...
Which Ou is created by Default when Active Directory  is...
Group policy management started  being natively installed with...
Domain controllers located in different sites will participate ...
What tool is used to seize a FSMO role ?
What utility is used to manually create trust relationships
What holds a subset of forest wide Active Directory objects and acts...
When a user logs on what is created that identifies the user and all...
What special identify group contains all authenticated users  and...
What tool allows you to utilize a simple interface to delegate...
Password cracking can be accomplised by intelligent ...
The read only domain controller contains a copy of the ntds.dit file...
What is used to uniquely identify an object throughout the Active...
What is a system of digital certificates ,certification authorities...
What component issues and manages certificates for individuals...
Active Directory creates a   with the idea that all...
The two built in user accounts that are created on a windows server...
What allows  published applications to be organized within...
A window Server 2008 computer that has been configured with the Active...
Before deploying software using Group Policy what must you create ?
What identifies software by specifying the directory path where the...
Which of the following is not a function performed by a global catalog...
What windows Server 2008 feature stores universal group memberships on...
What types of memberships are stored in the global catalog?
What can be used to add ,delete or modify objects in Active Directory,...
To implement PKI what must be installed on your Windows 2008 Server ?
Which mode in the Resultant set of  Policy wizard is useful for...
What command line tool is used to create delete  ,verify, and...
What describes the process of configuring one or more groups as...
You cannot manually modify the group membershp of or view the...
What is a credit card sized or token style ,such as USB device that is...
WMI filters cannot be evaluated on which operating system?
Which FSMO role has the authority to manage the creation and deletion...
                     ...
When configuring software restriction policies which option prevents...
By default,the software restriction policies  area has what value...
What SRV record information serves as a mechanism to set up load...
What is a partial copy of all objects from other domains within the...
Which of these design aspects should you consider when planning the...
Read only domain  controllers provide added security in the...
What console must be used to move the domain Naming Master FSMO role ?
Mofications to .ms files requier transform files which have...
What process is responsible for selecting a bridgehead server and...
What allows businesses to define ,manage,access and secure network...
What is the process of replicating DNS information from one DNS server...
What type of rule can be applied to allow only windows installer...
Which FSMO role is responsible for reference updates from its domain...
What type of file can be written to allow non-windows Installer...
When a GPO is selected in Group policy management which tab allows...
What allows a user to be able to log on using a cached copy of his or...
What is the process of confirming that an authenticated user has the...
What is a series of bytes with a fixed length that uniquely identifies...
When implementing multiple software restriction policy rules which...
What software restriction policy properties allow  you to...
Group policy    is used to simulate the effect of a...
What special identity group is used as a reduced privilege account to...
     Gpos can act as templates when creating new...
What special identity group is used by the system to allow permissons...
What defines a chain of site links by which domain controllers from...
What procedure is used only when you have experienced a catastrophic...
What refines the application of a GPO to include or exclude certains...
Which of the following is not a type of user account that can be...
When a GPO is selected in group policy management which tab allows...
What component of the microsoft windows operating system allows...
What software restriction policy properties allow an administrator to...
Rather than simulating policy effects like the group policy modeling...
Which tab displays groups and users with permission to link ,perform...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!