What shared folder exists on all domain controllers and is used to...
What is the process of confirming that an authenticated user has the...
Where is the certificate database located on a Certification Authority...
Microsoft windows Server 2008 uses the WIndows Installer with group...
Active Directory uses trust relationships to allow access between...
files are used to apply...
What policies are designed to identify software and control its...
Windows server 2008 is the highest available forest functional
What protocol has become an industry standard that enables data...
What new Windows Server 2008 feature is a special installation option...
What typically consists of a least four characters or digits that are...
The largest container object within Active Directory is a forest
What contains the rules and definitions that are used for creating and...
What command can you use to run the Active Directory Installation...
What process can be used by windows server 2008 DNS to clean up the...
When you install the forest root domain controller in an Active...
Certain operations such as password change or an account lockout. will...
groups are a collection of user accounts that are local to one...
What locator records within DNS allow clients to locate an...
Which of the following is a software restriction rule that can be used...
The process of keeping each domain controller in synch with changes...
A site is defined as one or more IP subnets that are connected by fast...
Which of the following is a benefit of implementing a public key...
What command line tool can be used with a standard user account...
What setting will prevent policy settings from applying to all child...
For both intrasite and intersite replication what protocol does...
What method of authentication requires a smart card and a PIN to...
What mmc snap in provides a single access point to all aspects of...
Which of the following can be done from the Group Policy Management...
When replicating information between sites Active Directory will...
What is the process of confirming a user's identity by using a known...
What command line utility is used to import or export Active Directory...
Password ...
The primary goal of intersite replication is to mimimize the...
What option allows users to install the applications that they...
What option is helpful when you are deploying required applications to...
What type of trust is new to windows server 2008 and is only available...
Active Directory sites provide the means by which administrators...
What describes the amount of time that it takes for all domain...
Which Ou is created by Default when Active Directory is...
Group policy management started being natively installed with...
Domain controllers located in different sites will participate ...
What tool is used to seize a FSMO role ?
What utility is used to manually create trust relationships
What holds a subset of forest wide Active Directory objects and acts...
When a user logs on what is created that identifies the user and all...
What special identify group contains all authenticated users and...
What tool allows you to utilize a simple interface to delegate...
Password cracking can be accomplised by intelligent ...
The read only domain controller contains a copy of the ntds.dit file...
What is used to uniquely identify an object throughout the Active...
What is a system of digital certificates ,certification authorities...
What component issues and manages certificates for individuals...
Active Directory creates a with the idea that all...
The two built in user accounts that are created on a windows server...
What allows published applications to be organized within...
A window Server 2008 computer that has been configured with the Active...
Before deploying software using Group Policy what must you create ?
What identifies software by specifying the directory path where the...
Which of the following is not a function performed by a global catalog...
What windows Server 2008 feature stores universal group memberships on...
What types of memberships are stored in the global catalog?
What can be used to add ,delete or modify objects in Active Directory,...
To implement PKI what must be installed on your Windows 2008 Server ?
Which mode in the Resultant set of Policy wizard is useful for...
What command line tool is used to create delete ,verify, and...
What describes the process of configuring one or more groups as...
You cannot manually modify the group membershp of or view the...
What is a credit card sized or token style ,such as USB device that is...
WMI filters cannot be evaluated on which operating system?
Which FSMO role has the authority to manage the creation and deletion...
...
When configuring software restriction policies which option prevents...
By default,the software restriction policies area has what value...
What SRV record information serves as a mechanism to set up load...
What is a partial copy of all objects from other domains within the...
Which of these design aspects should you consider when planning the...
Read only domain controllers provide added security in the...
What console must be used to move the domain Naming Master FSMO role ?
Mofications to .ms files requier transform files which have...
What process is responsible for selecting a bridgehead server and...
What allows businesses to define ,manage,access and secure network...
What is the process of replicating DNS information from one DNS server...
What type of rule can be applied to allow only windows installer...
Which FSMO role is responsible for reference updates from its domain...
What type of file can be written to allow non-windows Installer...
When a GPO is selected in Group policy management which tab allows...
What allows a user to be able to log on using a cached copy of his or...
What is the process of confirming that an authenticated user has the...
What is a series of bytes with a fixed length that uniquely identifies...
When implementing multiple software restriction policy rules which...
What software restriction policy properties allow you to...
Group policy is used to simulate the effect of a...
What special identity group is used as a reduced privilege account to...
Gpos can act as templates when creating new...
What special identity group is used by the system to allow permissons...
What defines a chain of site links by which domain controllers from...
What procedure is used only when you have experienced a catastrophic...
What refines the application of a GPO to include or exclude certains...
Which of the following is not a type of user account that can be...
When a GPO is selected in group policy management which tab allows...
What component of the microsoft windows operating system allows...
What software restriction policy properties allow an administrator to...
Rather than simulating policy effects like the group policy modeling...
Which tab displays groups and users with permission to link ,perform...