Chapter 5 Server Review Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By TimGutierrez
T
TimGutierrez
Community Contributor
Quizzes Created: 4 | Total Attempts: 699
| Attempts: 131 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. The ability to force a user to be disconnected after logon hours expire is a group policy setting.

Explanation

The statement is true because group policy settings can be used to control various aspects of user behavior and permissions within a Windows domain. One such setting is the ability to force a user to be disconnected after their logon hours expire. This can be useful for enforcing security measures and ensuring that users adhere to predetermined access restrictions. By enabling this setting, administrators can automatically disconnect users once their allotted logon hours have expired, preventing unauthorized access outside of specified timeframes.

Submit
Please wait...
About This Quiz
Chapter 5 Server Review Quiz - Quiz

Technically, a server is defined as a computer program that allows proper functioning for other programs and devices. Are you an IT technician and want to assess your... see moreknowledge on servers. Chapter 5-server review is what you need. see less

2. A ____________________ is a group created in the local SAM database on a member server or workstation or a stand-alone computer.

Explanation

A local group refers to a group that is created within the local Security Accounts Manager (SAM) database on a member server, workstation, or a stand-alone computer. This type of group is specific to the local machine and is used for managing user access and permissions on that particular system. Local groups are not domain-based and do not have any impact or visibility on other machines or the entire network.

Submit
3. Members of the Backup Operators group can log on locally to and shut down domain controllers.

Explanation

Members of the Backup Operators group have the necessary privileges to log on locally to domain controllers and perform tasks such as shutting them down. This group is specifically designed to allow users to perform backup and restore operations on the domain controller, which includes shutting it down if necessary. Therefore, the statement is true.

Submit
4. At about what interval does a computer change its computer account password? 

Explanation

A computer typically changes its computer account password at a 30-day interval. This is a security measure to ensure that passwords are regularly updated and reduce the risk of unauthorized access to the system. By changing passwords regularly, the computer enhances its security and makes it more difficult for hackers or unauthorized users to gain access to sensitive information or resources.

Submit
5. Where are user profiles stored by default in Windows Server 2008?

Explanation

In Windows Server 2008, user profiles are stored by default in the directory %SYSTEMDRIVE%\Users. This directory is typically located on the C: drive, which is the system drive. The user profiles contain personal settings, documents, and other user-specific data for each user on the server. Storing the profiles in the %SYSTEMDRIVE%\Users directory allows for easy access and management of the user profiles.

Submit
6. Which group matches the following description?This universal group is found only on DCs in the forest root domain. Members have full control over forestwide operations. This group is a member of the Administrators group on all DCs.

Explanation

The group that matches the given description is Enterprise Admins. This group is found only on domain controllers (DCs) in the forest root domain and its members have full control over forestwide operations. Additionally, Enterprise Admins is a member of the Administrators group on all DCs.

Submit
7. How do you change a profile into a mandatory profile? 

Explanation

To change a profile into a mandatory profile, you need to rename the Ntuser.dat file to Ntuser.man. This file is responsible for storing the user's profile settings and preferences. By renaming it to Ntuser.man, the system recognizes it as a mandatory profile, which means that any changes made by the user will not be saved after logging off. This is useful in situations where you want to enforce a standard profile for multiple users, preventing them from making permanent changes to their profiles.

Submit
8. In order to ensure no one uses public computer terminals after 5 pm, you've set the log on hours for the guest user accounts to deny log on after 5. However, you've noticed that users are still using the terminals after 5 pm, while other users are denied the ability to log in.Why are some users denied to log on, while other users are still using the terminals? 

Explanation

not-available-via-ai

Submit
9. By default, a user's profile is created.... 

Explanation

When a user first logs on to a system, their profile is created by default. This means that all the necessary settings, preferences, and personalization options are set up for that specific user. This allows the user to have a personalized experience and access their specific files and applications. Creating the profile when the user first logs on ensures that the profile is created only for active users and reduces unnecessary storage usage for inactive users.

Submit
10. If the Unlock Account checkbox is selected under a user account's Properties dialog box, what does this mean?

Explanation

If the Unlock Account checkbox is selected under a user account's Properties dialog box, it means that the user has too many failed logon attempts and is locked out. This checkbox is used to unlock the account and allow the user to log in again after a certain period of time or after the administrator manually unlocks it.

Submit
11. Select below a character that can be used in a user account name:

Explanation

The exclamation mark (!) can be used in a user account name. It is a valid character that can be included in usernames for various systems and platforms.

Submit
12. The ____________________ group is a built-in default group and has no default rights or permissions.

Explanation

The "Guests" group is a built-in default group in a system or network that has no default rights or permissions. This means that users who are part of the "Guests" group do not have any special access or privileges by default. They are typically restricted from performing certain actions or accessing sensitive information, making it a limited and restricted group within the system or network.

Submit
13. By default, user account names are case sensitive

Explanation

User account names are not case sensitive by default. This means that the system does not differentiate between uppercase and lowercase letters when it comes to user account names. For example, "johnsmith" and "JohnSmith" would be considered the same account name.

Submit
14. What is Microsoft's best practices recommendation for the structure of group scope nesting?

Explanation

Microsoft's best practices recommendation for the structure of group scope nesting is AGDLP. This acronym stands for Account, Global, Domain Local, and Permission. This structure is based on the principle of granting permissions to groups rather than individual users. The Account groups are used to manage user accounts, the Global groups are used to manage permissions across domains, the Domain Local groups are used to manage permissions within a specific domain, and the Permission groups are used to assign specific permissions to resources. This nesting structure ensures better organization, easier management, and more efficient permission assignment within an Active Directory environment.

Submit
15. You have received a call from an employee about permissions on a shared folder, having found he can no longer access the resource. After checking the folder, you find that the group the employee is in is part of the resource's DACL, but seems to have no effect on the group's permissions. The group's permission entry is the only entry in the DACL. What is wrong?

Explanation

When a security group is converted to a distribution group, it loses its security-related permissions. This means that even though the group is still listed in the DACL of the shared folder, it no longer has any effect on the group's permissions. Therefore, the employee who is part of this group cannot access the shared folder.

Submit
16. Where are local groups stored? 

Explanation

Local groups are stored in the local SAM (Security Accounts Manager) database. The SAM database is a part of the Windows operating system and is responsible for storing local user and group account information on the local computer. It is used for authentication and authorization purposes, allowing users to access local resources and granting permissions to local groups. Therefore, the correct answer is "In the local SAM database."

Submit
17. Which of the below utilities uses comma-separated values to bulk import or export Active Directory data? 

Explanation

CSVDE (Comma-Separated Values Data Exchange) is the correct answer because it is a utility that is used to bulk import or export Active Directory data. It allows data to be stored in a CSV file format, where each value is separated by a comma. This format is commonly used for transferring and manipulating data between different systems. LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information, but it does not specifically use comma-separated values for bulk import or export. LDFIDE is not a valid utility or protocol.

Submit
18. Which command line tool removes, or deletes, objects from Active Directory? 

Explanation

DSRM is the command line tool that is used to remove or delete objects from Active Directory. It stands for "Directory Services Restore Mode" and allows administrators to delete objects such as users, groups, computers, and organizational units from the Active Directory database. This tool helps in managing and maintaining the Active Directory environment by providing a way to remove unnecessary or outdated objects.

Submit
19. Which statement is false? 

Explanation

The statement "Global groups can be members of any global group in the forest" is false. Global groups can only be members of domain local groups, not other global groups.

Submit
20. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2014
    Quiz Created by
    TimGutierrez
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The ability to force a user to be disconnected after logon hours...
A ____________________ is a group created in the local SAM database on...
Members of the Backup Operators group can log on locally to and shut...
At about what interval does a computer change its computer account...
Where are user profiles stored by default in Windows Server 2008?
Which group matches the following description?This universal group is...
How do you change a profile into a mandatory profile? 
In order to ensure no one uses public computer terminals after 5 pm,...
By default, a user's profile is created.... 
If the Unlock Account checkbox is selected under a user account's...
Select below a character that can be used in a user account name:
The ____________________ group is a built-in default group and has no...
By default, user account names are case sensitive
What is Microsoft's best practices recommendation for the structure of...
You have received a call from an employee about permissions on a...
Where are local groups stored? 
Which of the below utilities uses comma-separated values to bulk...
Which command line tool removes, or deletes, objects from Active...
Which statement is false? 
Match the following
Alert!

Advertisement