1.
What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?
Correct Answer
A. Directory service
Explanation
A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. It provides a centralized database that stores and organizes information about these resources, making it easier for users to locate and access what they need. The directory service also ensures that only authorized individuals can access certain resources, enhancing network security. Overall, a directory service plays a crucial role in efficiently managing and securing network resources for businesses.
2.
A __________ is defined as one or more IP subnets that are connected by fast links.
Correct Answer
B. Site
Explanation
A site is defined as one or more IP subnets that are connected by fast links. This means that a site refers to a group of interconnected IP subnets that have high-speed connections between them.
3.
What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?
Correct Answer
B. Schema NC
Explanation
The Schema NC (Naming Context) contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory. It defines the structure and properties of objects that can be stored in the directory. The Schema NC is a critical component of Active Directory as it determines the types of objects that can exist and the attributes they can have. It ensures consistency and uniformity in the way objects are created and modified within the directory.
4.
What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?
Correct Answer
B. SYSVOL
Explanation
SYSVOL is the shared folder that exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide. This folder plays a crucial role in the replication of policies and scripts across the domain, ensuring consistency and uniformity in the network environment. It allows administrators to centrally manage and distribute these files to all domain controllers, making it an essential component of Active Directory and Group Policy infrastructure.
5.
What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?
Correct Answer
A. Server Core
Explanation
Server Core is a new feature in Windows Server 2008 that provides a minimal environment for running only specific services and roles. It allows administrators to install and manage only the necessary components, reducing the attack surface and resource usage. This feature is particularly useful for servers that need to be lightweight, have a reduced footprint, and require minimal maintenance. With Server Core, unnecessary features and graphical interfaces are removed, resulting in improved security, performance, and reliability.
6.
What is the minimum amount of storage space required for the Active Directory installation files?
Correct Answer
B. 200 MB
Explanation
The minimum amount of storage space required for the Active Directory installation files is 200 MB. This means that in order to install Active Directory, a computer or server must have at least 200 MB of free storage space available. This is the minimum requirement to ensure that all the necessary files and components are properly installed and functioning.
7.
When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?
Correct Answer
B. Schema Admins
Explanation
Microsoft recommends adding administrators to the Schema Admins group only for the duration of the task when modifying the schema. This is because the Schema Admins group has the necessary permissions and privileges to make changes to the Active Directory schema, which defines the structure and attributes of objects in the directory. By temporarily adding administrators to this group, they can perform the required modifications without granting them unnecessary administrative rights and privileges that could potentially compromise the security and stability of the system.
8.
When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.
Correct Answer
A. Default-First-Site-Name
Explanation
When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard automatically creates a default site called "Default-First-Site-Name". This site is created to serve as the initial site for the forest and is used for replication and other Active Directory services. It is named "Default-First-Site-Name" to indicate that it is the default site for the first domain controller in the forest.
9.
What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?
Correct Answer
A. Dcdiag
Explanation
DCDiag is a command-line tool used for monitoring Active Directory. It provides functionality that includes performing connectivity and replication tests. This tool allows administrators to diagnose problems with domain controllers and identify issues related to Active Directory connectivity and replication. By running DCDiag, administrators can verify the health of the Active Directory environment and troubleshoot any potential issues that may arise.
10.
When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.
Correct Answer
A. Bridgehead
Explanation
Active Directory designates a bridgehead server in each site to act as a gatekeeper in managing site-to-site replication. A bridgehead server is responsible for receiving replication updates from other domain controllers in the site and then distributing those updates to other domain controllers in the same site or in different sites. This ensures efficient and reliable replication of information between sites in an Active Directory environment.
11.
What defines a chain of site links by which domain controllers from different sites can communicate?
Correct Answer
B. Site link bridge
Explanation
A site link bridge is what defines a chain of site links by which domain controllers from different sites can communicate. It allows for the establishment of a logical connection between site links, enabling domain controllers in different sites to communicate with each other. This ensures efficient and reliable communication between domain controllers, facilitating the replication of Active Directory data across multiple sites in a network.
12.
How many FSMO roles does Active Directory support?
Correct Answer
B. 5
Explanation
Active Directory supports five FSMO (Flexible Single Master Operation) roles. These roles include the Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master. Each role is responsible for specific tasks and operations within the Active Directory domain. The Schema Master manages updates and modifications to the Active Directory schema, the Domain Naming Master controls the addition or removal of domains in the forest, the RID Master allocates unique security identifiers (SIDs) to objects, the PDC Emulator handles backward compatibility with older Windows NT systems, and the Infrastructure Master ensures that cross-domain object references are properly updated.
13.
How many RID Masters can a domain have?
Correct Answer
B. 1
Explanation
A domain can have only one RID (Relative Identifier) Master. The RID Master is responsible for assigning unique relative identifiers to each object created in the domain. Having multiple RID Masters would result in conflicts and duplicate identifiers, which would disrupt the functioning of the domain. Therefore, to maintain the integrity and uniqueness of object identifiers, a domain is limited to having only one RID Master.
14.
What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?
Correct Answer
A. Role seizure
Explanation
Role seizure is the procedure used when a catastrophic failure occurs in a domain controller that holds a Flexible Single Master Operations (FSMO) role, and there is a need to recover that role. In this process, the role is forcibly transferred from the failed domain controller to a healthy one in the domain. This is done to ensure the continuity and stability of the Active Directory environment.
15.
What special identity group contains all authenticated users and domain guests?
Correct Answer
B. Everyone
Explanation
The special identity group "Everyone" contains all authenticated users and domain guests. This group includes all users who have been authenticated by the system, regardless of their specific roles or permissions. By adding users to the "Everyone" group, administrators can grant certain permissions or access rights to a wide range of users without having to individually specify each user.
16.
__________ name refers to each user’s login name.
Correct Answer
A. SAM account
Explanation
The given correct answer is "SAM account." The SAM account refers to each user's login name. In the context of an Active Directory (AD) system, the SAM account is a unique identifier for each user and is used for authentication and access control purposes. It is commonly used in Windows operating systems to manage user accounts and their associated permissions.
17.
You cannot manually modify the group membership of or view the membership lists of __________ groups.
Correct Answer
B. Special identity
18.
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?
Correct Answer
B. LDIFDE
Explanation
LDIFDE (LDAP Data Interchange Format Directory Exchange) can be used to add, delete, or modify objects in Active Directory. It is a command-line tool that allows administrators to import or export data from Active Directory using LDIF files. LDIFDE can also be used to modify the schema if necessary, making it a versatile tool for managing and manipulating Active Directory objects and attributes. NSLOOKUP, on the other hand, is a command-line tool used for querying DNS servers to retrieve information about domain names and IP addresses. It is not used for managing Active Directory objects.
19.
Which of the following is a benefit of implementing a public key infrastructure (PKI)?
Explanation
Implementing a public key infrastructure (PKI) has the benefit of ensuring secure communication and data exchange. With a PKI, users can utilize digital certificates and encryption to authenticate and protect their information. This eliminates the need for users to remember passwords and provides a higher level of security. Additionally, storing information on a smart card makes it challenging for unauthorized individuals to access or use the data, enhancing confidentiality and reducing the risk of data breaches.
20.
What method of authentication requires a smart card and a PIN to provide more secure access to company resources?
Correct Answer
B. Two-factor authentication
Explanation
Two-factor authentication requires the use of two different factors to verify the identity of a user. In this case, the smart card serves as one factor, while the PIN serves as the second factor. By combining something the user has (smart card) with something the user knows (PIN), two-factor authentication provides an extra layer of security compared to single-factor authentication methods. This helps to ensure that only authorized individuals with both the smart card and the correct PIN can access company resources.
21.
What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?
Correct Answer
A. Smart card enrollment station
Explanation
A smart card enrollment station is a dedicated workstation that allows an administrator or authorized user to preconfigure certificates and smart cards on behalf of a user or workstation. This station enables the administrator to enroll and configure smart cards with the necessary certificates, ensuring that the user or workstation is ready to use the smart card for authentication or other purposes. This process simplifies the deployment and management of smart cards within an organization, improving security and efficiency.
22.
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.
Correct Answer
C. 127
Explanation
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length. This means that users can create passwords with a maximum of 127 characters for these operating systems.
23.
What is a method of controlling settings across your network?
Correct Answer
A. Group Policy
Explanation
Group Policy is a method of controlling settings across a network. It allows administrators to manage and enforce specific configurations, security policies, and restrictions on multiple computers or users within a network. By using Group Policy, administrators can centrally manage settings such as access controls, software installation, desktop configurations, and more, ensuring consistency and security across the network. Active Directory, on the other hand, is a directory service used to manage and organize network resources, including users, computers, and groups. While Active Directory can be used in conjunction with Group Policy, it is not specifically a method of controlling settings across a network.
24.
What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?
Correct Answer
C. Group Policy Objects
Explanation
Group Policy Objects (GPOs) contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or Organizational Unit (OU). GPOs are used to centrally manage and configure the operating system and applications settings for multiple users and computers in a network. They allow administrators to enforce security policies, manage software installations, and customize user preferences. By linking GPOs to specific sites, domains, or OUs, administrators can ensure that the desired settings are applied to the appropriate objects within the network.
25.
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?
Correct Answer
C. Loopback Processing
Explanation
Loopback Processing allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run. This feature is useful in scenarios where you want to apply different policies to a computer depending on the user who logs in, regardless of the computer's location in the Active Directory hierarchy. With Loopback Processing, the computer policies are reapplied after the user policies, ensuring that the desired configuration is consistently applied.
26.
Local GPO settings are stored in what folder on a computer?
Correct Answer
A. %systemroot%/System32/GroupPolicy
Explanation
Local GPO settings are stored in the folder %systemroot%/System32/GroupPolicy. This folder is located in the system root directory, specifically in the System32 folder. It is the designated location for storing the Group Policy Object (GPO) settings on a computer. GPO settings control various aspects of the computer's configuration and behavior, such as security settings, software installation policies, and user preferences. By storing these settings in the %systemroot%/System32/GroupPolicy folder, they can be easily accessed and applied by the local Group Policy service.
27.
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?
Correct Answer
B. Fine-Grained Password Policies
Explanation
Fine-Grained Password Policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain. This means that you can have different password requirements for different users or groups within the same domain, providing more flexibility and control over password security.
28.
Where can you configure the Group Policy refresh interval?
Correct Answer
C. Computer Configuration\\Administrative Templates\\System\\Group Policy
Explanation
The Group Policy refresh interval can be configured under Computer Configuration\\Administrative Templates\\System\\Group Policy. This location allows administrators to specify the interval at which Group Policy settings are refreshed on computers in the domain.
29.
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
Correct Answer
B. .msi
Explanation
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into .msi files. The Windows Installer technology provides a standard format for packaging software installations and allows for easy installation, maintenance, and removal of software on Windows operating systems. Group Policy is a feature in Windows Server that allows administrators to manage and enforce settings and configurations across multiple computers in a network. By using .msi files, administrators can easily distribute and install software packages to multiple computers in a controlled and efficient manner.
30.
Modifications to .msi files require transform files, which have the __________ extension.
Correct Answer
D. .mst
Explanation
When making modifications to .msi files, transform files are required. These transform files have the .mst extension.
31.
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Correct Answer
C. Basic User
Explanation
The option "Basic User" is the correct answer because it allows programs to run that only require resources accessible by normal users. This option prevents any application from running that requires administrative rights, ensuring that only programs that can be run by regular users are allowed.
32.
What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?
Correct Answer
C. Delegation
Explanation
The "Delegation" tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information. This tab allows administrators to assign specific permissions to different groups or users, giving them the ability to manage and control various aspects of Group Policy within an organization.
33.
What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?
Correct Answer
B. Block Policy Inheritance
Explanation
Block Policy Inheritance is the correct answer because it prevents policy settings from being applied to all child objects at the current level and all subordinate levels. When this setting is enabled, any policy settings that are applied to the parent object will not be inherited by the child objects, effectively blocking the propagation of policies down the hierarchy. This allows for more granular control over policy application and ensures that specific objects or levels are not affected by the parent policies.
34.
How many WMI filters can be configured per GPO?
Correct Answer
A. One
Explanation
Only one WMI filter can be configured per Group Policy Object (GPO). This means that a single GPO can have only one WMI filter associated with it. WMI filters are used to apply GPO settings based on certain conditions, such as the operating system version or hardware configuration of the target computer. Having multiple WMI filters per GPO could potentially lead to conflicts or confusion in determining which filter should be applied. Therefore, the correct answer is one.
35.
To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
Correct Answer
D. Directory Services Restore
Explanation
To perform a System State restore in Windows Server 2008, you will boot the DC into Directory Services Restore mode. This mode allows the server to start with only the essential services needed to perform a system state restore, such as Active Directory. It disables other non-essential services and drivers, ensuring a clean and focused environment for the restore process. This mode is specifically designed for performing Active Directory restores and is essential for recovering the directory services in case of any issues or failures.
36.
In Windows Server 2008, you must back up __________ rather than only backing up the System State data.
Correct Answer
A. Critical volumes
Explanation
In Windows Server 2008, it is necessary to back up critical volumes rather than only backing up the System State data. This is because critical volumes contain important data and configurations that are essential for the server's operation. By backing up critical volumes, all the necessary files and settings are preserved, ensuring that the server can be restored to a functional state in case of any data loss or system failure.
37.
To back up Active Directory, you must install what feature from the Server Manager console?
Correct Answer
C. Windows Server Backup
Explanation
To back up Active Directory, you need to install the "Windows Server Backup" feature from the Server Manager console. This feature provides a reliable and efficient way to create backups of Active Directory data and settings. It allows you to schedule regular backups, perform full or incremental backups, and restore the Active Directory data when needed. By using Windows Server Backup, you can ensure the safety and availability of your Active Directory data in case of any unexpected events or data loss.
38.
What is the process by which one DNS server sends a name resolution request to another DNS server?
Correct Answer
C. Referral
Explanation
Referral is the process by which one DNS server sends a name resolution request to another DNS server. When a DNS server receives a query for a domain name that it does not have information about, it refers the request to another DNS server that might have the required information. This process continues until the requested domain name is resolved or until a DNS server with the necessary information is found.
39.
What DNS server contains no zones and hosts no domains?
Correct Answer
D. Caching-only server
Explanation
A caching-only server is a DNS server that does not contain any zones and does not host any domains. Its main function is to cache DNS information from other DNS servers to improve the efficiency and speed of DNS queries. It does not perform any authoritative functions and only serves as a temporary storage for frequently accessed DNS records.
40.
What Windows Server 2008 service can you use to protect sensitive data on a Windows network?
Correct Answer
D. AD RMS
Explanation
AD RMS stands for Active Directory Rights Management Services. It is a Windows Server 2008 service that can be used to protect sensitive data on a Windows network. AD RMS allows users to define access permissions and usage rights for their documents and emails, ensuring that only authorized individuals can access and modify the protected content. It provides encryption and persistent protection for sensitive information, even when it is shared outside the organization's network. AD RMS helps to prevent unauthorized access, copying, and distribution of sensitive data, enhancing the overall security of the Windows network.
41.
What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?
Correct Answer
A. Identity Lifecycle Management
Explanation
Identity Lifecycle Management enables network administrators and owners to configure access rights for users throughout their entire lifecycle within an organization. This includes managing user identities, provisioning and deprovisioning user accounts, assigning and revoking access privileges, and ensuring compliance with security policies. It helps streamline the process of granting and managing user access, ensuring that users have the appropriate level of access based on their roles and responsibilities within the organization.
42.
What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?
Correct Answer
C. Smart cards
Explanation
Smart cards are small physical devices, typically the size of a credit card or keychain fob, on which a digital certificate is installed. These cards provide secure storage for the digital certificate and can be used for various purposes such as authentication, access control, and secure data storage. They are commonly used in industries like banking, healthcare, and government where strong security measures are required. RSA SecureID, digital certificates, and biometric devices are not specifically mentioned as small physical devices on which a digital certificate is installed, making them incorrect options.
43.
What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?
Correct Answer
D. Online Responder
Explanation
An Online Responder is a service that responds to requests from clients regarding the revocation status of a specific certificate. It returns a digitally signed response that indicates the current status of the certificate. This service is commonly used in Public Key Infrastructure (PKI) environments to provide real-time information about the validity of certificates.
44.
A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
Correct Answer
A. Domain controller
Explanation
A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a domain controller. This is because a domain controller is responsible for authenticating users, managing permissions, and maintaining the Active Directory database, which contains information about all the objects in the domain, such as users, computers, and groups.
45.
What protocol has become an industry standard that enables data exchange between directory services and applications?
Correct Answer
B. LDAP
Explanation
LDAP (Lightweight Directory Access Protocol) has become an industry standard for enabling data exchange between directory services and applications. It provides a standardized way for applications to access and manipulate directory information stored in directory services, such as user accounts, groups, and organizational structures. LDAP is widely used in various systems and applications, including email clients, web browsers, and network management tools, making it the correct answer in this context.
46.
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
Correct Answer
C. SRV records
Explanation
SRV records, or Service records, within DNS allow clients to locate an Active Directory domain controller or global catalog. These records provide information about specific services available on a particular server, such as the domain controller or global catalog. By querying the SRV records, clients can obtain the necessary information to connect to the appropriate server and access the required services within the Active Directory domain. A records, MX records, and SOA records do not specifically provide the required information for locating domain controllers or global catalogs.
47.
What is the process of replicating DNS information from one DNS server to another?
Correct Answer
C. Zone transfer
Explanation
Zone transfer is the process of replicating DNS information from one DNS server to another. It involves transferring the entire zone file, which contains all the DNS records for a specific domain, from the primary DNS server to the secondary DNS server. This ensures that both servers have the same up-to-date DNS information, allowing for redundancy and improved fault tolerance in case one server becomes unavailable.
48.
What type of trust relationship allows you to create two-way transitive trusts between separate forests?
Correct Answer
B. Cross-forest
Explanation
A cross-forest trust relationship allows for the creation of two-way transitive trusts between separate forests. This means that users in one forest can access resources in the other forest, and vice versa. This type of trust relationship is commonly used when organizations have multiple forests and need to enable collaboration and resource sharing between them. It provides a secure and efficient way to establish trust and communication between separate Active Directory environments.
49.
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
Correct Answer
C. Forward lookup
Explanation
A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. In a forward lookup, the DNS server resolves a hostname to its corresponding IP address. This allows devices to communicate with each other using domain names instead of IP addresses, making it easier for users to remember and access resources on a network.
50.
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
Correct Answer
C. Forward lookup
Explanation
A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. It allows the translation of hostnames to their corresponding IP addresses, enabling devices to communicate with each other on a network. By performing a forward lookup, a computer can determine the IP address associated with a given hostname, allowing for successful communication and data transfer.