Online Exam Practice For Windows Server 2008 Administration (Mod-II) - Set A

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Aniketnaidu13
A
Aniketnaidu13
Community Contributor
Quizzes Created: 1 | Total Attempts: 16,431
| Attempts: 16,431 | Questions: 50 | Updated: Mar 22, 2025
Please wait...
Question 1 / 51
🏆 Rank #--
Score 0/100

1. What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?

Explanation

A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. It provides a centralized database that stores and organizes information about these resources, making it easier for users to locate and access what they need. The directory service also ensures that only authorized individuals can access certain resources, enhancing network security. Overall, a directory service plays a crucial role in efficiently managing and securing network resources for businesses.

Submit
Please wait...
About This Quiz
Online Exam Practice For Windows Server 2008 Administration (Mod-II) - Set A - Quiz

Hi!
This quiz includes questions of windows server 2008's question bank. . . . Quizes are devided into different sets, and each set have 50 questions. . . . Good luck. . . . :)

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?

Explanation

SYSVOL is the shared folder that exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide. This folder plays a crucial role in the replication of policies and scripts across the domain, ensuring consistency and uniformity in the network environment. It allows administrators to centrally manage and distribute these files to all domain controllers, making it an essential component of Active Directory and Group Policy infrastructure.

Submit

3. When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.

Explanation

Active Directory designates a bridgehead server in each site to act as a gatekeeper in managing site-to-site replication. A bridgehead server is responsible for receiving replication updates from other domain controllers in the site and then distributing those updates to other domain controllers in the same site or in different sites. This ensures efficient and reliable replication of information between sites in an Active Directory environment.

Submit

4. What is a method of controlling settings across your network?

Explanation

Group Policy is a method of controlling settings across a network. It allows administrators to manage and enforce specific configurations, security policies, and restrictions on multiple computers or users within a network. By using Group Policy, administrators can centrally manage settings such as access controls, software installation, desktop configurations, and more, ensuring consistency and security across the network. Active Directory, on the other hand, is a directory service used to manage and organize network resources, including users, computers, and groups. While Active Directory can be used in conjunction with Group Policy, it is not specifically a method of controlling settings across a network.

Submit

5. How many RID Masters can a domain have?

Explanation

A domain can have only one RID (Relative Identifier) Master. The RID Master is responsible for assigning unique relative identifiers to each object created in the domain. Having multiple RID Masters would result in conflicts and duplicate identifiers, which would disrupt the functioning of the domain. Therefore, to maintain the integrity and uniqueness of object identifiers, a domain is limited to having only one RID Master.

Submit

6. What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?

Explanation

The Schema NC (Naming Context) contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory. It defines the structure and properties of objects that can be stored in the directory. The Schema NC is a critical component of Active Directory as it determines the types of objects that can exist and the attributes they can have. It ensures consistency and uniformity in the way objects are created and modified within the directory.

Submit

7. What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?

Explanation

Server Core is a new feature in Windows Server 2008 that provides a minimal environment for running only specific services and roles. It allows administrators to install and manage only the necessary components, reducing the attack surface and resource usage. This feature is particularly useful for servers that need to be lightweight, have a reduced footprint, and require minimal maintenance. With Server Core, unnecessary features and graphical interfaces are removed, resulting in improved security, performance, and reliability.

Submit

8. Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?

Explanation

Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into .msi files. The Windows Installer technology provides a standard format for packaging software installations and allows for easy installation, maintenance, and removal of software on Windows operating systems. Group Policy is a feature in Windows Server that allows administrators to manage and enforce settings and configurations across multiple computers in a network. By using .msi files, administrators can easily distribute and install software packages to multiple computers in a controlled and efficient manner.

Submit

9. How many FSMO roles does Active Directory support?

Explanation

Active Directory supports five FSMO (Flexible Single Master Operation) roles. These roles include the Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master. Each role is responsible for specific tasks and operations within the Active Directory domain. The Schema Master manages updates and modifications to the Active Directory schema, the Domain Naming Master controls the addition or removal of domains in the forest, the RID Master allocates unique security identifiers (SIDs) to objects, the PDC Emulator handles backward compatibility with older Windows NT systems, and the Infrastructure Master ensures that cross-domain object references are properly updated.

Submit

10. A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.

Explanation

A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a domain controller. This is because a domain controller is responsible for authenticating users, managing permissions, and maintaining the Active Directory database, which contains information about all the objects in the domain, such as users, computers, and groups.

Submit

11. What protocol has become an industry standard that enables data exchange between directory services and applications?

Explanation

LDAP (Lightweight Directory Access Protocol) has become an industry standard for enabling data exchange between directory services and applications. It provides a standardized way for applications to access and manipulate directory information stored in directory services, such as user accounts, groups, and organizational structures. LDAP is widely used in various systems and applications, including email clients, web browsers, and network management tools, making it the correct answer in this context.

Submit

12. What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?

Explanation

Role seizure is the procedure used when a catastrophic failure occurs in a domain controller that holds a Flexible Single Master Operations (FSMO) role, and there is a need to recover that role. In this process, the role is forcibly transferred from the failed domain controller to a healthy one in the domain. This is done to ensure the continuity and stability of the Active Directory environment.

Submit

13. What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?

Explanation

LDIFDE (LDAP Data Interchange Format Directory Exchange) can be used to add, delete, or modify objects in Active Directory. It is a command-line tool that allows administrators to import or export data from Active Directory using LDIF files. LDIFDE can also be used to modify the schema if necessary, making it a versatile tool for managing and manipulating Active Directory objects and attributes. NSLOOKUP, on the other hand, is a command-line tool used for querying DNS servers to retrieve information about domain names and IP addresses. It is not used for managing Active Directory objects.

Submit

14. A __________ is defined as one or more IP subnets that are connected by fast links.

Explanation

A site is defined as one or more IP subnets that are connected by fast links. This means that a site refers to a group of interconnected IP subnets that have high-speed connections between them.

Submit

15. When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?

Explanation

Microsoft recommends adding administrators to the Schema Admins group only for the duration of the task when modifying the schema. This is because the Schema Admins group has the necessary permissions and privileges to make changes to the Active Directory schema, which defines the structure and attributes of objects in the directory. By temporarily adding administrators to this group, they can perform the required modifications without granting them unnecessary administrative rights and privileges that could potentially compromise the security and stability of the system.

Submit

16. When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.

Explanation

When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard automatically creates a default site called "Default-First-Site-Name". This site is created to serve as the initial site for the forest and is used for replication and other Active Directory services. It is named "Default-First-Site-Name" to indicate that it is the default site for the first domain controller in the forest.

Submit

17. What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?

Explanation

DCDiag is a command-line tool used for monitoring Active Directory. It provides functionality that includes performing connectivity and replication tests. This tool allows administrators to diagnose problems with domain controllers and identify issues related to Active Directory connectivity and replication. By running DCDiag, administrators can verify the health of the Active Directory environment and troubleshoot any potential issues that may arise.

Submit

18. What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?

Explanation

Group Policy Objects (GPOs) contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or Organizational Unit (OU). GPOs are used to centrally manage and configure the operating system and applications settings for multiple users and computers in a network. They allow administrators to enforce security policies, manage software installations, and customize user preferences. By linking GPOs to specific sites, domains, or OUs, administrators can ensure that the desired settings are applied to the appropriate objects within the network.

Submit

19. What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?

Explanation

Loopback Processing allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run. This feature is useful in scenarios where you want to apply different policies to a computer depending on the user who logs in, regardless of the computer's location in the Active Directory hierarchy. With Loopback Processing, the computer policies are reapplied after the user policies, ensuring that the desired configuration is consistently applied.

Submit

20. What special identity group contains all authenticated users and domain guests?

Explanation

The special identity group "Everyone" contains all authenticated users and domain guests. This group includes all users who have been authenticated by the system, regardless of their specific roles or permissions. By adding users to the "Everyone" group, administrators can grant certain permissions or access rights to a wide range of users without having to individually specify each user.

Submit

21. What method of authentication requires a smart card and a PIN to provide more secure access to company resources?

Explanation

Two-factor authentication requires the use of two different factors to verify the identity of a user. In this case, the smart card serves as one factor, while the PIN serves as the second factor. By combining something the user has (smart card) with something the user knows (PIN), two-factor authentication provides an extra layer of security compared to single-factor authentication methods. This helps to ensure that only authorized individuals with both the smart card and the correct PIN can access company resources.

Submit

22. What defines a chain of site links by which domain controllers from different sites can communicate?

Explanation

A site link bridge is what defines a chain of site links by which domain controllers from different sites can communicate. It allows for the establishment of a logical connection between site links, enabling domain controllers in different sites to communicate with each other. This ensures efficient and reliable communication between domain controllers, facilitating the replication of Active Directory data across multiple sites in a network.

Submit

23. What type of trust relationship allows you to create two-way transitive trusts between separate forests?

Explanation

A cross-forest trust relationship allows for the creation of two-way transitive trusts between separate forests. This means that users in one forest can access resources in the other forest, and vice versa. This type of trust relationship is commonly used when organizations have multiple forests and need to enable collaboration and resource sharing between them. It provides a secure and efficient way to establish trust and communication between separate Active Directory environments.

Submit

24. What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?

Explanation

Block Policy Inheritance is the correct answer because it prevents policy settings from being applied to all child objects at the current level and all subordinate levels. When this setting is enabled, any policy settings that are applied to the parent object will not be inherited by the child objects, effectively blocking the propagation of policies down the hierarchy. This allows for more granular control over policy application and ensures that specific objects or levels are not affected by the parent policies.

Submit

25. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

Explanation

A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. It allows the translation of hostnames to their corresponding IP addresses, enabling devices to communicate with each other on a network. By performing a forward lookup, a computer can determine the IP address associated with a given hostname, allowing for successful communication and data transfer.

Submit

26. Local GPO settings are stored in what folder on a computer?

Explanation

Local GPO settings are stored in the folder %systemroot%/System32/GroupPolicy. This folder is located in the system root directory, specifically in the System32 folder. It is the designated location for storing the Group Policy Object (GPO) settings on a computer. GPO settings control various aspects of the computer's configuration and behavior, such as security settings, software installation policies, and user preferences. By storing these settings in the %systemroot%/System32/GroupPolicy folder, they can be easily accessed and applied by the local Group Policy service.

Submit

27. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

Explanation

A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. In a forward lookup, the DNS server resolves a hostname to its corresponding IP address. This allows devices to communicate with each other using domain names instead of IP addresses, making it easier for users to remember and access resources on a network.

Submit

28. __________ name refers to each user's login name.

Explanation

The given correct answer is "SAM account." The SAM account refers to each user's login name. In the context of an Active Directory (AD) system, the SAM account is a unique identifier for each user and is used for authentication and access control purposes. It is commonly used in Windows operating systems to manage user accounts and their associated permissions.

Submit

29. What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?

Explanation

Smart cards are small physical devices, typically the size of a credit card or keychain fob, on which a digital certificate is installed. These cards provide secure storage for the digital certificate and can be used for various purposes such as authentication, access control, and secure data storage. They are commonly used in industries like banking, healthcare, and government where strong security measures are required. RSA SecureID, digital certificates, and biometric devices are not specifically mentioned as small physical devices on which a digital certificate is installed, making them incorrect options.

Submit

30. You cannot manually modify the group membership of or view the membership lists of __________ groups.

Explanation

not-available-via-ai

Submit

31. To back up Active Directory, you must install what feature from the Server Manager console?

Explanation

To back up Active Directory, you need to install the "Windows Server Backup" feature from the Server Manager console. This feature provides a reliable and efficient way to create backups of Active Directory data and settings. It allows you to schedule regular backups, perform full or incremental backups, and restore the Active Directory data when needed. By using Windows Server Backup, you can ensure the safety and availability of your Active Directory data in case of any unexpected events or data loss.

Submit

32. What DNS server contains no zones and hosts no domains?

Explanation

A caching-only server is a DNS server that does not contain any zones and does not host any domains. Its main function is to cache DNS information from other DNS servers to improve the efficiency and speed of DNS queries. It does not perform any authoritative functions and only serves as a temporary storage for frequently accessed DNS records.

Submit

33. What is the minimum amount of storage space required for the Active Directory installation files?

Explanation

The minimum amount of storage space required for the Active Directory installation files is 200 MB. This means that in order to install Active Directory, a computer or server must have at least 200 MB of free storage space available. This is the minimum requirement to ensure that all the necessary files and components are properly installed and functioning.

Submit

34. Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.

Explanation

Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length. This means that users can create passwords with a maximum of 127 characters for these operating systems.

Submit

35. What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?

Explanation

Fine-Grained Password Policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain. This means that you can have different password requirements for different users or groups within the same domain, providing more flexibility and control over password security.

Submit

36. How many WMI filters can be configured per GPO?

Explanation

Only one WMI filter can be configured per Group Policy Object (GPO). This means that a single GPO can have only one WMI filter associated with it. WMI filters are used to apply GPO settings based on certain conditions, such as the operating system version or hardware configuration of the target computer. Having multiple WMI filters per GPO could potentially lead to conflicts or confusion in determining which filter should be applied. Therefore, the correct answer is one.

Submit

37. To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?

Explanation

To perform a System State restore in Windows Server 2008, you will boot the DC into Directory Services Restore mode. This mode allows the server to start with only the essential services needed to perform a system state restore, such as Active Directory. It disables other non-essential services and drivers, ensuring a clean and focused environment for the restore process. This mode is specifically designed for performing Active Directory restores and is essential for recovering the directory services in case of any issues or failures.

Submit

38. What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

Explanation

SRV records, or Service records, within DNS allow clients to locate an Active Directory domain controller or global catalog. These records provide information about specific services available on a particular server, such as the domain controller or global catalog. By querying the SRV records, clients can obtain the necessary information to connect to the appropriate server and access the required services within the Active Directory domain. A records, MX records, and SOA records do not specifically provide the required information for locating domain controllers or global catalogs.

Submit

39. What is the process of replicating DNS information from one DNS server to another?

Explanation

Zone transfer is the process of replicating DNS information from one DNS server to another. It involves transferring the entire zone file, which contains all the DNS records for a specific domain, from the primary DNS server to the secondary DNS server. This ensures that both servers have the same up-to-date DNS information, allowing for redundancy and improved fault tolerance in case one server becomes unavailable.

Submit

40. When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?

Explanation

The option "Basic User" is the correct answer because it allows programs to run that only require resources accessible by normal users. This option prevents any application from running that requires administrative rights, ensuring that only programs that can be run by regular users are allowed.

Submit

41. What enables network administrators and owners to configure access rights for users during the users' entire lifecycle within an organization?

Explanation

Identity Lifecycle Management enables network administrators and owners to configure access rights for users throughout their entire lifecycle within an organization. This includes managing user identities, provisioning and deprovisioning user accounts, assigning and revoking access privileges, and ensuring compliance with security policies. It helps streamline the process of granting and managing user access, ensuring that users have the appropriate level of access based on their roles and responsibilities within the organization.

Submit

42. Modifications to .msi files require transform files, which have the __________ extension.

Explanation

When making modifications to .msi files, transform files are required. These transform files have the .mst extension.

Submit

43. Where can you configure the Group Policy refresh interval?

Explanation

The Group Policy refresh interval can be configured under Computer Configuration\\Administrative Templates\\System\\Group Policy. This location allows administrators to specify the interval at which Group Policy settings are refreshed on computers in the domain.

Submit

44. What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?

Explanation

A smart card enrollment station is a dedicated workstation that allows an administrator or authorized user to preconfigure certificates and smart cards on behalf of a user or workstation. This station enables the administrator to enroll and configure smart cards with the necessary certificates, ensuring that the user or workstation is ready to use the smart card for authentication or other purposes. This process simplifies the deployment and management of smart cards within an organization, improving security and efficiency.

Submit

45. What is the process by which one DNS server sends a name resolution request to another DNS server?

Explanation

Referral is the process by which one DNS server sends a name resolution request to another DNS server. When a DNS server receives a query for a domain name that it does not have information about, it refers the request to another DNS server that might have the required information. This process continues until the requested domain name is resolved or until a DNS server with the necessary information is found.

Submit

46. What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?

Explanation

The "Delegation" tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information. This tab allows administrators to assign specific permissions to different groups or users, giving them the ability to manage and control various aspects of Group Policy within an organization.

Submit

47. What Windows Server 2008 service can you use to protect sensitive data on a Windows network?

Explanation

AD RMS stands for Active Directory Rights Management Services. It is a Windows Server 2008 service that can be used to protect sensitive data on a Windows network. AD RMS allows users to define access permissions and usage rights for their documents and emails, ensuring that only authorized individuals can access and modify the protected content. It provides encryption and persistent protection for sensitive information, even when it is shared outside the organization's network. AD RMS helps to prevent unauthorized access, copying, and distribution of sensitive data, enhancing the overall security of the Windows network.

Submit

48. In Windows Server 2008, you must back up __________ rather than only backing up the System State data.

Explanation

In Windows Server 2008, it is necessary to back up critical volumes rather than only backing up the System State data. This is because critical volumes contain important data and configurations that are essential for the server's operation. By backing up critical volumes, all the necessary files and settings are preserved, ensuring that the server can be restored to a functional state in case of any data loss or system failure.

Submit

49. What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate's current status?

Explanation

An Online Responder is a service that responds to requests from clients regarding the revocation status of a specific certificate. It returns a digitally signed response that indicates the current status of the certificate. This service is commonly used in Public Key Infrastructure (PKI) environments to provide real-time information about the validity of certificates.

Submit

50. Which of the following is a benefit of implementing a public key infrastructure (PKI)?

Explanation

Implementing a public key infrastructure (PKI) has the benefit of ensuring secure communication and data exchange. With a PKI, users can utilize digital certificates and encryption to authenticate and protect their information. This eliminates the need for users to remember passwords and provides a higher level of security. Additionally, storing information on a smart card makes it challenging for unauthorized individuals to access or use the data, enhancing confidentiality and reducing the risk of data breaches.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What allows businesses to define, manage, access, and secure network...
What shared folder exists on all domain controllers and is used to...
When replicating information between sites, Active Directory will...
What is a method of controlling settings across your network?
How many RID Masters can a domain have?
What contains the rules and definitions that are used for creating and...
What new Windows Server 2008 feature is a special installation option...
Microsoft Windows Server 2008 uses the Windows Installer with Group...
How many FSMO roles does Active Directory support?
A Windows Server 2008 computer that has been configured with the...
What protocol has become an industry standard that enables data...
What procedure is used only when you have experienced a catastrophic...
What can be used to add, delete, or modify objects in Active...
A __________ is defined as one or more IP subnets that are connected...
When modifying the schema, Microsoft recommends adding administrators...
When you install the forest root domain controller in an Active...
What command-line tool used for monitoring Active Directory provides...
What contains all of the Group Policy settings that you wish to...
What allows the Group Policy processing order to circle back and...
What special identity group contains all authenticated users and...
What method of authentication requires a smart card and a PIN to...
What defines a chain of site links by which domain controllers from...
What type of trust relationship allows you to create two-way...
What setting will prevent policy settings from applying to all child...
What type of zone is necessary for computer hostname-to-IP address...
Local GPO settings are stored in what folder on a computer?
What type of zone is necessary for computer hostname-to-IP address...
__________ name refers to each user's login name.
What are small physical devices on which a digital certificate is...
You cannot manually modify the group membership of or view the...
To back up Active Directory, you must install what feature from the...
What DNS server contains no zones and hosts no domains?
What is the minimum amount of storage space required for the Active...
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003,...
What policies can be applied to one or more users or groups of users,...
How many WMI filters can be configured per GPO?
To perform a System State restore in Windows Server 2008, you will...
What locator records within DNS allow clients to locate an Active...
What is the process of replicating DNS information from one DNS server...
When configuring Software Restriction policies, which option prevents...
What enables network administrators and owners to configure access...
Modifications to .msi files require transform files, which have the...
Where can you configure the Group Policy refresh interval?
What dedicated workstation allows an administrator or another...
What is the process by which one DNS server sends a name resolution...
What tab displays groups and users with permission to link, perform...
What Windows Server 2008 service can you use to protect sensitive data...
In Windows Server 2008, you must back up __________ rather than only...
What service responds to requests from clients concerning the...
Which of the following is a benefit of implementing a public key...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!