Online Exam Practice For Windows Server 2008 Administration (Mod-II) - Set A

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Aniketnaidu13
A
Aniketnaidu13
Community Contributor
Quizzes Created: 1 | Total Attempts: 16,404
Questions: 50 | Attempts: 16,404

SettingsSettingsSettings
Online Exam Practice For Windows Server 2008 Administration (Mod-II) - Set A - Quiz

Hi!
This quiz includes questions of windows server 2008's question bank. . . . Quizes are devided into different sets, and each set have 50 questions. . . . Good luck. . . . :)


Questions and Answers
  • 1. 

    What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?

    • A.

      Directory service

    • B.

      NT directory

    Correct Answer
    A. Directory service
    Explanation
    A directory service allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications. It provides a centralized database that stores and organizes information about these resources, making it easier for users to locate and access what they need. The directory service also ensures that only authorized individuals can access certain resources, enhancing network security. Overall, a directory service plays a crucial role in efficiently managing and securing network resources for businesses.

    Rate this question:

  • 2. 

    A __________ is defined as one or more IP subnets that are connected by fast links.

    • A.

      Domain

    • B.

      Site

    Correct Answer
    B. Site
    Explanation
    A site is defined as one or more IP subnets that are connected by fast links. This means that a site refers to a group of interconnected IP subnets that have high-speed connections between them.

    Rate this question:

  • 3. 

    What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?

    • A.

      Configuration NC

    • B.

      Schema NC

    Correct Answer
    B. Schema NC
    Explanation
    The Schema NC (Naming Context) contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory. It defines the structure and properties of objects that can be stored in the directory. The Schema NC is a critical component of Active Directory as it determines the types of objects that can exist and the attributes they can have. It ensures consistency and uniformity in the way objects are created and modified within the directory.

    Rate this question:

  • 4. 

    What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?

    • A.

      C$

    • B.

      SYSVOL

    Correct Answer
    B. SYSVOL
    Explanation
    SYSVOL is the shared folder that exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide. This folder plays a crucial role in the replication of policies and scripts across the domain, ensuring consistency and uniformity in the network environment. It allows administrators to centrally manage and distribute these files to all domain controllers, making it an essential component of Active Directory and Group Policy infrastructure.

    Rate this question:

  • 5. 

    What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?

    • A.

      Server Core

    • B.

      Minimal Installation Option

    Correct Answer
    A. Server Core
    Explanation
    Server Core is a new feature in Windows Server 2008 that provides a minimal environment for running only specific services and roles. It allows administrators to install and manage only the necessary components, reducing the attack surface and resource usage. This feature is particularly useful for servers that need to be lightweight, have a reduced footprint, and require minimal maintenance. With Server Core, unnecessary features and graphical interfaces are removed, resulting in improved security, performance, and reliability.

    Rate this question:

  • 6. 

    What is the minimum amount of storage space required for the Active Directory installation files?

    • A.

      250 MB

    • B.

      200 MB

    Correct Answer
    B. 200 MB
    Explanation
    The minimum amount of storage space required for the Active Directory installation files is 200 MB. This means that in order to install Active Directory, a computer or server must have at least 200 MB of free storage space available. This is the minimum requirement to ensure that all the necessary files and components are properly installed and functioning.

    Rate this question:

  • 7. 

    When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?

    • A.

      Global Admins

    • B.

      Schema Admins

    Correct Answer
    B. Schema Admins
    Explanation
    Microsoft recommends adding administrators to the Schema Admins group only for the duration of the task when modifying the schema. This is because the Schema Admins group has the necessary permissions and privileges to make changes to the Active Directory schema, which defines the structure and attributes of objects in the directory. By temporarily adding administrators to this group, they can perform the required modifications without granting them unnecessary administrative rights and privileges that could potentially compromise the security and stability of the system.

    Rate this question:

  • 8. 

    When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.

    • A.

      Default-First-Site-Name

    • B.

      Default-Site-Name

    Correct Answer
    A. Default-First-Site-Name
    Explanation
    When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard automatically creates a default site called "Default-First-Site-Name". This site is created to serve as the initial site for the forest and is used for replication and other Active Directory services. It is named "Default-First-Site-Name" to indicate that it is the default site for the first domain controller in the forest.

    Rate this question:

  • 9. 

    What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?

    • A.

      Dcdiag

    • B.

      Netdiag

    Correct Answer
    A. Dcdiag
    Explanation
    DCDiag is a command-line tool used for monitoring Active Directory. It provides functionality that includes performing connectivity and replication tests. This tool allows administrators to diagnose problems with domain controllers and identify issues related to Active Directory connectivity and replication. By running DCDiag, administrators can verify the health of the Active Directory environment and troubleshoot any potential issues that may arise.

    Rate this question:

  • 10. 

    When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.

    • A.

      Bridgehead

    • B.

      Masthead

    Correct Answer
    A. Bridgehead
    Explanation
    Active Directory designates a bridgehead server in each site to act as a gatekeeper in managing site-to-site replication. A bridgehead server is responsible for receiving replication updates from other domain controllers in the site and then distributing those updates to other domain controllers in the same site or in different sites. This ensures efficient and reliable replication of information between sites in an Active Directory environment.

    Rate this question:

  • 11. 

    What defines a chain of site links by which domain controllers from different sites can communicate?

    • A.

      Site link chain

    • B.

      Site link bridge

    Correct Answer
    B. Site link bridge
    Explanation
    A site link bridge is what defines a chain of site links by which domain controllers from different sites can communicate. It allows for the establishment of a logical connection between site links, enabling domain controllers in different sites to communicate with each other. This ensures efficient and reliable communication between domain controllers, facilitating the replication of Active Directory data across multiple sites in a network.

    Rate this question:

  • 12. 

    How many FSMO roles does Active Directory support?

    • A.

      16

    • B.

      5

    Correct Answer
    B. 5
    Explanation
    Active Directory supports five FSMO (Flexible Single Master Operation) roles. These roles include the Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master. Each role is responsible for specific tasks and operations within the Active Directory domain. The Schema Master manages updates and modifications to the Active Directory schema, the Domain Naming Master controls the addition or removal of domains in the forest, the RID Master allocates unique security identifiers (SIDs) to objects, the PDC Emulator handles backward compatibility with older Windows NT systems, and the Infrastructure Master ensures that cross-domain object references are properly updated.

    Rate this question:

  • 13. 

    How many RID Masters can a domain have?

    • A.

      5

    • B.

      1

    Correct Answer
    B. 1
    Explanation
    A domain can have only one RID (Relative Identifier) Master. The RID Master is responsible for assigning unique relative identifiers to each object created in the domain. Having multiple RID Masters would result in conflicts and duplicate identifiers, which would disrupt the functioning of the domain. Therefore, to maintain the integrity and uniqueness of object identifiers, a domain is limited to having only one RID Master.

    Rate this question:

  • 14. 

    What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?

    • A.

      Role seizure

    • B.

      Role separation

    Correct Answer
    A. Role seizure
    Explanation
    Role seizure is the procedure used when a catastrophic failure occurs in a domain controller that holds a Flexible Single Master Operations (FSMO) role, and there is a need to recover that role. In this process, the role is forcibly transferred from the failed domain controller to a healthy one in the domain. This is done to ensure the continuity and stability of the Active Directory environment.

    Rate this question:

  • 15. 

    What special identity group contains all authenticated users and domain guests?

    • A.

      Power Users

    • B.

      Everyone

    Correct Answer
    B. Everyone
    Explanation
    The special identity group "Everyone" contains all authenticated users and domain guests. This group includes all users who have been authenticated by the system, regardless of their specific roles or permissions. By adding users to the "Everyone" group, administrators can grant certain permissions or access rights to a wide range of users without having to individually specify each user.

    Rate this question:

  • 16. 

    __________ name refers to each user’s login name.

    • A.

      SAM account

    • B.

      AD Name

    Correct Answer
    A. SAM account
    Explanation
    The given correct answer is "SAM account." The SAM account refers to each user's login name. In the context of an Active Directory (AD) system, the SAM account is a unique identifier for each user and is used for authentication and access control purposes. It is commonly used in Windows operating systems to manage user accounts and their associated permissions.

    Rate this question:

  • 17. 

    You cannot manually modify the group membership of or view the membership lists of __________ groups.

    • A.

      Domain local

    • B.

      Special identity

    Correct Answer
    B. Special identity
  • 18. 

    What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?

    • A.

      NSLOOKUP

    • B.

      LDIFDE

    Correct Answer
    B. LDIFDE
    Explanation
    LDIFDE (LDAP Data Interchange Format Directory Exchange) can be used to add, delete, or modify objects in Active Directory. It is a command-line tool that allows administrators to import or export data from Active Directory using LDIF files. LDIFDE can also be used to modify the schema if necessary, making it a versatile tool for managing and manipulating Active Directory objects and attributes. NSLOOKUP, on the other hand, is a command-line tool used for querying DNS servers to retrieve information about domain names and IP addresses. It is not used for managing Active Directory objects.

    Rate this question:

  • 19. 

    Which of the following is a benefit of implementing a public key infrastructure (PKI)?

    • A.

      Users no longer need to remember passwords.

    • B.

      All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.

    Explanation
    Implementing a public key infrastructure (PKI) has the benefit of ensuring secure communication and data exchange. With a PKI, users can utilize digital certificates and encryption to authenticate and protect their information. This eliminates the need for users to remember passwords and provides a higher level of security. Additionally, storing information on a smart card makes it challenging for unauthorized individuals to access or use the data, enhancing confidentiality and reducing the risk of data breaches.

    Rate this question:

  • 20. 

    What method of authentication requires a smart card and a PIN to provide more secure access to company resources?

    • A.

      Complex authentication

    • B.

      Two-factor authentication

    Correct Answer
    B. Two-factor authentication
    Explanation
    Two-factor authentication requires the use of two different factors to verify the identity of a user. In this case, the smart card serves as one factor, while the PIN serves as the second factor. By combining something the user has (smart card) with something the user knows (PIN), two-factor authentication provides an extra layer of security compared to single-factor authentication methods. This helps to ensure that only authorized individuals with both the smart card and the correct PIN can access company resources.

    Rate this question:

  • 21. 

    What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?

    • A.

      Smart card enrollment station

    • B.

      Certification Authority (CA

    Correct Answer
    A. Smart card enrollment station
    Explanation
    A smart card enrollment station is a dedicated workstation that allows an administrator or authorized user to preconfigure certificates and smart cards on behalf of a user or workstation. This station enables the administrator to enroll and configure smart cards with the necessary certificates, ensuring that the user or workstation is ready to use the smart card for authentication or other purposes. This process simplifies the deployment and management of smart cards within an organization, improving security and efficiency.

    Rate this question:

  • 22. 

    Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.

    • A.

      97

    • B.

      64

    • C.

      127

    • D.

      142

    Correct Answer
    C. 127
    Explanation
    Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be up to 127 characters in length. This means that users can create passwords with a maximum of 127 characters for these operating systems.

    Rate this question:

  • 23. 

    What is a method of controlling settings across your network?

    • A.

      Group Policy

    • B.

      Active Directory

    Correct Answer
    A. Group Policy
    Explanation
    Group Policy is a method of controlling settings across a network. It allows administrators to manage and enforce specific configurations, security policies, and restrictions on multiple computers or users within a network. By using Group Policy, administrators can centrally manage settings such as access controls, software installation, desktop configurations, and more, ensuring consistency and security across the network. Active Directory, on the other hand, is a directory service used to manage and organize network resources, including users, computers, and groups. While Active Directory can be used in conjunction with Group Policy, it is not specifically a method of controlling settings across a network.

    Rate this question:

  • 24. 

    What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?

    • A.

      Group Policies

    • B.

      Group Policy Settings

    • C.

      Group Policy Objects

    Correct Answer
    C. Group Policy Objects
    Explanation
    Group Policy Objects (GPOs) contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or Organizational Unit (OU). GPOs are used to centrally manage and configure the operating system and applications settings for multiple users and computers in a network. They allow administrators to enforce security policies, manage software installations, and customize user preferences. By linking GPOs to specific sites, domains, or OUs, administrators can ensure that the desired settings are applied to the appropriate objects within the network.

    Rate this question:

  • 25. 

    What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?

    • A.

      Reverse Processing

    • B.

      Switchback Processing

    • C.

      Loopback Processing

    Correct Answer
    C. Loopback Processing
    Explanation
    Loopback Processing allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run. This feature is useful in scenarios where you want to apply different policies to a computer depending on the user who logs in, regardless of the computer's location in the Active Directory hierarchy. With Loopback Processing, the computer policies are reapplied after the user policies, ensuring that the desired configuration is consistently applied.

    Rate this question:

  • 26. 

    Local GPO settings are stored in what folder on a computer?

    • A.

      %systemroot%/System32/GroupPolicy

    • B.

      %systemroot%/System32/Drivers/GroupPolicy

    • C.

      %systemroot%/System32/Drivers/Etc/GroupPolicy

    • D.

      %systemroot%/System/GroupPolicy

    Correct Answer
    A. %systemroot%/System32/GroupPolicy
    Explanation
    Local GPO settings are stored in the folder %systemroot%/System32/GroupPolicy. This folder is located in the system root directory, specifically in the System32 folder. It is the designated location for storing the Group Policy Object (GPO) settings on a computer. GPO settings control various aspects of the computer's configuration and behavior, such as security settings, software installation policies, and user preferences. By storing these settings in the %systemroot%/System32/GroupPolicy folder, they can be easily accessed and applied by the local Group Policy service.

    Rate this question:

  • 27. 

    What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?

    • A.

      Fine-Tuned Password Policies

    • B.

      Fine-Grained Password Policies

    • C.

      Restricted Password Policies

    Correct Answer
    B. Fine-Grained Password Policies
    Explanation
    Fine-Grained Password Policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain. This means that you can have different password requirements for different users or groups within the same domain, providing more flexibility and control over password security.

    Rate this question:

  • 28. 

    Where can you configure the Group Policy refresh interval?

    • A.

      Computer Configuration\\System\\Group Policy

    • B.

      User Configuration\\Administrative Templates\\System\\Group Policy

    • C.

      Computer Configuration\\Administrative Templates\\System\\Group Policy

    • D.

      Computer Configuration\\Administrative Templates\\Group Policy

    Correct Answer
    C. Computer Configuration\\Administrative Templates\\System\\Group Policy
    Explanation
    The Group Policy refresh interval can be configured under Computer Configuration\\Administrative Templates\\System\\Group Policy. This location allows administrators to specify the interval at which Group Policy settings are refreshed on computers in the domain.

    Rate this question:

  • 29. 

    Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?

    • A.

      .exe

    • B.

      .msi

    • C.

      .mse

    • D.

      .inf

    Correct Answer
    B. .msi
    Explanation
    Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into .msi files. The Windows Installer technology provides a standard format for packaging software installations and allows for easy installation, maintenance, and removal of software on Windows operating systems. Group Policy is a feature in Windows Server that allows administrators to manage and enforce settings and configurations across multiple computers in a network. By using .msi files, administrators can easily distribute and install software packages to multiple computers in a controlled and efficient manner.

    Rate this question:

  • 30. 

    Modifications to .msi files require transform files, which have the __________ extension.

    • A.

      .msit

    • B.

      .mse

    • C.

      .msx

    • D.

      .mst

    Correct Answer
    D. .mst
    Explanation
    When making modifications to .msi files, transform files are required. These transform files have the .mst extension.

    Rate this question:

  • 31. 

    When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?

    • A.

      Unrestricted

    • B.

      Restricted

    • C.

      Basic User

    • D.

      Disallowed

    Correct Answer
    C. Basic User
    Explanation
    The option "Basic User" is the correct answer because it allows programs to run that only require resources accessible by normal users. This option prevents any application from running that requires administrative rights, ensuring that only programs that can be run by regular users are allowed.

    Rate this question:

  • 32. 

    What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?

    • A.

      Linked Group Policy Objects

    • B.

      Group Policy Inheritance

    • C.

      Delegation

    • D.

      Management

    Correct Answer
    C. Delegation
    Explanation
    The "Delegation" tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information. This tab allows administrators to assign specific permissions to different groups or users, giving them the ability to manage and control various aspects of Group Policy within an organization.

    Rate this question:

  • 33. 

    What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?

    • A.

      Block Policy Propagation

    • B.

      Block Policy Inheritance

    • C.

      Remove Policy Inheritance

    • D.

      Remove Policy Propagation

    Correct Answer
    B. Block Policy Inheritance
    Explanation
    Block Policy Inheritance is the correct answer because it prevents policy settings from being applied to all child objects at the current level and all subordinate levels. When this setting is enabled, any policy settings that are applied to the parent object will not be inherited by the child objects, effectively blocking the propagation of policies down the hierarchy. This allows for more granular control over policy application and ensures that specific objects or levels are not affected by the parent policies.

    Rate this question:

  • 34. 

    How many WMI filters can be configured per GPO?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Five

    Correct Answer
    A. One
    Explanation
    Only one WMI filter can be configured per Group Policy Object (GPO). This means that a single GPO can have only one WMI filter associated with it. WMI filters are used to apply GPO settings based on certain conditions, such as the operating system version or hardware configuration of the target computer. Having multiple WMI filters per GPO could potentially lead to conflicts or confusion in determining which filter should be applied. Therefore, the correct answer is one.

    Rate this question:

  • 35. 

    To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?

    • A.

      Active Directory Restore

    • B.

      Active Directory Maintenance

    • C.

      Directory Services Maintenance

    • D.

      Directory Services Restore

    Correct Answer
    D. Directory Services Restore
    Explanation
    To perform a System State restore in Windows Server 2008, you will boot the DC into Directory Services Restore mode. This mode allows the server to start with only the essential services needed to perform a system state restore, such as Active Directory. It disables other non-essential services and drivers, ensuring a clean and focused environment for the restore process. This mode is specifically designed for performing Active Directory restores and is essential for recovering the directory services in case of any issues or failures.

    Rate this question:

  • 36. 

    In Windows Server 2008, you must back up __________ rather than only backing up the System State data.

    • A.

      Critical volumes

    • B.

      System volumes

    • C.

      MBR records

    • D.

      MX records

    Correct Answer
    A. Critical volumes
    Explanation
    In Windows Server 2008, it is necessary to back up critical volumes rather than only backing up the System State data. This is because critical volumes contain important data and configurations that are essential for the server's operation. By backing up critical volumes, all the necessary files and settings are preserved, ensuring that the server can be restored to a functional state in case of any data loss or system failure.

    Rate this question:

  • 37. 

    To back up Active Directory, you must install what feature from the Server Manager console?

    • A.

      Active Directory Backup Client

    • B.

      Windows Backup Utility

    • C.

      Windows Server Backup

    • D.

      BackupExec

    Correct Answer
    C. Windows Server Backup
    Explanation
    To back up Active Directory, you need to install the "Windows Server Backup" feature from the Server Manager console. This feature provides a reliable and efficient way to create backups of Active Directory data and settings. It allows you to schedule regular backups, perform full or incremental backups, and restore the Active Directory data when needed. By using Windows Server Backup, you can ensure the safety and availability of your Active Directory data in case of any unexpected events or data loss.

    Rate this question:

  • 38. 

    What is the process by which one DNS server sends a name resolution request to another DNS server?

    • A.

      Resolution

    • B.

      Translation

    • C.

      Referral

    • D.

      Propagation

    Correct Answer
    C. Referral
    Explanation
    Referral is the process by which one DNS server sends a name resolution request to another DNS server. When a DNS server receives a query for a domain name that it does not have information about, it refers the request to another DNS server that might have the required information. This process continues until the requested domain name is resolved or until a DNS server with the necessary information is found.

    Rate this question:

  • 39. 

    What DNS server contains no zones and hosts no domains?

    • A.

      Secondary domain controller

    • B.

      Global catalog server

    • C.

      Secondary DNS server

    • D.

      Caching-only server

    Correct Answer
    D. Caching-only server
    Explanation
    A caching-only server is a DNS server that does not contain any zones and does not host any domains. Its main function is to cache DNS information from other DNS servers to improve the efficiency and speed of DNS queries. It does not perform any authoritative functions and only serves as a temporary storage for frequently accessed DNS records.

    Rate this question:

  • 40. 

    What Windows Server 2008 service can you use to protect sensitive data on a Windows network?

    • A.

      AD FS

    • B.

      AD FTP

    • C.

      AD FSMO

    • D.

      AD RMS

    Correct Answer
    D. AD RMS
    Explanation
    AD RMS stands for Active Directory Rights Management Services. It is a Windows Server 2008 service that can be used to protect sensitive data on a Windows network. AD RMS allows users to define access permissions and usage rights for their documents and emails, ensuring that only authorized individuals can access and modify the protected content. It provides encryption and persistent protection for sensitive information, even when it is shared outside the organization's network. AD RMS helps to prevent unauthorized access, copying, and distribution of sensitive data, enhancing the overall security of the Windows network.

    Rate this question:

  • 41. 

    What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?

    • A.

      Identity Lifecycle Management

    • B.

      General Lifecycle Management

    • C.

      Microsoft Lifecycle Management

    • D.

      Lifecycle of Software Management

    Correct Answer
    A. Identity Lifecycle Management
    Explanation
    Identity Lifecycle Management enables network administrators and owners to configure access rights for users throughout their entire lifecycle within an organization. This includes managing user identities, provisioning and deprovisioning user accounts, assigning and revoking access privileges, and ensuring compliance with security policies. It helps streamline the process of granting and managing user access, ensuring that users have the appropriate level of access based on their roles and responsibilities within the organization.

    Rate this question:

  • 42. 

    What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?

    • A.

      RSA SecureID

    • B.

      Digital certificates

    • C.

      Smart cards

    • D.

      Biometric device

    Correct Answer
    C. Smart cards
    Explanation
    Smart cards are small physical devices, typically the size of a credit card or keychain fob, on which a digital certificate is installed. These cards provide secure storage for the digital certificate and can be used for various purposes such as authentication, access control, and secure data storage. They are commonly used in industries like banking, healthcare, and government where strong security measures are required. RSA SecureID, digital certificates, and biometric devices are not specifically mentioned as small physical devices on which a digital certificate is installed, making them incorrect options.

    Rate this question:

  • 43. 

    What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?

    • A.

      Web Enrollment

    • B.

      Web Responder

    • C.

      Enterprise CA

    • D.

      Online Responder

    Correct Answer
    D. Online Responder
    Explanation
    An Online Responder is a service that responds to requests from clients regarding the revocation status of a specific certificate. It returns a digitally signed response that indicates the current status of the certificate. This service is commonly used in Public Key Infrastructure (PKI) environments to provide real-time information about the validity of certificates.

    Rate this question:

  • 44. 

    A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.

    • A.

      Domain controller

    • B.

      Domain manager

    • C.

      Global catalog

    • D.

      DNS server

    Correct Answer
    A. Domain controller
    Explanation
    A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a domain controller. This is because a domain controller is responsible for authenticating users, managing permissions, and maintaining the Active Directory database, which contains information about all the objects in the domain, such as users, computers, and groups.

    Rate this question:

  • 45. 

    What protocol has become an industry standard that enables data exchange between directory services and applications?

    • A.

      NTDS

    • B.

      LDAP

    • C.

      NDIS

    • D.

      AD

    Correct Answer
    B. LDAP
    Explanation
    LDAP (Lightweight Directory Access Protocol) has become an industry standard for enabling data exchange between directory services and applications. It provides a standardized way for applications to access and manipulate directory information stored in directory services, such as user accounts, groups, and organizational structures. LDAP is widely used in various systems and applications, including email clients, web browsers, and network management tools, making it the correct answer in this context.

    Rate this question:

  • 46. 

    What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

    • A.

      A records

    • B.

      MX records

    • C.

      SRV records

    • D.

      SOA records

    Correct Answer
    C. SRV records
    Explanation
    SRV records, or Service records, within DNS allow clients to locate an Active Directory domain controller or global catalog. These records provide information about specific services available on a particular server, such as the domain controller or global catalog. By querying the SRV records, clients can obtain the necessary information to connect to the appropriate server and access the required services within the Active Directory domain. A records, MX records, and SOA records do not specifically provide the required information for locating domain controllers or global catalogs.

    Rate this question:

  • 47. 

    What is the process of replicating DNS information from one DNS server to another?

    • A.

      Replication

    • B.

      DNS push

    • C.

      Zone transfer

    • D.

      DNS update

    Correct Answer
    C. Zone transfer
    Explanation
    Zone transfer is the process of replicating DNS information from one DNS server to another. It involves transferring the entire zone file, which contains all the DNS records for a specific domain, from the primary DNS server to the secondary DNS server. This ensures that both servers have the same up-to-date DNS information, allowing for redundancy and improved fault tolerance in case one server becomes unavailable.

    Rate this question:

  • 48. 

    What type of trust relationship allows you to create two-way transitive trusts between separate forests?

    • A.

      Shortcut

    • B.

      Cross-forest

    • C.

      External

    • D.

      Real

    Correct Answer
    B. Cross-forest
    Explanation
    A cross-forest trust relationship allows for the creation of two-way transitive trusts between separate forests. This means that users in one forest can access resources in the other forest, and vice versa. This type of trust relationship is commonly used when organizations have multiple forests and need to enable collaboration and resource sharing between them. It provides a secure and efficient way to establish trust and communication between separate Active Directory environments.

    Rate this question:

  • 49. 

    What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

    • A.

      Primary lookup

    • B.

      Secondary lookup

    • C.

      Forward lookup

    • D.

      Reverse lookup

    Correct Answer
    C. Forward lookup
    Explanation
    A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. In a forward lookup, the DNS server resolves a hostname to its corresponding IP address. This allows devices to communicate with each other using domain names instead of IP addresses, making it easier for users to remember and access resources on a network.

    Rate this question:

  • 50. 

    What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

    • A.

      Primary lookup

    • B.

      Secondary lookup

    • C.

      Forward lookup

    • D.

      Reverse lookup

    Correct Answer
    C. Forward lookup
    Explanation
    A forward lookup zone is necessary for computer hostname-to-IP address mappings. This type of zone is used for name resolution by various services. It allows the translation of hostnames to their corresponding IP addresses, enabling devices to communicate with each other on a network. By performing a forward lookup, a computer can determine the IP address associated with a given hostname, allowing for successful communication and data transfer.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 01, 2012
    Quiz Created by
    Aniketnaidu13
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.