Utl-pmkvy-ia-3(A)

100 Questions | Attempts: 356
Share

SettingsSettingsSettings
Utl-pmkvy-ia-3(A) - Quiz

.


Questions and Answers
  • 1. 

    Your IT Company is constantly changing, with new users coming and going throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts?

    • A.

      Dsmod

    • B.

      LDIFDE

    • C.

      Netsh

    • D.

      Dcpromo

    Correct Answer
    B. LDIFDE
  • 2. 

    What type of DNS record is the record that points out the location of the mail server?

    • A.

      PTR

    • B.

      MX

    • C.

      SVR

    • D.

      SOA

    Correct Answer
    B. MX
  • 3. 

    You install Active Directory on a server. You want it to be a separate domain that is part of an existing forest but containing a namespace separate from the forest where you are installing it. What is this type of domain called?

    • A.

      A replica

    • B.

      A child domain

    • C.

      A forest root

    • D.

      A tree root

    Correct Answer
    D. A tree root
  • 4. 

    You are installing Active Directory on a new domain controller and selecting options for placing the database and log files. Which of the following options would produce the optimum performance of these files? Each answer represents part of the solution.(Choose two.)

    • A.

      Placing them on the same NTFS partition

    • B.

      Ensuring plenty of hard disk space for these files to expand

    • C.

      Placing them on NTFS partitions located on separate physical disks

    • D.

      Restricting them to small partitions to control their size

    Correct Answer
    C. Placing them on NTFS partitions located on separate physical disks
  • 5. 

    Which of the following is the most appropriate scenario where you would want to install a read-only domain controller?

    • A.

      In a branch office where physical security might be less than optimum

    • B.

      In the head office near the receptionist’s desk

    • C.

      In the server room where the forest root domain is located and you need an optimum location for the schema master and domain naming master

    • D.

      In a branch office server room where you need to place the infrastructure master, RID master, and PDC emulator close to clients requiring their services

    Correct Answer
    A. In a branch office where physical security might be less than optimum
  • 6. 

    Which of the following are valid domain and forest functional levels for a Windows Server 2008 domain?

    • A.

      Windows 2000 mixed

    • B.

      Windows 2000 native

    • C.

      Windows Server 2003 mixed

    • D.

      Windows Server 2003 /2008

    Correct Answer
    D. Windows Server 2003 /2008
  • 7. 

    How can you create a user object with the help of a single command?

    • A.

      The Dsadd command

    • B.

      The Create Method

    • C.

      The Create-item cmdlet

    • D.

      The set info method

    Correct Answer
    A. The Dsadd command
  • 8. 

    You are the administrator of an active directory domain. A user complains to you that he is unable to change his password. No other users have this issue. What is the most likely cause of the problem?

    • A.

      Insufficient login credentials

    • B.

      He is a member of the Administrators group

    • C.

      He is not a member of the domain

    • D.

      The property “User cannot change password” has been enabled when it was created

    Correct Answer
    D. The property “User cannot change password” has been enabled when it was created
  • 9. 

    Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)?

    • A.

      Forest, Domain, Tree, Branch, Computer

    • B.

      Computer, Forest, Domain, Tree

    • C.

      Forest, Tree, Domain, Computer

    • D.

      Forest, Tree, Computer, Domain

    Correct Answer
    C. Forest, Tree, Domain, Computer
  • 10. 

    Which of the following groupings of linked domains would be a tree?

    • A.

      Mycorp.com and newcorp.com

    • B.

      Mycorp.com and newsite.mycorp.com

    • C.

      Marketing and Talent

    • D.

      Windows 2000 and Window NT

    Correct Answer
    B. Mycorp.com and newsite.mycorp.com
  • 11. 

    A user granted Domain Administrator access over the domain dallas.mycorp.com may administer which of the following groupings?

    • A.

      Mycorp.com within the central USA site

    • B.

      Dallas.mycorp.com within the mycorp.com domain

    • C.

      Austin.mycorp.com within the mycorp.com domain

    • D.

      Managers organizational unit within the dallas.mycorp.com Sales organizational unit

    Correct Answer
    B. Dallas.mycorp.com within the mycorp.com domain
  • 12. 

    Which of the following commands will force an update of group policy of computers on the domain Airtel?

    • A.

      GPUPDATE –airtel/all

    • B.

      GPFORCE /airtel

    • C.

      GPUPDATE /force –all

    • D.

      GPUPDATE /force

    Correct Answer
    D. GPUPDATE /force
  • 13. 

    Groups are considered an organizing component of Active Directory

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 14. 

    You run the Add Roles Wizard in Server Manager to add the AD DS role.  After the wizard is finished, you check the Administrative Tools folder but don't find any of the Active Directory management tools.  What should you do?

    • A.

      ADSI Edit

    • B.

      Run Dcpromo.exe

    • C.

      Global catalog

    • D.

      None of the above

    Correct Answer
    B. Run Dcpromo.exe
  • 15. 

    Which of the following is a container object?

    • A.

      Domain & OU

    • B.

      Users

    • C.

      Computers

    • D.

      Groups

    Correct Answer
    A. Domain & OU
  • 16. 

    To which of the following can a GPO be linked?

    • A.

      Domains

    • B.

      Sites

    • C.

      Leaf object

    • D.

      Container object

    Correct Answer
    B. Sites
  • 17. 

    If a policy is defined in a GPO linked to a domain, and that policy is defined with a different setting in a GPO linked to an OU, which is true by default?

    • A.

      The policy setting in the GPO linked to the OU is applied

    • B.

      The policy setting in the GPO linked to the domain is applied

    • C.

      Neither policy setting is not applied, nor is an error message generated

    • D.

      The policy in both GPOs defaults to Not Defined so that no conflict exists

    Correct Answer
    A. The policy setting in the GPO linked to the OU is applied
  • 18. 

    The policy in both GPOs defaults to Not Defined so that no conflict exists

    • A.

      Similar to a list of information in a text file

    • B.

      Similar to a database program but with the capability to manage objects in it

    • C.

      A program for managing the user interface on a server

    • D.

      A program for managing folders, files, and permissions on a distributed server

    Correct Answer
    B. Similar to a database program but with the capability to manage objects in it
  • 19. 

    At about what interval are GPOs updated on domain controllers?

    • A.

      5 seconds

    • B.

      15 minutes

    • C.

      50 minutes

    • D.

      5 hours

    Correct Answer
    B. 15 minutes
  • 20. 

    When configuring GPOs, which node contains the majority of account policies?

    • A.

      Computer Configuration node, Windows Settings folder, Security Settings node

    • B.

      Computer Configuration node, Administrative Templates folder, Windows Components node

    • C.

      The User Configuration node, Administrative Templates folder

    • D.

      The User Configuration node, Windows Settings folder, Security Settings node

    Correct Answer
    A. Computer Configuration node, Windows Settings folder, Security Settings node
  • 21. 

    What are the two default GPOs that are created when Active Directory is installed?

    • A.

      Default Directory Policy and Default Domain Policy

    • B.

      Default Domain Controllers Policy and Default Directory Policy

    • C.

      Default Domain-Wide Policy and Default Active Directory Policy

    • D.

      Default Domain Policy and Default Domain Controllers Policy

    Correct Answer
    D. Default Domain Policy and Default Domain Controllers Policy
  • 22. 

    Under what circumstances are the built-in user accounts no longer local user accounts?

    • A.

      When accessing a network resource in a workgroup environment

    • B.

      After installing Active Directory

    • C.

      This is impossible; built-in user accounts cannot be converted

    • D.

      When using dsadd on the built-in accounts

    Correct Answer
    B. After installing Active Directory
  • 23. 

    After receiving several support calls, you have decided to prevent users of the DomA-Group from being able to access the Control Panel regardless of what machine they log into. Where would you configure this setting?

    • A.

      The User Configuration node, Windows Settings folder

    • B.

      The Computer Configuration node, Administrative templates folder

    • C.

      The Computer Configuration node, Windows Settings folder

    • D.

      The User Configuration node, Administrative Templates folder

    Correct Answer
    D. The User Configuration node, Administrative Templates folder
  • 24. 

    An Active Directory container used to organize a network’s users and resources into logical administrative units

    • A.

      Organizational Units

    • B.

      Users Units

    • C.

      Container object

    • D.

      Leaf object

    Correct Answer
    A. Organizational Units
  • 25. 

    The main purpose of Active Directory is to ________.

    • A.

      Provide authentication and authorization to users and computers

    • B.

      Provide File and Print services

    • C.

      Give administrators the ability to control access to restricted hardware

    • D.

      Allow users to organize their file systems into a cohesive and high performance directory

    Correct Answer
    A. Provide authentication and authorization to users and computers
  • 26. 

    What is the address given to a computer connected to a network called?

    • A.

      System Address

    • B.

      SYSID

    • C.

      Process ID

    • D.

      Structure

    Correct Answer
    D. Structure
  • 27. 

    The software used to drive microprocessor-based systems is called:

    • A.

      Assembly language programs

    • B.

      Firmware

    • C.

      BASIC interpreter instructions

    • D.

      Flowchart instructions

    Correct Answer
    A. Assembly language programs
  • 28. 

    A microprocessor unit, a memory unit, and an input/output unit form a:

    • A.

      CPU

    • B.

      Compiler

    • C.

      Microcomputer

    • D.

      ALU

    Correct Answer
    C. Microcomputer
  • 29. 

    Index hole is related to?

    • A.

      Hard disk

    • B.

      Floppy disk

    • C.

      Printer

    • D.

      CPU

    Correct Answer
    B. Floppy disk
  • 30. 

    Secondry memory is also know as?

    • A.

      Auxiliary memory

    • B.

      Primery memory

    • C.

      Virtual memory

    • D.

      None of above

    Correct Answer
    A. Auxiliary memory
  • 31. 

    It holds the address of the active memory?

    • A.

      MAR

    • B.

      MBR

    • C.

      PC

    • D.

      AR

    Correct Answer
    A. MAR
  • 32. 

    In latest generation computers, the instructions are executed

    • A.

      Parallel only

    • B.

      Sequentially only

    • C.

      Both sequentially and parallel

    • D.

      All of above

    Correct Answer
    C. Both sequentially and parallel
  • 33. 

    Which printer is very commonly used for desktop publishing?

    • A.

      Laser printer

    • B.

      Inkjet printer

    • C.

      Daisywheel printer

    • D.

      Dot matrix printer

    Correct Answer
    A. Laser printer
  • 34. 

    Which of the following will happen when data is entered into a memory location?

    • A.

      It will add to the content of the location

    • B.

      It will change the address of the memory location

    • C.

      It will erase the previous content

    • D.

      It will not be fruitful if there is already some data at the location

    Correct Answer
    C. It will erase the previous content
  • 35. 

    ____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

    • A.

      NNTP

    • B.

      NTP

    • C.

      PING

    • D.

      ARP

    Correct Answer
    B. NTP
  • 36. 

    A ____ is a repeater with more than one output port

    • A.

      Bridge

    • B.

      Switch

    • C.

      hub

    • D.

      Router

    Correct Answer
    C. hub
  • 37. 

    ____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

    • A.

      Routers

    • B.

      Switches

    • C.

      Gateways

    • D.

      Broadcast domains

    Correct Answer
    C. Gateways
  • 38. 

    A physical topology ____.

    • A.

      Specifies device types

    • B.

      Depicts a network in broad scope

    • C.

      Specifies connectivity methods

    • D.

      Specifies addressing schemes

    Correct Answer
    B. Depicts a network in broad scope
  • 39. 

    The most common logical topologies are ____ and ring.

    • A.

      Bus

    • B.

      Star

    • C.

      Wired

    • D.

      Hybrid

    Correct Answer
    A. Bus
  • 40. 

    NICs contain a(n) ____ which transmits and receives data signals.

    • A.

      Keyboard port

    • B.

      Mouse port

    • C.

      Data transceiver

    • D.

      All of above

    Correct Answer
    C. Data transceiver
  • 41. 

    TCP is a(n)___ sub protocol.

    • A.

      Open-ended

    • B.

      indiscriminating

    • C.

      Connection-oriented

    • D.

      Connectionless

    Correct Answer
    C. Connection-oriented
  • 42. 

    Traditional switches operate at the ____ layer of the OSI model.

    • A.

      Physical

    • B.

      Data link

    • C.

      Network

    • D.

      Session

    Correct Answer
    B. Data link
  • 43. 

    The sub protocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment and more than one type of network throughout a router is ____

    • A.

      TCP

    • B.

      ICMP

    • C.

      UDP

    • D.

      IP

    Correct Answer
    D. IP
  • 44. 

    By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.

    • A.

      Onboard

    • B.

      PCIe

    • C.

      ExpressCard

    • D.

      ISA

    Correct Answer
    B. PCIe
  • 45. 

    To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

    • A.

      RIP (Routing Information Protocol)

    • B.

      STP (Spanning Tree Protocol)

    • C.

      BGP (Border Gateway Protocol)

    • D.

      OSPF (Open Shortest Path First) protocol

    Correct Answer
    B. STP (Spanning Tree Protocol)
  • 46. 

    In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    B. B
  • 47. 

    The default subnet mask for a Class B network is ____.

    • A.

      255.0.0.0

    • B.

      255.255.0.0

    • C.

      255.255.255.0

    • D.

      255.255.255.255

    Correct Answer
    B. 255.255.0.0
  • 48. 

    On an Ethenet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

    • A.

      Collision domain

    • B.

      Crash domain

    • C.

      Interference domain

    • D.

      Duplicate domain

    Correct Answer
    A. Collision domain
  • 49. 

    A ____ is a multiport connectivity device that directs data between nodes on a network

    • A.

      Switch

    • B.

      Bridge

    • C.

      Router

    • D.

      Gateway

    Correct Answer
    C. Router
  • 50. 

    In IPv4 addressing, each IP address is a unique ____ number

    • A.

      12-bit

    • B.

      32-bit

    • C.

      64-bit

    • D.

      128-bit

    Correct Answer
    B. 32-bit

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2016
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 04, 2016
    Quiz Created by
    Ramvignesh.nt

Related Topics

Back to Top Back to top
Advertisement