Windows Server 2003

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Exelias
E
Exelias
Community Contributor
Quizzes Created: 1 | Total Attempts: 677
| Attempts: 677 | Questions: 42
Please wait...
Question 1 / 42
0 %
0/100
Score 0/100
1.  The person nominated in the Name field of the Managed By tab of the computer accounts properties must exist in Active Directory.

Explanation

The statement is true because in order for the person nominated in the Name field of the Managed By tab of the computer accounts properties to exist in Active Directory, they must be a valid user or group within the Active Directory system. This ensures that the person or group assigned as the manager or administrator of the computer account has the necessary permissions and access rights to perform their duties effectively.

Submit
Please wait...
About This Quiz
Windows Server 2003 Quizzes & Trivia

Reckon you know about computers? In this quiz, we’ll be putting your knowledge of Windows 2003 Server 70-290, chapters one through four to the test. Test all your... see moreknowledge on remote desktop, active directories and much more in this one! see less

2. In an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers that prevent them from being overwritten during the next replication pass.

Explanation

During an authoritative restore of Active Directory, the objects in the Active Directory database are restored with updated sequence numbers. These sequence numbers ensure that the restored objects are considered as the most recent version and prevent them from being overwritten during the next replication pass. This allows the restored objects to have higher priority and authority over other replicas, ensuring that the restored data remains intact and unaffected by subsequent replication processes. Therefore, the statement is true.

Submit
3. When you use Dsadd to create a computer account, the DN must be surrounded by quotation marks in order for the account to be created successfully

Explanation

When using Dsadd to create a computer account, the DN (Distinguished Name) does not need to be surrounded by quotation marks for the account to be created successfully. Quotation marks are not required in this case.

Submit
4. Which of the following commands creates a computer account for computer1.sales .contoso.com?

Explanation

The correct answer is "dsadd computer CN=computer1,CN=sales,DC=contoso,DC=com". This command creates a computer account for "computer1.sales.contoso.com" by using the "dsadd computer" command, followed by the distinguished name (DN) of the computer account. The DN specifies the location of the computer account in the Active Directory hierarchy, including the domain and organizational units (OU).

Submit
5. Before you create a domain controller, a DNS server must be available on the network.

Explanation

The statement is false because a DNS server is not required to be available on the network before creating a domain controller. While it is recommended to have a DNS server for proper functioning of a domain controller, it is not a prerequisite. A domain controller can be created without a DNS server, but it may result in limited functionality and potential issues with name resolution and domain services.

Submit
6. When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does not create a logical printer device for it.

Explanation

When you install a printer that is connected directly to the Windows Server 2003 system, the installation process does create a logical printer device for it. This means that even though the printer is physically connected to the server, it is still recognized as a separate device and can be accessed and managed accordingly. Therefore, the statement "the installation process does not create a logical printer device for it" is false.

Submit
7. On a Windows Server 2003 system, where do you go to join the computer to a domain?

Explanation

To join a computer to a domain on a Windows Server 2003 system, you need to go to Control Panel, then click on System, and finally select Computer Name. In this section, you will find the option to join the computer to a domain.

Submit
8. Which of the following media has the largest data storage capacity?

Explanation

DVD has the largest data storage capacity among the given options. DVDs can store up to 4.7 GB or more of data, depending on the type and format, such as single-layer or dual-layer discs. This is significantly higher than the storage capacity of a CD, which can hold up to 700 MB of data, and a Zip or Jaz cartridge, which typically have capacities ranging from 100 MB to 2 GB. Therefore, DVD is the correct answer for the media with the largest data storage capacity.

Submit
9. A user is assigned the Change share permission to the \\SERVER2\DATA share that represents the C:\Data folder on Server2. The user connects to the DATA share across the network and opens a file from the \\SERVER2\DATA\SALES folder. He then decides that he no longer needs that file, and he tries to delete it. However, he is unable to do so and receives an error. Which of the following is a possible explanation for this?

Explanation

The possible explanation for the user being unable to delete the file is that NTFS permissions are restricting the user's access to the folder. This means that the user does not have the necessary permissions to perform the delete operation on the file.

Submit
10. You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?

Explanation

To install and update the printer drivers, the network administrator should update the drivers for both Windows Server 2003 and Windows 98 on the Windows Server 2003 systems. Additionally, they should install the Windows 98 drivers on the client systems. This ensures that both the server and the client systems have the updated drivers necessary for the printers to function properly.

Submit
11. You are the network administrator for a bank. The network comprises 3 Windows Server 2003 systems, 23 Windows 98 client systems, 3 Windows NT 4 systems, and 14 Windows XP Professional systems. You have one laser printer that is connected directly to the network. One of the servers is configured as a print server for the printer, and the Windows 98 and Windows XP Professional systems all have a logical printer configured that connects to the printer via the print server. The Windows NT 4 workstation systems print directly to the printer across the network. You have just purchased a new printer and are in the process of configuring it. The users on the Windows NT 4 workstation systems do not need to access it. The new printer will be attached directly to the print server by a parallel interface. What platforms do you install drivers for when you configure the printer?

Explanation

The correct answer is Windows Server 2003, Windows XP Professional, and Windows 98. This is because the print server is responsible for handling print jobs from the Windows 98 and Windows XP Professional systems, so drivers need to be installed on those platforms. Additionally, the Windows Server 2003 system itself needs drivers installed for the new printer as well. The Windows NT 4 systems do not need access to the new printer, so drivers do not need to be installed on those platforms.

Submit
12. You are troubleshooting a problem with a Windows Server 2003 system whereby users cannot connect to the server. The server itself appears to be running, but you notice that there is no link light on the port of the hub into which the server is connected. As a result, you suspect that the network card in the server may have failed. Where would you look to see events related to the network card?

Explanation

The System log of Event Viewer is the correct answer because it contains events related to the overall system operation, including hardware and driver issues. Since the problem is suspected to be related to the network card, the System log would be the most appropriate place to look for any relevant events or error messages that could indicate a failure or malfunction of the network card. The Network log would not necessarily provide information about hardware issues, while the Application log and Security log are not directly related to network card problems.

Submit
13. A user calls you because he cannot log on to the system. After verifying his identity, you determine that he recently returned from vacation and is unsure of his password. You decide to reset the password. How do you do accomplish this?

Explanation

To reset the password for the user who cannot log on to the system, you need to go to the Active Directory Users And Computers MMC snap-in. From there, select the user and choose the "Reset Password" option from the Action menu. Enter the new password and confirm it by retyping it in the Confirm Password box. Finally, click OK to apply the changes. This process will reset the user's password and allow them to log on to the system with the new password.

Submit
14. You are the network administrator for a small computer distributor. The network comprises a single Windows Server 2003 system, which is configured as a domain controller, and 17 Windows XP Professional workstations. There is a single high-performance laser printer, which is directly connected to the network. The Windows Server 2003 system acts as a print server for the device, with a single logical printer. You are due to take a week’s vacation, and although you anticipate few problems, you want to give a user with some technical expertise the ability to pause and restart the printer if a printing problem arises. You also want to allow him to manage jobs in the print queue other than his own. To give him the necessary rights, you want to make a single group assignment for the user. If possible, though, you do not want to add him to a group that grants him more rights than he needs. Which of the following predefined Active Directory groups do you add him to?

Explanation

The correct answer is Print Operators. By adding the user to the Print Operators group, they will have the necessary rights to pause and restart the printer if a printing problem arises, as well as manage jobs in the print queue other than their own. This group specifically grants the user the required permissions for printer management without granting them more rights than necessary.

Submit
15. You are the network administrator for a telecommunications company in Mobile, Alabama. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. The company employs 134 people, and all of them have a Windows XP Professional system. One morning, you get a call from a user who has received the following error message: Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance. The user logged on to the system without any problem the previous day, and you have received no other reports of users experiencing problems. You reset the computer account in Active Directory Users And Computers, but the user still cannot connect to log on to the domain. Which of the following do you try next?

Explanation

In this scenario, the user is unable to connect to the domain and has already tried resetting the computer account in Active Directory Users And Computers with no success. The next step would be to change the computer system's membership to a workgroup and then rejoin it to the domain. This can help troubleshoot any potential issues with the computer's connection to the domain and ensure that the computer account is properly authenticated and connected to the domain.

Submit
16. Which of the following tasks can be performed with the Full Control share permission but not the Change share permission?

Explanation

With the Full Control share permission, a user can perform all tasks related to managing the file, including changing the name of the file, changing the contents of the file, and deleting the file. However, the user cannot change file permissions with the Change share permission. This means that while they can make changes to the file itself, they do not have the authority to modify the access rights and permissions associated with the file.

Submit
17. What does the Server: Bytes Total/Sec Performance console counter reflect?

Explanation

The Server: Bytes Total/Sec Performance console counter reflects the amount of data sent and received by the server over all of its network interfaces. This counter measures the total amount of data, in bytes, that is being transmitted to and from the server through its network connections. It provides insight into the network traffic and can help monitor and analyze the server's network performance.

Submit
18. What utility do you use to mark specific Active Directory objects as authoritative?

Explanation

Ntdsutil.exe is the utility used to mark specific Active Directory objects as authoritative. This utility is a command-line tool that allows administrators to manage and control various aspects of the Active Directory database. By using Ntdsutil.exe, administrators can mark specific objects as authoritative, which means that these objects have the highest priority in terms of replication and will overwrite any conflicting changes from other replicas. This utility is commonly used in scenarios where data integrity and consistency are crucial, such as during disaster recovery or when resolving conflicts in a multi-site environment.

Submit
19. On a domain controller, members of the Power Users group can create user and group accounts and modify the users and groups they have created.

Explanation

Members of the Power Users group on a domain controller do not have the ability to create user and group accounts or modify the users and groups they have created. This privilege is typically reserved for administrators or other higher-level user roles. Therefore, the statement is false.

Submit
20. You can use the Ping utility to prove that the printer is connected to the network, powered on, and online.

Explanation

The statement is false because the Ping utility is used to test network connectivity between devices by sending ICMP echo requests and receiving ICMP echo replies. It cannot be used to directly prove that a printer is connected to the network, powered on, and online. To verify printer connectivity, one would typically need to check the printer's status or perform a test print.

Submit
21. You are the network administrator for a small company that develops integrated circuit chips for mobile communications manufacturers. The company network comprises a single Windows Server 2003 system that provides file and print services to the company’s 25 users. Three of the users are working on a top-secret project. They require a folder on the server that only they can access. Auditing is enabled on the server, but the manager wants to make sure that no one, including the Administrator, can access the files except the three engineers working on the project. The manager asks you to remove all entries from the ACL for the folder for users, groups, and special identities other than the three engineers. Will this prevent all others from seeing or opening the files in the folder?

Explanation

If all entries from the ACL for the folder are removed for users, groups, and special identities other than the three engineers, someone else might still be able to open or see the files. However, since auditing is enabled on the server, the administrator will be able to track and monitor any access or attempts to access the folder. This means that even though others may be able to access the files, the administrator will be able to tell if this has occurred through the auditing logs.

Submit
22. You are reconfiguring a SQL Server database application on a member server. The reconfigurations seem to go smoothly, but after you have finished, a user calls you to report that they are having an issue accessing certain records in the database. In which of the following places are you most likely to look for events related to this problem?

Explanation

In the Application log of Event Viewer, you are most likely to look for events related to the problem of accessing certain records in the database. The Application log contains events that are generated by applications or programs on the server, including SQL Server. Therefore, it is the most relevant place to check for any errors or issues that could be causing the problem reported by the user. The System log may contain more general system-related events, while the Database log and Security log may not provide specific information about application-level issues.

Submit
23. Where do you change the scope?

Explanation

The scope of a group in Active Directory and Computers can be changed in the General properties tab. This tab allows administrators to modify various settings related to the group, including its scope. By changing the scope, administrators can control the visibility and accessibility of the group within the Active Directory environment.

Submit
24. What security principal is assigned as the owner of files and folders created by the operating system?




Explanation

The Administrators group is assigned as the owner of files and folders created by the operating system. This group is a built-in security group in Windows that has full control over the system and all files and folders on it. By assigning the Administrators group as the owner, it ensures that members of this group have the necessary permissions to manage and control the files and folders.

Submit
25. You are the network administrator for a small book distribution company. The network comprises 2 Windows Server 2003 systems, 3 Windows 2000 Professional workstations, and 11 Windows 98 systems. The company uses two laser printers that are connected directly to the network. One of the Windows Server 2003 systems is configured as the print server for both printers. You have subscribed to an e-mail notification system provided by the printer manufacturer, which informs you that new printer drivers are available for Windows 98 and Windows Server 2003. No new drivers are available for Windows 2000. Which of the following procedures do you follow to install and update the printer drivers?

Explanation

To install and update the printer drivers, the network administrator should update the drivers for both Windows Server 2003 and Windows 98 on the Windows Server 2003 systems. Additionally, they should install the Windows 98 drivers on the client systems. This ensures that both the server and the client systems have the necessary drivers to communicate with the printers.

Submit
26. Which of the following backup types does not alter the archive bit on a newly created file?

Explanation

Differential backup type does not alter the archive bit on a newly created file. Differential backups only back up the files that have changed since the last full backup, regardless of whether the archive bit is set or not. This means that the archive bit remains unchanged for newly created files, making it easier to identify which files have been modified since the last full backup.

Submit
27. After you create a new printer and share it out, users can start printing to the device even if you have not made any permission assignments for the printer. How is this possible?

Explanation

When a new printer is created and shared out, the default permission assignment is set to "Everyone, Print." This means that all users, regardless of their specific permissions, have the ability to print to the device. This allows for easy and immediate access to the printer without the need for additional permission assignments.

Submit
28. You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?

Explanation

The most likely cause of the problem is that the shares that the users used to connect to the server were removed. This would explain why the users are unable to access the sales order-processing system and the inventory database. Without the shares, the applications cannot be accessed. The other options, such as the NTFS permissions being reset or the ACLs being empty, do not directly address the issue of the shares being removed. Similarly, the option about the shares being set to deny access as a security precaution does not align with the fact that the shares were previously set to Full Control for the Everyone special identity.

Submit
29. You are the network administrator for a property development company in Salt Lake City, UT. You have a single Windows Server 2003 system that is a domain controller, a DHCP and DNS server, a file and print server, and the company e-mail server. The server also hosts a document management system. One Wednesday afternoon, without warning, the server crashes. You reboot the server and it comes up without a problem. You examine the system performance through System Monitor, but everything seems in order. Two weeks later, the server crashes again. As before, you reboot the server and it comes up without any errors. Immediately after the restart, you use System Monitor and observe the following counters and values.
 Server Work Queues: Queue Length = 2 Memory: Page Faults/Sec = 2 Memory: Pages/Sec = 7 Memory: Available Bytes = 452,332,145 PhysicalDisk: % Disk Time = 34 Network Interface: Output Queue Length = 1 Two days later, you monitor the same counter statistics and note the following: Server Work Queues: Queue Length = 1 Memory: Page Faults/Sec = 3 Memory: Pages/Sec = 11 Memory: Available Bytes = 124,342,841 PhysicalDisk: % Disk Time = 43 Network Interface: Output Queue Length = 0 Which of the following strategies are you likely to take with the server?
 

Explanation

The server crashes without warning and reboots without any errors, indicating that there may be a problem with memory usage. The memory counters in System Monitor show an increase in page faults per second and pages per second, as well as a decrease in available bytes. These statistics suggest that there may be a memory leak or excessive memory usage by one or more applications on the server. To address this issue, the network administrator should examine the memory usage for each application on the server to identify any potential memory-intensive processes or applications that may be causing the crashes.

Submit
30. There is always less data included in an incremental backup than a full backup.

Explanation

An incremental backup only includes the data that has changed since the last backup, while a full backup includes all the data. Therefore, a full backup typically has more data included than an incremental backup.

Submit
31. You want a user to take ownership of a file or folder that she did not create. Which of the following groups do you not add her to?

Explanation

The Creator/Owner special identity should not be added to the user in this scenario because it refers to the person who originally created the file or folder. Since the user did not create the file or folder, adding her to this group would not give her ownership or control over it.

Submit
32. When you configure volume shadow copy, which of the following parameters cannot be configured?

Explanation

The question asks about the parameters that cannot be configured when configuring volume shadow copy. The correct answer is "Which folders on the drive should be included in the volume shadow copy." This means that when configuring volume shadow copy, you cannot choose specific folders on the drive to be included in the shadow copy.

Submit
33. By default, members of which Active Directory groups can assign ownership of an NTFS file or folder to another user?

Explanation

Members of the Administrators, Backup Operators, and Server Operators Active Directory groups can assign ownership of an NTFS file or folder to another user.

Submit
34. You are the network administrator for a plumbing hardware wholesaler in Rochester, New York. The network comprises two Windows Server 2003 systems, both of which are domain controllers. Each server has two disk drives in it, one that holds the system and boot partitions and another, called STORAGE, that is used to store the company’s sales order-processing database, inventory database, and files. Four shares have been created on the server: SALES, INVENTORY, DATA, and ARCHIVE. The permissions on the shares are set to Full Control for the Everyone special identity. Folders in the shares are controlled via NTFS permissions. One Monday, you arrive at work to find that the STORAGE drive has failed. Fortunately, your regular supplier is able to deliver a replacement drive within an hour, and you install it in the server. After formatting the drive, You restore the data from the previous night’s backup and then perform a quick check to make sure the data restore is successful. It is, so you inform users that they can use the sales order-processing system and the inventory database. However, it quickly becomes apparent that users cannot access either of these applications—they receive CANNOT READ DATAFILE errors when they try to start either application. Which of the following might be the cause of the problem?

Explanation

The most likely cause of the problem is that the shares that the users used to connect to the server were removed. When the new drive was installed and the data was restored, the shares might not have been recreated or properly configured. As a result, the users are unable to access the sales order-processing system and the inventory database. This is indicated by the "CANNOT READ DATAFILE" errors they receive when trying to start either application.

Submit
35. Which of the following is considered a standard NTFS permission?

Explanation

List Folder Contents is considered a standard NTFS permission. This permission allows users to view the contents of a folder, including files and subfolders, but does not allow them to make any changes to the folder or its contents. It is a basic level of access that grants read-only privileges to the folder.

Submit
36. Which of the following statements is true of global groups?

Explanation

not-available-via-ai

Submit
37. You have created a printer on a Windows Server 2003 system. During the creation process, you shared the printer out, but now you want to configure the printer so it is not listed in Active Directory. Which of the following is the correct way to do this?

Explanation

To configure the printer so it is not listed in Active Directory, you need to select the printer icon in the Printers And Faxes window and access the printer's properties by selecting "Sharing" from the File menu. In the properties window, you should clear the "List In The Directory" check box. This will prevent the printer from being listed in Active Directory.

Submit
38. You have recently been employed as the network administrator for a commercial real estate company. The company is relatively small and has a highly mobile workforce. The company has two Windows Server 2003 systems and one Windows 2000 system. Active Directory is configured at a Windows 2000 mixed domain functional level. Many of the sales representatives spend a great deal of time on the road and use the dial-in features of Windows Server 2003. The others are based primarily in the office and rarely work remotely. Late one evening, a user who normally works from the office pages you to report that he can’t gain access to the system over his dial-up link. He is calling from a hotel, where he is staying while at a conference. He explains that he connected the previous night from home without any problems, but this is the first time he has tried to connect from anywhere other than his home. Since you started working with the company, you have not made any changes to the user’s account properties. Based on the information he has provided, which of the following could be the problem?

Explanation

The user is unable to gain access to the system over his dial-up link because the Always Callback To property on the user's Dial-In page has been configured with his home phone number. This means that the system is set up to automatically call back the user's home phone number for authentication before allowing access. Since the user is calling from a hotel and not his home, the system is unable to authenticate his connection and therefore denies access.

Submit
39. You are the network administrator for a small furniture manufacturing company in Portland, Oregon. The network comprises three Windows Server 2003 systems, all of which are configured as domain controllers. Each server has three disk drives in it. One drive is dedicated to the system and boot partition, and the other two drives hold the company sales order-processing database. All of the drives use NTFS. One day, a user reports that she has been configuring a folder that she created, removing all of the users, including herself, from the ACL. Now she is unable to access the files in the folder. How do you restore her access to the files in the folder?

Explanation

Since the user removed all users, including herself, from the ACL, she no longer has permission to access the files in the folder. To restore her access, she can assign herself permission to the folder again. This can be done by right-clicking on the folder, selecting "Properties," going to the "Security" tab, clicking "Edit," and then adding herself back to the list of users with the necessary permissions.

Submit
40. You are working on a Windows Server 2003 system that has just been installed by another administrator. The administrator completed the installation but did not make any configuration changes following the installation. While checking the maximum log sizes in Event Viewer, you notice that the maximum size of the Security log is 16 MB. What does this tell you about the system?

Explanation

The maximum size of the Security log being only 16 MB suggests that the system is not a domain controller. Domain controllers typically have larger log sizes to accommodate the high volume of security events that they handle. Since no configuration changes were made following the installation, it implies that the system is not configured to perform domain controller functions.

Submit
41. You are the network administrator for a healthcare provider in Denver, Colorado. The network comprises three Windows Server 2003 systems. You have recently installed a new database application that requires a service account to be created. This service account needs to impersonate a client to access computer resources on behalf of other user accounts. Which of the following approaches do you take to

Explanation

The correct approach is to create a new user account and then select the "Account Is Trusted For Delegation" check box in the Account properties tab for that user. This allows the service account to impersonate a client and access computer resources on behalf of other user accounts.

Submit
42. You are the network administrator for a charity based in Dallas, Texas. You have a single Windows Server 2003 system, running Active Directory, that provides file and print server services to 50 users. The system was donated by a local business, and while it is powerful enough for your needs, storage capacity on the server is limited. Your manager has assured you that as soon as funds become available, you will be able to purchase an additional disk drive, but in the meantime he has asked you to use any available means to control the storage situation. As a result, you have implemented disk quotas so that one user cannot monopolize all the available disk space. After creating a new directory structure for a user and copying a number of large files from the user’s workstation to the server, you want to make sure the files are counted toward the user’s disk quota. Which approach are you most likely to use?

Explanation

Assigning ownership of the files to the user while logged on as a user account that is a member of the Server Operators group is the most likely approach to ensure that the files are counted toward the user's disk quota. This approach allows the user to take ownership of the files without granting them excessive privileges or permissions, such as being a member of the Administrators group. By assigning ownership, the user will have control over the files and they will be included in their disk quota calculation.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2008
    Quiz Created by
    Exelias
Cancel
  • All
    All (42)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 The person nominated in the Name field of the Managed By tab of...
In an authoritative restore of Active Directory, the objects in the...
When you use Dsadd to create a computer account, the DN must be...
Which of the following commands creates a computer account for...
Before you create a domain controller, a DNS server must be available...
When you install a printer that is connected directly to the Windows...
On a Windows Server 2003 system, where do you go to join the computer...
Which of the following media has the largest data storage capacity?
A user is assigned the Change share permission to the \\SERVER2\DATA...
You are the network administrator for a small book distribution...
You are the network administrator for a bank. The network comprises 3...
You are troubleshooting a problem with a Windows Server 2003 system...
A user calls you because he cannot log on to the system. After...
You are the network administrator for a small computer distributor....
You are the network administrator for a telecommunications company in...
Which of the following tasks can be performed with the Full Control...
What does the Server: Bytes Total/Sec Performance console counter...
What utility do you use to mark specific Active Directory objects as...
On a domain controller, members of the Power Users group can create...
You can use the Ping utility to prove that the printer is connected to...
You are the network administrator for a small company that develops...
You are reconfiguring a SQL Server database application on a member...
Where do you change the scope?
What security principal is assigned as the owner of files and folders...
You are the network administrator for a small book distribution...
Which of the following backup types does not alter the archive bit on...
After you create a new printer and share it out, users can start...
You are the network administrator for a plumbing hardware wholesaler...
You are the network administrator for a property development company...
There is always less data included in an incremental backup than a...
You want a user to take ownership of a file or folder that she did not...
When you configure volume shadow copy, which of the following...
By default, members of which Active Directory groups can assign...
You are the network administrator for a plumbing hardware wholesaler...
Which of the following is considered a standard NTFS permission?
Which of the following statements is true of global groups?
You have created a printer on a Windows Server 2003 system. During the...
You have recently been employed as the network administrator for a...
You are the network administrator for a small furniture manufacturing...
You are working on a Windows Server 2003 system that has just been...
You are the network administrator for a healthcare provider in Denver,...
You are the network administrator for a charity based in Dallas,...
Alert!

Advertisement