Windows Server 2008 Active Directory Configuration

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By E2D3
E
E2D3
Community Contributor
Quizzes Created: 2 | Total Attempts: 6,563
| Attempts: 6,374
SettingsSettings
Please wait...
  • 1/95 Questions

    What protocol provides automatic IP address configuration?

    • DNS
    • DHCP
    • ARP
    • TCP
Please wait...
About This Quiz

Hello and welcome to this 'Windows server 2008 active directory configuration' quiz. This quiz is designed to test your knowledge about Windows server 2008 ad its related concepts. So, if you think you have a good understanding of this topic, then you must try this quiz and see how much you can score. If you score more than 70%, it means that you've passed this test. This quiz consists of both easy and difficult questions so be prepared.
Ready to start this test? Best of luck!

Windows Server 2008 Active Directory Configuration - Quiz

Quiz Preview

  • 2. 

    A(n) _____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.

    • Print stack

    • Print queue

    • Print deek

    • Print block

    Correct Answer
    A. Print queue
    Explanation
    A print queue is a list of print jobs that are waiting to be sent from the spooler to the printer. It functions like a stack, where the first job submitted is at the top and the last job is at the bottom. The jobs are processed in the order they were added to the queue, with the oldest job being printed first.

    Rate this question:

  • 3. 

    Which of the following tools is the basic application responsible for loading more useful management related snap-ins?

    • Microsoft Management Console

    • Disk Management

    • Internet Information Services Manager

    • Hyper V Manager

    Correct Answer
    A. Microsoft Management Console
    Explanation
    The Microsoft Management Console (MMC) is the correct answer because it is the basic application responsible for loading more useful management related snap-ins. The MMC provides a framework for hosting and integrating various administrative tools, called snap-ins, which allow users to manage different aspects of their computer or network. It serves as a central management tool for configuring and monitoring system components, such as services, event logs, and device drivers. The other options, Disk Management, Internet Information Services Manager, and Hyper V Manager, are specific tools within the MMC that focus on disk management, web server administration, and virtualization management, respectively.

    Rate this question:

  • 4. 

    What subnet mask would correspond to a CIDR notation of /24?

    • 255.255.255.0

    • 255.0.0.0

    • 255.255.0.0

    • 255.255.255.255

    Correct Answer
    A. 255.255.255.0
    Explanation
    The subnet mask 255.255.255.0 corresponds to a CIDR notation of /24 because in CIDR notation, the number after the slash represents the number of network bits in the subnet mask. In this case, /24 means that the first 24 bits of the subnet mask are network bits, and the remaining 8 bits are host bits. The subnet mask 255.255.255.0 has the first 24 bits set to 1, indicating the network portion, and the last 8 bits set to 0, indicating the host portion.

    Rate this question:

  • 5. 

    When a computer learns another computer's MAC address, it keeps the address in its ...

    • Arp cache

    • Arp file

    • Arp query

    • Bit bucket

    Correct Answer
    A. Arp cache
    Explanation
    When a computer learns another computer's MAC address, it keeps the address in its ARP cache. The ARP cache is a table that stores the mappings between IP addresses and MAC addresses on a local network. This allows the computer to quickly and efficiently communicate with other devices on the network without having to perform an ARP query each time. The ARP cache is used by the computer to determine the MAC address of a destination device when sending data packets.

    Rate this question:

  • 6. 

    The computer or print server device offering the printer share is the _____.

    • Network print server

    • Network print manager

    • Network print client

    • Network print provider

    Correct Answer
    A. Network print server
    Explanation
    The correct answer is "network print server." A network print server refers to a computer or print server device that offers printer sharing. It acts as a central hub that allows multiple users to connect and print to a shared printer over a network. This server manages the print jobs, queues, and ensures efficient printing for all connected clients.

    Rate this question:

  • 7. 

    The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.

    • Sharing

    • General

    • Advanced

    • Location

    Correct Answer
    A. Sharing
    Explanation
    The correct answer is "Sharing." The Sharing tab is used to enable or disable a printer for sharing and to specify the name of the share. This tab allows users to control the printer's accessibility and set up sharing options for other users on the network.

    Rate this question:

  • 8. 

    Which description best fits the CA Administrator role?

    • Approves requests for certificate enrollment and revocation

    • Manages auditing logs

    • Configures and maintains CA servers, and can assign all other CA roles and renew the CA certificate

    • Able to backup and restore files and directories

    Correct Answer
    A. Configures and maintains CA servers, and can assign all other CA roles and renew the CA certificate
    Explanation
    The CA Administrator role is responsible for configuring and maintaining CA servers, as well as having the ability to assign all other CA roles and renew the CA certificate. This role is not specifically mentioned as approving requests for certificate enrollment and revocation, managing auditing logs, or being able to backup and restore files and directories. Therefore, the correct answer is that the CA Administrator configures and maintains CA servers, assigns all other CA roles, and renews the CA certificate.

    Rate this question:

  • 9. 

    The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.

    • Encrypted File System

    • Distributed File System

    • Dispersed File System

    • Extended File System

    Correct Answer
    A. Distributed File System
    Explanation
    Distributed File System enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place. This means that users can access files and folders from different locations on the network without having to know the physical location of the files. The distributed file system manages the mapping between the logical and physical locations of the files, providing a seamless and unified view of the shared folders on the network.

    Rate this question:

  • 10. 

    One of the below IP address / subnet mask pairs is invalid; find the invalid answer.

    • 10.0.239.254/255.0.255.0

    • 172.31.1.200/255.255.0.0

    • 192.168.2.190/255.255.255.128

    • 10.200.139.1/255.255.255.248

    Correct Answer
    A. 10.0.239.254/255.0.255.0
    Explanation
    The given IP address/subnet mask pair 10.0.239.254/255.0.255.0 is invalid because the subnet mask is not in the correct format. Subnet masks should consist of consecutive 1s followed by consecutive 0s, but in this case, there are non-consecutive 0s in the subnet mask.

    Rate this question:

  • 11. 

    A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.

    • Restricted Domain Controller

    • Limited Access Domain Controller

    • Read-Only Domain Controller

    • Replication-Limited Domain Controller

    Correct Answer
    A. Read-Only Domain Controller
    Explanation
    A Read-Only Domain Controller (RODC) is a type of domain controller that has limited functionality compared to a normal DC. It cannot be used to update information in Active Directory and it does not replicate to regular DCs. RODCs are typically deployed in remote or branch office locations where physical security cannot be guaranteed. They store a read-only copy of the Active Directory database, allowing users in these locations to authenticate and access resources locally without the need to connect to a central DC. This helps to improve security by reducing the risk of unauthorized changes to the directory.

    Rate this question:

  • 12. 

    In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others.

    • Distribution

    • Replication

    • Load balancing

    • Redundancy

    Correct Answer
    A. Load balancing
    Explanation
    Load balancing in DFS helps distribute the access to shared folders across multiple servers. This ensures that the workload is evenly distributed among the servers, preventing any single server from becoming overloaded. By distributing the load, the system can handle more requests efficiently, improving performance and preventing any server from being overwhelmed with excessive traffic.

    Rate this question:

  • 13. 

    What IP address class does the address 128.0.31.50 belong to?

    • A

    • B

    • C

    • Loopback

    Correct Answer
    A. B
    Explanation
    The address 128.0.31.50 belongs to IP address class B. In classful addressing, the first octet of a Class B address ranges from 128 to 191. Therefore, the given address falls within this range and is classified as a Class B address.

    Rate this question:

  • 14. 

    What type of information does a resource record of type A contain?

    • Host

    • Name server

    • State of authority

    • IPv6 host

    Correct Answer
    A. Host
    Explanation
    A resource record of type A contains information about the host. It typically includes the hostname and its corresponding IPv4 address. This type of record is commonly used in DNS (Domain Name System) to map domain names to their respective IP addresses.

    Rate this question:

  • 15. 

    What version of Internet Inforamation Services (IIS) is included with Windows Server 2008?

    • IIS 6.0

    • IIS 7.0

    • IIS 6.9.1

    • IIS 7.5

    Correct Answer
    A. IIS 7.0
    Explanation
    Windows Server 2008 includes Internet Information Services (IIS) version 7.0.

    Rate this question:

  • 16. 

    What is the default no-refresh interval set to on DNS record timestamps?

    • 7 hours

    • 7 days

    • 7 weeks

    • 7 years

    Correct Answer
    A. 7 days
    Explanation
    The default no-refresh interval set on DNS record timestamps is 7 days. This means that during this time period, the DNS server will not refresh the timestamp of a record, even if it receives a query for that record. This interval helps to reduce unnecessary network traffic and improve the efficiency of DNS resolution. After the 7-day period, the DNS server will refresh the timestamp and continue to do so at regular intervals.

    Rate this question:

  • 17. 

    What subnode under Security Settings applies to wireless network policies?

    • Wireless Network (IEEE 802.3) Policies

    • IP Security Policies on Active Directory

    • Wireless Network (IEEE 802.11) Policies

    • Network Access Protection

    Correct Answer
    A. Wireless Network (IEEE 802.11) Policies
    Explanation
    The correct answer is "Wireless Network (IEEE 802.11) Policies". This subnode under Security Settings specifically applies to wireless network policies. It is designed to manage and configure the security settings for wireless networks using the IEEE 802.11 standard. This subnode allows administrators to define security settings such as authentication methods, encryption protocols, and other security parameters for wireless networks.

    Rate this question:

  • 18. 

    Windows Internet Name Service (WINS) is a legacy name service used to resolve ...

    • Domain names to IP address

    • Bootp names

    • MAC addresses to IP addresses

    • NetBIOS names

    Correct Answer
    A. NetBIOS names
    Explanation
    WINS (Windows Internet Name Service) is a legacy name service that is used to resolve NetBIOS names. NetBIOS (Network Basic Input/Output System) is a protocol used by older versions of Windows operating systems to identify devices on a local network. WINS allows computers to translate NetBIOS names into IP addresses, enabling communication between devices on a network. Therefore, the correct answer is "NetBIOS names."

    Rate this question:

  • 19. 

    You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.

    • SCSI

    • SATA

    • PATA

    • SAS

    Correct Answer
    A. SATA
    Explanation
    SATA (Serial ATA) is the best technology that fits the description of being inexpensive and offering excellent performance. SATA drives are cost-effective and provide fast data transfer speeds, making them suitable for a small office server that needs to run for 12 hours every day. Additionally, SATA drives are widely available and compatible with most computers, making them a practical choice for a limited budget.

    Rate this question:

  • 20. 

    To _____ an object means to make it available for users to access when they view Active Directory contents.

    • Inherit

    • Control

    • Present

    • Publish

    Correct Answer
    A. Publish
    Explanation
    To "publish" an object in Active Directory means to make it available for users to access when they view Active Directory contents. This implies that the object will be visible and accessible to users who have the necessary permissions to view and interact with it.

    Rate this question:

  • 21. 

    At what interval does the Knwoledge Consistency Checker recalculate the replication topology by defalut?

    • Every 15 seconds

    • Every 15 minutes

    • Once in a period of 15 hours

    • Once in a period of 15 days

    Correct Answer
    A. Every 15 minutes
    Explanation
    The Knowledge Consistency Checker (KCC) is responsible for maintaining the replication topology in Active Directory. By default, the KCC recalculates the replication topology every 15 minutes. This means that every 15 minutes, the KCC analyzes the network and determines the most efficient replication path for the Active Directory data. This ensures that changes made in one domain controller are properly replicated to other domain controllers in the network within a reasonable timeframe, promoting consistency and data integrity across the entire Active Directory environment.

    Rate this question:

  • 22. 

    In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.

    • Driver

    • Renderer

    • Queue manager

    • Spooler

    Correct Answer
    A. Spooler
    Explanation
    A spooler in the Windows environment is a collection of DLLs, information files, and programs that are responsible for processing print jobs for printing. It manages the print queue, allowing multiple print jobs to be stored and processed in the background, while the user can continue working on other tasks. The spooler ensures that print jobs are processed in the correct order and sends them to the appropriate printer for output.

    Rate this question:

  • 23. 

    You are troubleshooting a network issue a user is having.  After having changed his network adapter to static addressing, he can no longer reach the internet.  However, the machine resolves Internet names to IP addresses.  Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254

    • Gateway is outside of the user's subnet

    • Change subnet mask to 255.255.255.128

    • The gateway no longer has a route to your ISP, so it does not deliver packets

    • DNS is providing incorrect or old resolution information, and the IP addresses given are no longer accurate.

    Correct Answer
    A. Gateway is outside of the user's subnet
    Explanation
    The problem is that the gateway address specified in the network adapter's configuration is outside of the user's subnet. This means that the gateway is not within the range of IP addresses that the user's device can communicate with. As a result, the user is unable to reach the internet even though the machine can still resolve internet names to IP addresses. To resolve this issue, the subnet mask should be changed to 255.255.255.128 so that the gateway falls within the user's subnet.

    Rate this question:

  • 24. 

    Which of the following features is not present in Windows Server 2003 domain functional level?

    • Domain controller renaming

    • Selective authentication

    • Logon timestamp replication

    • Fine-grained password policies

    Correct Answer
    A. Fine-grained password policies
    Explanation
    Fine-grained password policies are not present in Windows Server 2003 domain functional level. Fine-grained password policies allow administrators to define different password policies for different sets of users within a single domain. However, this feature was introduced in Windows Server 2008, so it is not available in Windows Server 2003.

    Rate this question:

  • 25. 

    Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.

    • Archiving

    • Logging

    • Tracking

    • Auditing

    Correct Answer
    A. Auditing
    Explanation
    In Windows Server 2008, the process of tracking activity on a folder or file, such as read or write activity, can be achieved by setting up auditing. Auditing allows administrators to monitor and record access to folders and files, providing an additional layer of security and accountability. By enabling auditing, administrators can track and review the actions performed on specific folders and files, helping to identify any unauthorized or suspicious activities.

    Rate this question:

  • 26. 

    If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect?

    • 50 seconds

    • 30 minutes

    • 1 hour

    • As soon as the client downloads them

    Correct Answer
    A. As soon as the client downloads them
    Explanation
    When changes are made to an existing Group Policy Object (GPO) that is already linked in Active Directory, the policy settings take effect as soon as the client downloads them. This means that the client needs to refresh its Group Policy settings by downloading the updated GPO from the domain controller. Once the client receives the updated policy settings, they will be applied immediately. The time it takes for the client to download the updated GPO can vary depending on factors such as network speed and client configuration.

    Rate this question:

  • 27. 

    How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?

    • GPO Filtering

    • Enforcing inheritance

    • Loopback policy processing

    • Inheritance blocking

    Correct Answer
    A. Enforcing inheritance
    Explanation
    Enforcing inheritance ensures that a GPO's settings are applied to all child objects, regardless of any conflicting settings from a GPO linked to a container at a deeper level. This means that the GPO's settings will take precedence over any conflicting settings and be applied to all objects within the scope of the GPO.

    Rate this question:

  • 28. 

    Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?

    • 4 nodes

    • 8 nodes

    • 16 nodes

    • 30 nodes

    Correct Answer
    A. 16 nodes
    Explanation
    Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to 16 nodes. This means that the server can support a cluster of up to 16 individual servers, providing high availability and automatic failover in case of a node failure. This allows for increased scalability and reliability in enterprise environments.

    Rate this question:

  • 29. 

    Under what circumstances are the built-in user accounts no longer local user accounts?

    • When accessing a network resource in a workgroup environment

    • After installing Active Directory

    • This is impossible, built-in user accounts cannot be converted

    • When using dsadd on the built-in accounts

    Correct Answer
    A. After installing Active Directory
    Explanation
    After installing Active Directory, the built-in user accounts are no longer local user accounts. Active Directory is a directory service that allows for centralized management of users, groups, and resources in a network environment. Once Active Directory is installed, the built-in user accounts are migrated to the Active Directory domain, making them domain user accounts instead of local user accounts.

    Rate this question:

  • 30. 

    A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.

    • ACL

    • ACE

    • Attribute list

    • GPO

    Correct Answer
    A. ACL
    Explanation
    An Access Control List (ACL) is a list of privileges given to an account or security group granting access to an object, such as a shared folder or shared printer. It specifies the permissions or restrictions that determine what actions can be performed on the object by the account or group. ACLs are commonly used in computer systems to enforce security and control access to resources.

    Rate this question:

  • 31. 

    A recursive query is ....

    • A type of DNS query to which a DNS server responds with the best information it has to satisfy the query. The DNS server doesn't query additional DNS servers in an attempt to resolve the query.

    • A query in which the DNS server processes the query until it responds with an address that satisfies the query or with an "I don't know" message. The process might require the DNS server to query several additional DNS servers.

    • A process whereby the DNS server checks the zone file for stale records periodically and deletes those meeting the criteria for a stale record.

    • A grouping of DNS information that represents one or more domains and possibly sub domains.

    Correct Answer
    A. A query in which the DNS server processes the query until it responds with an address that satisfies the query or with an "I don't know" message. The process might require the DNS server to query several additional DNS servers.
    Explanation
    A recursive query is a type of DNS query where the DNS server processes the query until it finds an address that satisfies the query or returns an "I don't know" message. This process may involve querying multiple DNS servers to find the desired information.

    Rate this question:

  • 32. 

    GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?

    • 20 seconds

    • 50 seconds

    • 30 seconds

    • 15 seconds

    Correct Answer
    A. 15 seconds
    Explanation
    By default, GPC (Group Policy Container) replication between domain controllers in the same site occurs at a 15-second interval after a change has been made. This means that any modifications or updates made to the Group Policy settings will be replicated to other domain controllers within the same site every 15 seconds. This ensures that the changes are quickly propagated throughout the network, allowing for consistent and up-to-date Group Policy enforcement across all domain controllers.

    Rate this question:

  • 33. 

    When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.

    • Windows Distribution Services (WDS)

    • Internet Information Services (IIS)

    • Windows Support Services (WSS)

    • Web Server Service (WSS)

    Correct Answer
    A. Internet Information Services (IIS)
    Explanation
    When a print job is processed over the Internet or an intranet, Internet Information Services (IIS) must be installed and running in Windows Server 2008. IIS is a web server software that enables the hosting of websites, web applications, and services on Windows servers. It provides the necessary infrastructure for processing print jobs over the network. Windows Distribution Services (WDS) is a technology used for deploying Windows operating systems, not related to print job processing. Windows Support Services (WSS) and Web Server Service (WSS) are not valid terms or services in the context of this question.

    Rate this question:

  • 34. 

    What would you use to prevent GPOs linked to parent containers from affecting child containers?

    • GPO filtering

    • Enforcing inheritance

    • Loopback policy processing

    • Inheritance blocking

    Correct Answer
    A. Inheritance blocking
    Explanation
    Inheritance blocking is the correct answer because it allows you to prevent Group Policy Objects (GPOs) linked to parent containers from affecting child containers. By blocking inheritance, you can ensure that specific GPOs are not applied to certain containers, giving you more control over the application of policies in your organizational structure.

    Rate this question:

  • 35. 

    Installing DNS on a RODC creates a ...

    • Read-write primary zone

    • Read-write secondary zone

    • Read-only primary zone

    • Read-only secondary zone

    Correct Answer
    A. Read-only primary zone
    Explanation
    Installing DNS on a RODC (Read-Only Domain Controller) creates a read-only primary zone. A primary zone is a DNS zone that contains the authoritative DNS records for a particular domain. A read-only primary zone on a RODC means that the DNS zone can be queried and resolved by clients, but any changes or updates to the zone can only be made on a different DNS server that has a read-write copy of the zone. This helps to ensure that the DNS data on the RODC remains secure and cannot be modified directly on the RODC itself.

    Rate this question:

  • 36. 

    Your intern would like to know which of the following situations would be ideal for a Server Core installation:

    • You're installing the first server in a network

    • You're upgrading from Windows Server 2003

    • You want to run Windows Web Server 2003

    • You want to install an RODC in a branch office

    Correct Answer
    A. You want to install an RODC in a branch office
    Explanation
    An RODC (Read-Only Domain Controller) is a type of domain controller that holds a read-only copy of the Active Directory database. It is designed for use in branch offices where physical security cannot be guaranteed. Since an RODC does not allow any changes to the Active Directory database, it reduces the risk of compromising sensitive information in case the server is physically accessed by unauthorized individuals. Therefore, installing an RODC in a branch office would be ideal for a Server Core installation.

    Rate this question:

  • 37. 

    What can be done to solve the issue of server sprawl?

    • Add new servers

    • Consolidate the servers with virtualization

    • Install potentially conflicting applications on seperate servers

    • Reducing server uptime

    Correct Answer
    A. Consolidate the servers with virtualization
    Explanation
    Consolidating the servers with virtualization is the most effective solution to solve the issue of server sprawl. By using virtualization technology, multiple virtual servers can be created and run on a single physical server, reducing the number of physical servers required. This helps in optimizing server resources, reducing power consumption, and improving overall efficiency. Additionally, virtualization allows for better management and flexibility in allocating resources to different virtual servers, making it an ideal solution for addressing server sprawl.

    Rate this question:

  • 38. 

    What does round robin do?

    • Allows an administrator to configure multiple routes that user must make "rounds" through in order to reach a service, improving security

    • Causes network performance issues by continuously rotating the IP addresses associated with services

    • Creates invalid DNS records by disabling DNS timestamp scavenging

    • Creates a load sharing/ balancing mechanism for servers that have identical services, such as two servers that hose the same website.

    Correct Answer
    A. Creates a load sharing/ balancing mechanism for servers that have identical services, such as two servers that hose the same website.
    Explanation
    Round robin is a load sharing/balancing mechanism that distributes incoming network traffic evenly across multiple servers that provide the same service, such as hosting the same website. This helps to optimize resource utilization and prevent any single server from becoming overwhelmed with traffic, thus improving the overall performance and availability of the service.

    Rate this question:

  • 39. 

    Which of the following Windows Server 2008 editions supports the hot-add processor feature?

    • Windows Web Server 2008

    • Standard Edition

    • Enterprise Edition

    • Datacenter Edition

    Correct Answer
    A. Datacenter Edition
    Explanation
    Windows Server 2008 Datacenter Edition supports the hot-add processor feature. This means that administrators can add or remove processors from a running system without having to shut it down. This feature is particularly useful for organizations that require high availability and scalability in their server environments. The Datacenter Edition is specifically designed for large-scale virtualization and high-performance computing, making it the ideal choice for environments that need to dynamically adjust their processing power.

    Rate this question:

  • 40. 

    When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.

    • General

    • Edit

    • Modify

    • Tools

    Correct Answer
    A. Edit
    Explanation
    When configuring folder and file permissions, the "Edit" button on the folder properties Security tab is used to change which groups and users have permissions to a folder. This button allows the user to modify the existing permissions and add or remove groups and users from the access control list of the folder. By clicking on the "Edit" button, the user can make changes to the permissions and determine who can access and modify the folder and its contents.

    Rate this question:

  • 41. 

    If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?

    • Windows Update

    • IP address assignment

    • Program performance

    • User authentication

    Correct Answer
    A. User authentication
    Explanation
    If the correct time zone information is not used and the servers' clocks run at different times, it is most likely that user authentication will have issues on the network. User authentication relies on accurate time synchronization to ensure that authentication tokens and certificates are valid and not expired. If the clocks on the servers are not synchronized, it can lead to authentication failures and access issues for users trying to log in to the network.

    Rate this question:

  • 42. 

    To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.

    • Client Services

    • Print Management

    • Print Services

    • Distribution Services

    Correct Answer
    A. Print Services
    Explanation
    To take full advantage of Windows Server 2008 to manage shared printers for one location, the Print Services role should be installed. This role allows for the management and administration of printers and print servers, including the ability to install, configure, and monitor printers, as well as manage print queues and print jobs. By installing the Print Services role, the server can effectively handle the printing needs of the location, ensuring efficient and reliable printing services.

    Rate this question:

  • 43. 

    The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.

    • General

    • Type

    • Notes

    • Location and Comment

    Correct Answer
    A. Location and Comment
    Explanation
    The "Location and Comment" boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network. These notes can include information about the physical location of the printer or any additional comments or instructions that users need to be aware of. This helps in identifying and differentiating the printer in a shared network environment.

    Rate this question:

  • 44. 

    If your creating a shortcut trust between domains in different forests, this must exist first:

    • Realm trust

    • External trust

    • Another shortcut trust

    • Forest trust

    Correct Answer
    A. Forest trust
    Explanation
    In order to create a shortcut trust between domains in different forests, a forest trust must exist first. A forest trust is a trust relationship between two separate Active Directory forests, allowing users from each forest to access resources in the other forest. This type of trust provides a higher level of trust and security than other trust types, such as realm trust, external trust, or another shortcut trust.

    Rate this question:

  • 45. 

    Which of the following is not a common way to configure DNS for a forest trust?

    • Conditional forwarders

    • Stub zone

    • Secondary zone

    • Caching DNS

    Correct Answer
    A. Caching DNS
    Explanation
    Caching DNS is not a common way to configure DNS for a forest trust. Caching DNS refers to the process of temporarily storing DNS information on a local server after it has been retrieved from a remote server. This is typically done to improve the efficiency and speed of DNS queries. However, it is not directly related to configuring DNS for a forest trust, which involves establishing a trust relationship between two Active Directory forests to allow users and resources to be shared between them.

    Rate this question:

  • 46. 

    The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:

    • A KCC leader

    • Subnet

    • Bridgehead server

    • Domain controller

    Correct Answer
    A. Bridgehead server
    Explanation
    The Intersite Topology Generator (ISTG) is responsible for assigning a bridgehead server for each directory partition in the site. A bridgehead server acts as a communication link between sites in a distributed Active Directory environment. It receives and replicates changes from other domain controllers within the site and then forwards those changes to other sites. By designating a bridgehead server, the ISTG ensures efficient and optimized replication between sites, as the bridgehead server handles the replication traffic for a specific directory partition.

    Rate this question:

  • 47. 

    What command can you type to perform a system state backup?

    • Wbadmin start systemstatebackup

    • Wbadmin start sysstatebackup

    • Wbadmin begin systemstatebackup

    • Wbadmin start statebackup

    Correct Answer
    A. Wbadmin start systemstatebackup
    Explanation
    The correct command to perform a system state backup is "wbadmin start systemstatebackup". This command initiates the backup process for the system state, which includes critical system files, Active Directory, and other important components required for the system to function properly. The other options provided in the question ("wbadmin start sysstatebackup", "wbadmin begin systemstatebackup", and "wbadmin start statebackup") are not valid commands for performing a system state backup.

    Rate this question:

  • 48. 

    When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.

    • Domain controller

    • Member server

    • Stand-alone server

    • Stand-alone member server

    Correct Answer
    A. Stand-alone server
    Explanation
    In a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a stand-alone server. This means that the server operates independently and does not belong to a domain. It does not have the role of a domain controller or a member server, which are terms used in a domain environment. A stand-alone member server is not a correct term in this context.

    Rate this question:

  • 49. 

    Select below a vaild requirement for the installation of Hyper-V:

    • Windows Server 2008 Datacenter must be installed to use Hyper-V

    • Your CPU must support virtualization extensions

    • You require a Hyper-V license key

    • You must have at least 128MB of RAM installed

    Correct Answer
    A. Your CPU must support virtualization extensions
    Explanation
    To install Hyper-V, it is necessary for the CPU to support virtualization extensions. This is because Hyper-V relies on hardware virtualization capabilities provided by the CPU to create and manage virtual machines. Without virtualization extensions, the CPU would not be able to efficiently run virtual machines, resulting in poor performance or inability to run them at all. Therefore, ensuring that the CPU supports virtualization extensions is a valid requirement for the installation of Hyper-V.

    Rate this question:

Quiz Review Timeline (Updated): Apr 3, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 03, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 01, 2011
    Quiz Created by
    E2D3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.