Windows Server 2008 Active Directory Configuration

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By E2D3
E
E2D3
Community Contributor
Quizzes Created: 2 | Total Attempts: 6,570
| Attempts: 6,377 | Questions: 95
Please wait...
Question 1 / 95
0 %
0/100
Score 0/100
1. What protocol provides automatic IP address configuration?

Explanation

DHCP (Dynamic Host Configuration Protocol) provides automatic IP address configuration. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration settings from a DHCP server. This eliminates the need for manual configuration of IP addresses, making it easier to connect devices to a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses, ARP (Address Resolution Protocol) is used to map IP addresses to MAC addresses, and TCP (Transmission Control Protocol) is a communication protocol used for reliable and ordered delivery of data.

Submit
Please wait...
About This Quiz
Windows Server 2008 Active Directory Configuration - Quiz

Hello and welcome to this 'Windows server 2008 active directory configuration' quiz. This quiz is designed to test your knowledge about Windows server 2008 ad its related concepts.... see moreSo, if you think you have a good understanding of this topic, then you must try this quiz and see how much you can score. If you score more than 70%, it means that you've passed this test. This quiz consists of both easy and difficult questions so be prepared.
Ready to start this test? Best of luck! see less

2. A(n) _____ is like a stack of print jobs, with the first job submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.

Explanation

A print queue is a list of print jobs that are waiting to be sent from the spooler to the printer. It functions like a stack, where the first job submitted is at the top and the last job is at the bottom. The jobs are processed in the order they were added to the queue, with the oldest job being printed first.

Submit
3. Which of the following tools is the basic application responsible for loading more useful management related snap-ins?

Explanation

The Microsoft Management Console (MMC) is the correct answer because it is the basic application responsible for loading more useful management related snap-ins. The MMC provides a framework for hosting and integrating various administrative tools, called snap-ins, which allow users to manage different aspects of their computer or network. It serves as a central management tool for configuring and monitoring system components, such as services, event logs, and device drivers. The other options, Disk Management, Internet Information Services Manager, and Hyper V Manager, are specific tools within the MMC that focus on disk management, web server administration, and virtualization management, respectively.

Submit
4. What subnet mask would correspond to a CIDR notation of /24?

Explanation

The subnet mask 255.255.255.0 corresponds to a CIDR notation of /24 because in CIDR notation, the number after the slash represents the number of network bits in the subnet mask. In this case, /24 means that the first 24 bits of the subnet mask are network bits, and the remaining 8 bits are host bits. The subnet mask 255.255.255.0 has the first 24 bits set to 1, indicating the network portion, and the last 8 bits set to 0, indicating the host portion.

Submit
5. When a computer learns another computer's MAC address, it keeps the address in its ...

Explanation

When a computer learns another computer's MAC address, it keeps the address in its ARP cache. The ARP cache is a table that stores the mappings between IP addresses and MAC addresses on a local network. This allows the computer to quickly and efficiently communicate with other devices on the network without having to perform an ARP query each time. The ARP cache is used by the computer to determine the MAC address of a destination device when sending data packets.

Submit
6. The computer or print server device offering the printer share is the _____.

Explanation

The correct answer is "network print server." A network print server refers to a computer or print server device that offers printer sharing. It acts as a central hub that allows multiple users to connect and print to a shared printer over a network. This server manages the print jobs, queues, and ensures efficient printing for all connected clients.

Submit
7. The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.

Explanation

The correct answer is "Sharing." The Sharing tab is used to enable or disable a printer for sharing and to specify the name of the share. This tab allows users to control the printer's accessibility and set up sharing options for other users on the network.

Submit
8. Which description best fits the CA Administrator role?

Explanation

The CA Administrator role is responsible for configuring and maintaining CA servers, as well as having the ability to assign all other CA roles and renew the CA certificate. This role is not specifically mentioned as approving requests for certificate enrollment and revocation, managing auditing logs, or being able to backup and restore files and directories. Therefore, the correct answer is that the CA Administrator configures and maintains CA servers, assigns all other CA roles, and renews the CA certificate.

Submit
9. The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.

Explanation

Distributed File System enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place. This means that users can access files and folders from different locations on the network without having to know the physical location of the files. The distributed file system manages the mapping between the logical and physical locations of the files, providing a seamless and unified view of the shared folders on the network.

Submit
10. One of the below IP address / subnet mask pairs is invalid; find the invalid answer.

Explanation

The given IP address/subnet mask pair 10.0.239.254/255.0.255.0 is invalid because the subnet mask is not in the correct format. Subnet masks should consist of consecutive 1s followed by consecutive 0s, but in this case, there are non-consecutive 0s in the subnet mask.

Submit
11. A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.

Explanation

A Read-Only Domain Controller (RODC) is a type of domain controller that has limited functionality compared to a normal DC. It cannot be used to update information in Active Directory and it does not replicate to regular DCs. RODCs are typically deployed in remote or branch office locations where physical security cannot be guaranteed. They store a read-only copy of the Active Directory database, allowing users in these locations to authenticate and access resources locally without the need to connect to a central DC. This helps to improve security by reducing the risk of unauthorized changes to the directory.

Submit
12. In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others.

Explanation

Load balancing in DFS helps distribute the access to shared folders across multiple servers. This ensures that the workload is evenly distributed among the servers, preventing any single server from becoming overloaded. By distributing the load, the system can handle more requests efficiently, improving performance and preventing any server from being overwhelmed with excessive traffic.

Submit
13. What IP address class does the address 128.0.31.50 belong to?

Explanation

The address 128.0.31.50 belongs to IP address class B. In classful addressing, the first octet of a Class B address ranges from 128 to 191. Therefore, the given address falls within this range and is classified as a Class B address.

Submit
14. What type of information does a resource record of type A contain?

Explanation

A resource record of type A contains information about the host. It typically includes the hostname and its corresponding IPv4 address. This type of record is commonly used in DNS (Domain Name System) to map domain names to their respective IP addresses.

Submit
15. What version of Internet Inforamation Services (IIS) is included with Windows Server 2008?

Explanation

Windows Server 2008 includes Internet Information Services (IIS) version 7.0.

Submit
16. What is the default no-refresh interval set to on DNS record timestamps?

Explanation

The default no-refresh interval set on DNS record timestamps is 7 days. This means that during this time period, the DNS server will not refresh the timestamp of a record, even if it receives a query for that record. This interval helps to reduce unnecessary network traffic and improve the efficiency of DNS resolution. After the 7-day period, the DNS server will refresh the timestamp and continue to do so at regular intervals.

Submit
17. What subnode under Security Settings applies to wireless network policies?

Explanation

The correct answer is "Wireless Network (IEEE 802.11) Policies". This subnode under Security Settings specifically applies to wireless network policies. It is designed to manage and configure the security settings for wireless networks using the IEEE 802.11 standard. This subnode allows administrators to define security settings such as authentication methods, encryption protocols, and other security parameters for wireless networks.

Submit
18. Windows Internet Name Service (WINS) is a legacy name service used to resolve ...

Explanation

WINS (Windows Internet Name Service) is a legacy name service that is used to resolve NetBIOS names. NetBIOS (Network Basic Input/Output System) is a protocol used by older versions of Windows operating systems to identify devices on a local network. WINS allows computers to translate NetBIOS names into IP addresses, enabling communication between devices on a network. Therefore, the correct answer is "NetBIOS names."

Submit
19. You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance.  Pick the technology that best fits this description.

Explanation

SATA (Serial ATA) is the best technology that fits the description of being inexpensive and offering excellent performance. SATA drives are cost-effective and provide fast data transfer speeds, making them suitable for a small office server that needs to run for 12 hours every day. Additionally, SATA drives are widely available and compatible with most computers, making them a practical choice for a limited budget.

Submit
20. To _____ an object means to make it available for users to access when they view Active Directory contents.

Explanation

To "publish" an object in Active Directory means to make it available for users to access when they view Active Directory contents. This implies that the object will be visible and accessible to users who have the necessary permissions to view and interact with it.

Submit
21. At what interval does the Knwoledge Consistency Checker recalculate the replication topology by defalut?

Explanation

The Knowledge Consistency Checker (KCC) is responsible for maintaining the replication topology in Active Directory. By default, the KCC recalculates the replication topology every 15 minutes. This means that every 15 minutes, the KCC analyzes the network and determines the most efficient replication path for the Active Directory data. This ensures that changes made in one domain controller are properly replicated to other domain controllers in the network within a reasonable timeframe, promoting consistency and data integrity across the entire Active Directory environment.

Submit
22. In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing.

Explanation

A spooler in the Windows environment is a collection of DLLs, information files, and programs that are responsible for processing print jobs for printing. It manages the print queue, allowing multiple print jobs to be stored and processed in the background, while the user can continue working on other tasks. The spooler ensures that print jobs are processed in the correct order and sends them to the appropriate printer for output.

Submit
23. You are troubleshooting a network issue a user is having.  After having changed his network adapter to static addressing, he can no longer reach the internet.  However, the machine resolves Internet names to IP addresses.  Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254

Explanation

The problem is that the gateway address specified in the network adapter's configuration is outside of the user's subnet. This means that the gateway is not within the range of IP addresses that the user's device can communicate with. As a result, the user is unable to reach the internet even though the machine can still resolve internet names to IP addresses. To resolve this issue, the subnet mask should be changed to 255.255.255.128 so that the gateway falls within the user's subnet.

Submit
24. Which of the following features is not present in Windows Server 2003 domain functional level?

Explanation

Fine-grained password policies are not present in Windows Server 2003 domain functional level. Fine-grained password policies allow administrators to define different password policies for different sets of users within a single domain. However, this feature was introduced in Windows Server 2008, so it is not available in Windows Server 2003.

Submit
25. Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.

Explanation

In Windows Server 2008, the process of tracking activity on a folder or file, such as read or write activity, can be achieved by setting up auditing. Auditing allows administrators to monitor and record access to folders and files, providing an additional layer of security and accountability. By enabling auditing, administrators can track and review the actions performed on specific folders and files, helping to identify any unauthorized or suspicious activities.

Submit
26. If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect?

Explanation

When changes are made to an existing Group Policy Object (GPO) that is already linked in Active Directory, the policy settings take effect as soon as the client downloads them. This means that the client needs to refresh its Group Policy settings by downloading the updated GPO from the domain controller. Once the client receives the updated policy settings, they will be applied immediately. The time it takes for the client to download the updated GPO can vary depending on factors such as network speed and client configuration.

Submit
27. How can you ensure that a GPO's settings are applied to all child objects, even if a GPO with conflicting settings is linked to a container at a deeper level?

Explanation

Enforcing inheritance ensures that a GPO's settings are applied to all child objects, regardless of any conflicting settings from a GPO linked to a container at a deeper level. This means that the GPO's settings will take precedence over any conflicting settings and be applied to all objects within the scope of the GPO.

Submit
28. Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes?

Explanation

Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to 16 nodes. This means that the server can support a cluster of up to 16 individual servers, providing high availability and automatic failover in case of a node failure. This allows for increased scalability and reliability in enterprise environments.

Submit
29. Under what circumstances are the built-in user accounts no longer local user accounts?

Explanation

After installing Active Directory, the built-in user accounts are no longer local user accounts. Active Directory is a directory service that allows for centralized management of users, groups, and resources in a network environment. Once Active Directory is installed, the built-in user accounts are migrated to the Active Directory domain, making them domain user accounts instead of local user accounts.

Submit
30. A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer.

Explanation

An Access Control List (ACL) is a list of privileges given to an account or security group granting access to an object, such as a shared folder or shared printer. It specifies the permissions or restrictions that determine what actions can be performed on the object by the account or group. ACLs are commonly used in computer systems to enforce security and control access to resources.

Submit
31. A recursive query is ....

Explanation

A recursive query is a type of DNS query where the DNS server processes the query until it finds an address that satisfies the query or returns an "I don't know" message. This process may involve querying multiple DNS servers to find the desired information.

Submit
32. GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default?

Explanation

By default, GPC (Group Policy Container) replication between domain controllers in the same site occurs at a 15-second interval after a change has been made. This means that any modifications or updates made to the Group Policy settings will be replicated to other domain controllers within the same site every 15 seconds. This ensures that the changes are quickly propagated throughout the network, allowing for consistent and up-to-date Group Policy enforcement across all domain controllers.

Submit
33. When a print job is processed over the Internet or an intranet, _____ must be installed and running in Windows Server 2008.

Explanation

When a print job is processed over the Internet or an intranet, Internet Information Services (IIS) must be installed and running in Windows Server 2008. IIS is a web server software that enables the hosting of websites, web applications, and services on Windows servers. It provides the necessary infrastructure for processing print jobs over the network. Windows Distribution Services (WDS) is a technology used for deploying Windows operating systems, not related to print job processing. Windows Support Services (WSS) and Web Server Service (WSS) are not valid terms or services in the context of this question.

Submit
34. What would you use to prevent GPOs linked to parent containers from affecting child containers?

Explanation

Inheritance blocking is the correct answer because it allows you to prevent Group Policy Objects (GPOs) linked to parent containers from affecting child containers. By blocking inheritance, you can ensure that specific GPOs are not applied to certain containers, giving you more control over the application of policies in your organizational structure.

Submit
35. Installing DNS on a RODC creates a ...

Explanation

Installing DNS on a RODC (Read-Only Domain Controller) creates a read-only primary zone. A primary zone is a DNS zone that contains the authoritative DNS records for a particular domain. A read-only primary zone on a RODC means that the DNS zone can be queried and resolved by clients, but any changes or updates to the zone can only be made on a different DNS server that has a read-write copy of the zone. This helps to ensure that the DNS data on the RODC remains secure and cannot be modified directly on the RODC itself.

Submit
36. Which of the following Windows Server 2008 editions supports the hot-add processor feature?

Explanation

Windows Server 2008 Datacenter Edition supports the hot-add processor feature. This means that administrators can add or remove processors from a running system without having to shut it down. This feature is particularly useful for organizations that require high availability and scalability in their server environments. The Datacenter Edition is specifically designed for large-scale virtualization and high-performance computing, making it the ideal choice for environments that need to dynamically adjust their processing power.

Submit
37. Your intern would like to know which of the following situations would be ideal for a Server Core installation:

Explanation

An RODC (Read-Only Domain Controller) is a type of domain controller that holds a read-only copy of the Active Directory database. It is designed for use in branch offices where physical security cannot be guaranteed. Since an RODC does not allow any changes to the Active Directory database, it reduces the risk of compromising sensitive information in case the server is physically accessed by unauthorized individuals. Therefore, installing an RODC in a branch office would be ideal for a Server Core installation.

Submit
38. What can be done to solve the issue of server sprawl?

Explanation

Consolidating the servers with virtualization is the most effective solution to solve the issue of server sprawl. By using virtualization technology, multiple virtual servers can be created and run on a single physical server, reducing the number of physical servers required. This helps in optimizing server resources, reducing power consumption, and improving overall efficiency. Additionally, virtualization allows for better management and flexibility in allocating resources to different virtual servers, making it an ideal solution for addressing server sprawl.

Submit
39. When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder.

Explanation

When configuring folder and file permissions, the "Edit" button on the folder properties Security tab is used to change which groups and users have permissions to a folder. This button allows the user to modify the existing permissions and add or remove groups and users from the access control list of the folder. By clicking on the "Edit" button, the user can make changes to the permissions and determine who can access and modify the folder and its contents.

Submit
40. What does round robin do?

Explanation

Round robin is a load sharing/balancing mechanism that distributes incoming network traffic evenly across multiple servers that provide the same service, such as hosting the same website. This helps to optimize resource utilization and prevent any single server from becoming overwhelmed with traffic, thus improving the overall performance and availability of the service.

Submit
41. If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network?

Explanation

If the correct time zone information is not used and the servers' clocks run at different times, it is most likely that user authentication will have issues on the network. User authentication relies on accurate time synchronization to ensure that authentication tokens and certificates are valid and not expired. If the clocks on the servers are not synchronized, it can lead to authentication failures and access issues for users trying to log in to the network.

Submit
42. To take full advantage of Windows Server 2008 to manage shared printers for one location, install the _____ role.

Explanation

To take full advantage of Windows Server 2008 to manage shared printers for one location, the Print Services role should be installed. This role allows for the management and administration of printers and print servers, including the ability to install, configure, and monitor printers, as well as manage print queues and print jobs. By installing the Print Services role, the server can effectively handle the printing needs of the location, ensuring efficient and reliable printing services.

Submit
43. The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.

Explanation

The "Location and Comment" boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network. These notes can include information about the physical location of the printer or any additional comments or instructions that users need to be aware of. This helps in identifying and differentiating the printer in a shared network environment.

Submit
44. If your creating a shortcut trust between domains in different forests, this must exist first:

Explanation

In order to create a shortcut trust between domains in different forests, a forest trust must exist first. A forest trust is a trust relationship between two separate Active Directory forests, allowing users from each forest to access resources in the other forest. This type of trust provides a higher level of trust and security than other trust types, such as realm trust, external trust, or another shortcut trust.

Submit
45. Which of the following is not a common way to configure DNS for a forest trust?

Explanation

Caching DNS is not a common way to configure DNS for a forest trust. Caching DNS refers to the process of temporarily storing DNS information on a local server after it has been retrieved from a remote server. This is typically done to improve the efficiency and speed of DNS queries. However, it is not directly related to configuring DNS for a forest trust, which involves establishing a trust relationship between two Active Directory forests to allow users and resources to be shared between them.

Submit
46. The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:

Explanation

The Intersite Topology Generator (ISTG) is responsible for assigning a bridgehead server for each directory partition in the site. A bridgehead server acts as a communication link between sites in a distributed Active Directory environment. It receives and replicates changes from other domain controllers within the site and then forwards those changes to other sites. By designating a bridgehead server, the ISTG ensures efficient and optimized replication between sites, as the bridgehead server handles the replication traffic for a specific directory partition.

Submit
47. What command can you type to perform a system state backup?

Explanation

The correct command to perform a system state backup is "wbadmin start systemstatebackup". This command initiates the backup process for the system state, which includes critical system files, Active Directory, and other important components required for the system to function properly. The other options provided in the question ("wbadmin start sysstatebackup", "wbadmin begin systemstatebackup", and "wbadmin start statebackup") are not valid commands for performing a system state backup.

Submit
48. When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____.

Explanation

In a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a stand-alone server. This means that the server operates independently and does not belong to a domain. It does not have the role of a domain controller or a member server, which are terms used in a domain environment. A stand-alone member server is not a correct term in this context.

Submit
49. Select below a vaild requirement for the installation of Hyper-V:

Explanation

To install Hyper-V, it is necessary for the CPU to support virtualization extensions. This is because Hyper-V relies on hardware virtualization capabilities provided by the CPU to create and manage virtual machines. Without virtualization extensions, the CPU would not be able to efficiently run virtual machines, resulting in poor performance or inability to run them at all. Therefore, ensuring that the CPU supports virtualization extensions is a valid requirement for the installation of Hyper-V.

Submit
50. Which of the following Windows Server 2008 editions has no upgrade path?

Explanation

The Web Server Edition of Windows Server 2008 has no upgrade path because it is designed specifically for hosting websites and web applications, and does not include some of the features and capabilities found in the other editions. Therefore, it is not possible to upgrade from Web Server Edition to any other edition of Windows Server 2008.

Submit
51. Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server.

Explanation

By making the new DNS server a domain controller, the AD-integrated domain DNS zones will be created automatically. This means that the DNS zones will be integrated with Active Directory, allowing for seamless synchronization and replication of the DNS data across all domain controllers in the network. This provides benefits such as increased fault tolerance, improved performance, and simplified administration of DNS. Additionally, it ensures that DNS data is securely stored within the Active Directory database, enhancing security and access control.

Submit
52. A user has been on a 7 month long sabbatical. Upon return, you discover that her user object was deleted by accident on the same day she left.  Assuming that Active Directory is configured with the default tombstone lifetime, how much longer do you have before you can no longer recover her username object with an authoritative restore?

Explanation

The user object has already been cleaned during garbage collection, which means that it has already been permanently deleted and cannot be recovered. This is because the default tombstone lifetime in Active Directory is 60 days, after which the object is considered permanently deleted. Since the user was on a 7-month sabbatical, the 60-day tombstone lifetime would have already passed, leaving no time for recovery.

Submit
53. One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site.  While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website.  After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem.  Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization?

Explanation

Active Directory Federation Services (AD FS) allows you to create a trust relationship between your extranet and your partner organization. AD FS enables single sign-on capabilities for the website, eliminating the need for separate logon credentials. It allows users to access critical applications on the extranet's website using their existing credentials from their partner organization's Active Directory. AD FS provides a secure and seamless authentication and authorization process, enhancing the user experience and simplifying access management for both organizations.

Submit
54. Which of the following defines the types of information stored in an Active Directory object?

Explanation

Schema attributes define the types of information that can be stored in an Active Directory object. These attributes determine the properties and characteristics of the objects, such as their names, data types, and constraints. By defining the schema attributes, administrators can control and manage the structure and content of the Active Directory database.

Submit
55. Under Password policies, what is the default maximum password age?

Explanation

The default maximum password age under password policies is 42 days. This means that after 42 days, users are required to change their passwords. This is a security measure to ensure that passwords are regularly updated and to minimize the risk of unauthorized access to accounts.

Submit
56. What is the Microsoft recommendation for placement of global catalog servers?

Explanation

The Microsoft recommendation for placement of global catalog servers is to install a global catalog server in a site once it is larger than 500 accounts and the number of DCs is greater than 2. This ensures that there is sufficient capacity to handle the workload and provides redundancy in case of DC failures. The threshold of 500 accounts is chosen as a guideline to determine when a site has grown large enough to benefit from having a global catalog server.

Submit
57. A colleague of yours is setting up backups for Windows Server 2008 servers on your network.  However, because he is new to Windows Server 2008, he encounters and issue.  Your colleague wants to schedule backups to the server's drive containing the C:\ partition.  When he selects the "Show All Available Disks" button in the Backup Schedule Wizard, the drive containing C:\ is not listed. What is most likely the issue?

Explanation

The most likely issue is that drives that contain system files cannot be used for scheduled backups. This means that the C:\ drive, which contains the system files for the Windows Server 2008, cannot be selected for backups.

Submit
58. Where can you view a list of installed updates?

Explanation

The Programs and Features applet allows you to view a list of installed updates on your computer. This applet provides a comprehensive list of all the programs and features installed on your system, including updates and service packs. By accessing this applet, you can easily manage and uninstall any updates that have been installed on your computer.

Submit
59. Which of the following best describes a directory service?

Explanation

A directory service is similar to a database program because it allows for the management of objects within it. It is specifically designed to store and organize information about users, resources, and network devices in a network environment. This information can include user profiles, access permissions, and network resources. By providing a centralized and structured database, a directory service enables efficient management and access control within a network.

Submit
60. You work for the large Example.com corporation.  Recently, Example.com has been adding new branch offices at a steady rate.  Just last week, a new branch office was created and now you have been put in charge of configuring group policy settings for the branch office.  Because this branch office will be fairly large, it will be set up as a separate domain. Since there are several branch offices with similar GPO requirements, you want to be able to make use of GPOs that have already proven to be useful.  What is the easiest way to make the policies in this new branch office similar to those already in place?

Explanation

The easiest way to make the policies in the new branch office similar to those already in place is to use GPO migration by adding the domains with the desired policies to the Group Policy Management Console (GPMC) and then copying and pasting them. This allows for a quick and efficient transfer of the proven useful GPO settings to the new domain without the need to manually recreate all the settings or import them via CSVDE. Additionally, backing up and restoring the desired GPOs may not be as straightforward and efficient as using GPO migration.

Submit
61. If multiple default gateways are assigned to a computer (such as a multihomed server), what determines which default gateway will be used?

Explanation

The metric determines which default gateway will be used when multiple default gateways are assigned to a computer. The metric is a value assigned to each gateway that represents the cost or distance to reach a particular network. The default gateway with the lowest metric value will be chosen as the preferred gateway. This allows the computer to select the most efficient route to reach the destination network.

Submit
62. What is the IPv6 equivalent of IPv4's loop back address of 127.0.0.1?

Explanation

The IPv6 equivalent of IPv4's loop back address of 127.0.0.1 is ::1. In IPv6, the loopback address is represented by "::1", which is a shorthand notation for "0:0:0:0:0:0:0:1". It is used to test network connectivity on the local machine and is commonly referred to as the "localhost" address.

Submit
63. Which of the following is not considered an urgent replication event (one that triggers change notifications immediately, without waiting the normal 15 seconds)

Explanation

The full name change under user properties is not considered an urgent replication event because it does not involve any security-related changes or affect the user's access to resources. Account lockouts, changes to the account lockout policy, and changes to the domain password policy are all security-related events that may require immediate replication and change notifications to ensure the security of the system.

Submit
64. Which MMC is used to transfer the domain naming master operations role?

Explanation

Active Directory Domains and Trusts is used to transfer the domain naming master operations role. This role is responsible for managing the naming of domains within the Active Directory forest. By transferring this role, an administrator can designate another domain controller to take over the responsibility of managing the domain names. This can be useful in scenarios where the current domain naming master needs to be decommissioned or if there is a need to distribute the workload among multiple domain controllers.

Submit
65. What must be done to allow a user to be able to access a file encrypted with EFS over a network connection?

Explanation

To allow a user to access a file encrypted with EFS over a network connection, certificate autoenrollment must be configured. This is because EFS uses certificates to encrypt and decrypt files, and autoenrollment ensures that the user has the necessary certificates to access the encrypted file. Without configuring autoenrollment, the user will not have the required certificates and will not be able to access the file over the network.

Submit
66. Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.

Explanation

TS Gateway allows a secure, encrypted connection, and the most suitable protocol for this purpose is Secure HTTP (HTTPS). HTTPS is a combination of HTTP and SSL/TLS protocols, providing secure communication over the internet. It encrypts the data transmitted between the client and the server, ensuring confidentiality and integrity. This makes it an ideal choice for establishing a secure connection in TS Gateway, protecting sensitive information from unauthorized access or tampering.

Submit
67. You work at Example.com, and are in charge of a fairly large forest and multidomain structure consisting of Windows Server 2003 domain controllers running at the Windows Server 2003 functional level.  One of your interns finished installing the forest's first Windows Server 2008 server, and has placed it in a branch office to act as a RODC.  The intern has already run the adprep /forestprep command. Unfortunately for some reason, the RODC Server cannot be installed.  What is most likely the issue, based on the information provided?

Explanation

Based on the information provided, the most likely issue is that there must be at least one writeable DC running Windows Server 2008. This means that in order to install the RODC server, there needs to be a domain controller in the forest that is running Windows Server 2008 or higher and has writeable capabilities. Since the forest currently consists of Windows Server 2003 domain controllers, the RODC server cannot be installed until a writeable DC running Windows Server 2008 is available.

Submit
68. The acronym CIDR stands for what?

Explanation

CIDR stands for Classless InterDomain Routing. This is a method used in IP addressing to allocate and assign IP addresses more efficiently. It allows for the division of IP address space into smaller, more flexible blocks, known as subnets. This helps in conserving IP addresses and improving routing efficiency by reducing the size of routing tables. Unlike classful addressing, which divided IP addresses into fixed classes, CIDR allows for more flexibility and scalability in network design and management.

Submit
69. Which of the following is not one of Active Directory Migration Tools three main types of migration?

Explanation

Innerforest migration is not one of the three main types of migration in Active Directory Migration Tools. The three main types of migration are Interforest migration, Intraforest migration, and Migration of an Nt 4.0 domain to an Active Directory domain.

Submit
70. You're taking an older server performing the PDC emulator master role out of service and will be replacing it with a new server configured as a domain controller.  What should you do to ensure the smoothest transition?

Explanation

To ensure the smoothest transition, it is recommended to transfer the PDC master role to the new domain controller first. This ensures that all the necessary operations and functions associated with the PDC emulator master role are transferred to the new server. Once the role has been successfully transferred, the old server can be safely shut down without any disruption to the domain environment. This approach allows for a seamless transition of the PDC master role to the new server while maintaining the stability and functionality of the domain.

Submit
71. When using HTTPS, after the web client finds that  CA is trusted and the signature on a certficate is verified, the web client sends additional parameters to the server that are encrypted with the server's ....

Explanation

When using HTTPS, the web client first verifies the CA (Certificate Authority) to ensure its trustworthiness. Once the CA is trusted and the signature on a certificate is verified, the web client then sends additional parameters to the server. These parameters are encrypted with the server's public key. The server's public key is used for encryption, while the corresponding private key is used for decryption. Therefore, the correct answer is "Public key."

Submit
72. What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide?

Explanation

The "Client for Microsoft Networks" item in a network adapter's connection properties allows the machine to connect to Windows Shared resources by using Server Message Block (SMB). This means that the machine can access files, folders, printers, and other shared resources on a Windows network. Without this client, the machine would not be able to connect to these shared resources and access the information or services they provide.

Submit
73. What is a major drawback to enabling the auditing of object access?

Explanation

Enabling the auditing of object access involves considerable overhead. This means that it requires a significant amount of resources and can impact the performance of the system. The process of auditing involves tracking and recording every access to objects, which can result in a large amount of data being logged. This can lead to increased storage requirements and processing time. In highly secure environments, where performance and efficiency are crucial, the overhead involved in auditing may outweigh the benefits and make it less ideal.

Submit
74. This command is used to display and modify the boot configuration data store.

Explanation

The command "bcedit" is used to display and modify the boot configuration data store. It allows users to configure various boot options, such as setting the default operating system, modifying boot parameters, and adding or removing boot entries. This command is commonly used in Windows operating systems to manage the boot process and troubleshoot boot-related issues.

Submit
75. If a software package is assigned to a group of targeted computers via the Computer Configuration node, what happens?

Explanation

The correct answer is that the package installation is mandatory and begins the next time the computer starts. This means that once the software package is assigned to a group of targeted computers via the Computer Configuration node, it will be automatically installed on those computers the next time they are restarted. No user interaction or manual installation is required, making it a convenient and efficient method of deploying software across multiple computers.

Submit
76. Which of the following is a GUI tool that enables you to view the replication topology graphically and monitor replication performance and status?

Explanation

Replmon is a GUI tool that allows users to view the replication topology graphically and monitor replication performance and status. It provides a visual representation of the replication environment, making it easier to identify any issues or bottlenecks in the replication process. This tool is commonly used in Windows Server environments to manage and troubleshoot replication.

Submit
77. Under what MMC would you create new connection objects?

Explanation

Active Directory Sites and Services is the correct MMC (Microsoft Management Console) to create new connection objects. This MMC allows administrators to manage the replication topology of Active Directory within a network. Connection objects are used to define the replication links between sites in a multi-site Active Directory environment. By creating new connection objects in Active Directory Sites and Services, administrators can control the replication process and ensure that changes made in one site are properly replicated to other sites.

Submit
78. Select the answer below that is not a service a public key infrastructure provides to a network:

Explanation

A public key infrastructure (PKI) provides services such as confidentiality, integrity, and nonrepudiation to a network. These services ensure that data is kept private, cannot be tampered with, and provide proof of the sender's identity. However, secure tunneling is not a service provided by PKI. Secure tunneling is a method used to create an encrypted connection between two endpoints, such as a virtual private network (VPN), but it is not directly related to PKI.

Submit
79. The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as ....

Explanation

The correct answer is Simple Certificate Enrollment Protocol (SCEP). SCEP is a Cisco proprietary protocol that allows network devices such as routers and switches to obtain certificates. It provides a secure and automated way for devices to request and receive certificates from a certificate authority (CA). By using SCEP, network devices can authenticate themselves and establish secure communication with other devices or network services.

Submit
80. Windows Server 2008 is activated automatically after several days. However, if it can't be activated, how many days do you have to active Windows Server 2008 before you can no longer log on?

Explanation

After installing Windows Server 2008, it is activated automatically within a few days. However, if the automatic activation fails, the user has a grace period of 60 days to manually activate the operating system. If the user fails to activate within this timeframe, they will no longer be able to log on to Windows Server 2008.

Submit
81. If multiple servers are specified in the forwarders tab of a server's Properties, what happens if a query is made and none of the forwarders provide a response?

Explanation

If a query is made and none of the forwarders provide a response, a normal recursive lookup process is initiated, starting with a root server. This means that the DNS server will continue to query other servers in a hierarchical manner until it receives a response or reaches the root server. This allows the DNS server to find the requested information even if the forwarders are unable to provide a response.

Submit
82. For several hours now, your IT staff has been trying to troubleshoot an issue on AppSrv1.  AppSrv1 uses an application that requires it to access SQL database on a server named DBSrv1 but recent changes in the network topology have outdated previous DNS entries. Initially, the problem is believed related to the DNS database, but after using nslookup, you find that the DNS entry is correct.  AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. What is most likely the issue?

Explanation

The most likely issue is that someone added a static entry for DBSrv1 in the hosts text file, which is now outdated. This is indicated by the fact that AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. This suggests that there is a conflicting or outdated entry in the hosts file, causing the incorrect resolution of the name.

Submit
83. Which of the following statements is true regarding RODC replication?

Explanation

The statement "The domain directory partition can be replicated only to an RODC from a Windows Server 2008 DC" is true because RODC replication is a one-way process, where the RODC pulls the changes from a writeable DC. In this case, the domain directory partition can only be replicated to an RODC from a Windows Server 2008 DC, meaning that the changes can only be pulled from a Windows Server 2008 DC to an RODC. This ensures that the RODC only receives replicated data and does not allow changes to be made directly on the RODC.

Submit
84. Setting up and testing AD FS with the simplest design requires at least how many computers?

Explanation

To set up and test AD FS with the simplest design, at least four computers are required. This is because AD FS requires a minimum of four servers: two AD FS servers and two web application proxy servers. The AD FS servers handle the authentication process, while the web application proxy servers provide secure access to web applications. Therefore, a minimum of four computers is necessary to ensure proper functionality and testing of AD FS.

Submit
85. Which of these is not a new GPO in Windows Vista and Server 2008?

Explanation

The Local Computers GPO is not a new GPO in Windows Vista and Server 2008. The other options (Local Administrators GPO, Local Non-Administrators GPO, User-Specific GPO) are all potential new GPOs in these operating systems.

Submit
86. You have created a subnetted network and left 4 bits for host IDs.  How many hosts can you have per subnet?

Explanation

When 4 bits are left for host IDs, it means that there are 2^4 = 16 possible combinations for host IDs. However, 2 of these combinations are reserved for network address and broadcast address, leaving 14 combinations available for actual hosts. Therefore, the number of hosts that can be accommodated per subnet is 14.

Submit
87. What is the only real downside of stub zone?

Explanation

The only real downside of a stub zone is the additional traffic created by replicating zone information. When a stub zone is created, it requires the DNS server to replicate the zone information from the authoritative DNS server. This replication process generates additional network traffic, which can impact network performance. However, stub zones have several advantages such as reducing the DNS query response time and improving DNS server fault tolerance.

Submit
88. One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server.  Your intern asks what command is used to do this.  Which command do you tell him to use?

Explanation

The correct command to modify permissions on a directory located on a Server Core server is "icacls". This command is used to view and modify discretionary access control lists (DACLs) for files and directories. It allows the intern to manage permissions and access control settings effectively.

Submit
89. The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.

Explanation

The device settings tab allows you to customize the printer settings based on the specific printer you have installed. This includes options such as printer trays, memory, paper size, fonts, duplexing, and installable options. By accessing the device settings tab, you can adjust these settings to optimize the printing experience according to your printer's capabilities and your specific requirements.

Submit
90. When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.

Explanation

If the "hold mismatched documents" option is not enabled when a PostScript-formatted document is sent to a non-PostScript printer, the printer might print tens or hundreds of pages with a single control code on each page. Enabling the "hold mismatched documents" option would prevent this from happening by holding the documents that do not match the printer's format, allowing the user to review and correct any issues before printing.

Submit
91. Which of the following is NOT a reason why some devices can't be placed on the network map?

Explanation

Devices that are domain members can be placed on the network map, so this is not a reason why some devices can't be placed on the network map.

Submit
92. What option under the General tab in the Properties dialog box of a forest trust is only availble for use betweeon two Windows Server 2008 domains?

Explanation

The option "the other domain supports Kerberos AES Encryption" is only available for use between two Windows Server 2008 domains. This option refers to the encryption method used for authentication between the domains. Kerberos AES Encryption is a more secure encryption algorithm introduced in Windows Server 2008, so it is only available for use between domains running this version or later.

Submit
93. One of your administrators is unfamiliar with using the command line, but needs to be able to manage a Windows Server 2008 Core install. While attemtping to used an MMC snap-in to manage Server Core, he finds that he is unable to do so. He notes that some snap-ins, such as Shared Folders and Services worked perfectly remotely, while MMCs such as Event Viewer do not.  What is most likely the issue?

Explanation

The most likely issue is that Server Core's firewall needs to be reconfigured for the Administrator to access certain MMCs. This is indicated by the fact that some snap-ins, such as Shared Folders and Services, work perfectly remotely while others, such as Event Viewer, do not. The firewall settings on Server Core may be blocking the specific MMCs that the Administrator is trying to access, preventing them from being able to manage the Windows Server 2008 Core install effectively.

Submit
94. A new employee, Alice, has been hired to work at a branch office configured with RODC.  This RODC connects to a DC over a WAN link back at the head office.  Just as Alice is about to log onto her machine for the first time, she finds that she is unable to authenticate despite using the correct user name and pasword given to her. Other users in the branch office can log in fine, but Alice cannot.  What is most likely the issue?

Explanation

Since other users in the branch office can log in fine, it indicates that the RODC is functioning properly and Alice's user and password information has already been replicated to the RODC. If Alice's user and password information hadn't been replicated yet, all users in the branch office would be unable to log in. The fact that Alice cannot log in specifically suggests that the issue is related to her inability to make use of credential caching due to the failure of the WAN link.

Submit
95. What is the default location of the ADMX files?

Explanation

The default location of the ADMX files is %systemroot%\PolicyDefinitions.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 3, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 03, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 01, 2011
    Quiz Created by
    E2D3
Cancel
  • All
    All (95)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What protocol provides automatic IP address configuration?
A(n) _____ is like a stack of print jobs, with the first job submitted...
Which of the following tools is the basic application responsible for...
What subnet mask would correspond to a CIDR notation of /24?
When a computer learns another computer's MAC address, it keeps...
The computer or print server device offering the printer share is the...
The _____ tab is used to enable or disable a printer for sharing as...
Which description best fits the CA Administrator role?
The _____ enables you to simplify access to the shared folders on a...
One of the below IP address / subnet mask pairs is invalid; find the...
A _____ is a different from normal DCs in that you cannot use it to...
In DFS, access to shared folders can be distributed across many...
What IP address class does the address 128.0.31.50 belong to?
What type of information does a resource record of type A contain?
What version of Internet Inforamation Services (IIS) is included with...
What is the default no-refresh interval set to on DNS record...
What subnode under Security Settings applies to wireless network...
Windows Internet Name Service (WINS) is a legacy name service used to...
You are constructing a server for a small office complex that will run...
To _____ an object means to make it available for users to access when...
At what interval does the Knwoledge Consistency Checker recalculate...
In the Windows environment, a _____ is a group of DLLs, information...
You are troubleshooting a network issue a user is having.  After...
Which of the following features is not present in Windows Server 2003...
Accessing folders and files can be tracked by setting up _____, which...
If you make changes to an existing GPO that is already linked in...
How can you ensure that a GPO's settings are applied to all child...
Windows Server 2008 Enterprise is capable of being configured with...
Under what circumstances are the built-in user accounts no longer...
A(n) ______ is a list of privleges given to an account or security...
A recursive query is ....
GPC replication between domain controllers in the same site occurs at...
When a print job is processed over the Internet or an intranet, _____...
What would you use to prevent GPOs linked to parent containers from...
Installing DNS on a RODC creates a ...
Which of the following Windows Server 2008 editions supports the...
Your intern would like to know which of the following situations would...
What can be done to solve the issue of server sprawl?
When configuring folder and file permissions, use the _____ button on...
What does round robin do?
If correct time zone information is not used and your servers'...
To take full advantage of Windows Server 2008 to manage shared...
The _____ boxes are used to store special notes about the printer that...
If your creating a shortcut trust between domains in different...
Which of the following is not a common way to configure DNS for a...
The Intersite Topology Generator (ISTG) is responsible for assigning...
What command can you type to perform a system state backup?
When examining a Workgroup Model, a Windows Server 2008 server that...
Select below a vaild requirement for the installation of Hyper-V:
Which of the following Windows Server 2008 editions has no upgrade...
Increased network usage has inspired your staff to install a new DNS...
A user has been on a 7 month long sabbatical. Upon return, you...
One of your partner organizations currently has to provide logon...
Which of the following defines the types of information stored in an...
Under Password policies, what is the default maximum password age?
What is the Microsoft recommendation for placement of global catalog...
A colleague of yours is setting up backups for Windows Server 2008...
Where can you view a list of installed updates?
Which of the following best describes a directory service?
You work for the large Example.com corporation.  Recently,...
If multiple default gateways are assigned to a computer (such as a...
What is the IPv6 equivalent of IPv4's loop back address of...
Which of the following is not considered an urgent replication event...
Which MMC is used to transfer the domain naming master operations...
What must be done to allow a user to be able to access a file...
Terminal Services Gateway (TS Gateway) adds to the TS web access...
You work at Example.com, and are in charge of a fairly large forest...
The acronym CIDR stands for what?
Which of the following is not one of Active Directory Migration Tools...
You're taking an older server performing the PDC emulator master...
When using HTTPS, after the web client finds that  CA is trusted...
What does the "Client for Microsoft Networks" item in a...
What is a major drawback to enabling the auditing of object access?
This command is used to display and modify the boot configuration data...
If a software package is assigned to a group of targeted computers via...
Which of the following is a GUI tool that enables you to view the...
Under what MMC would you create new connection objects?
Select the answer below that is not a service a public key...
The Network Devices Enrollment Services (NDES) allows network devices...
Windows Server 2008 is activated automatically after several days....
If multiple servers are specified in the forwarders tab of a...
For several hours now, your IT staff has been trying to troubleshoot...
Which of the following statements is true regarding RODC replication?
Setting up and testing AD FS with the simplest design requires at...
Which of these is not a new GPO in Windows Vista and Server 2008?
You have created a subnetted network and left 4 bits for host IDs....
What is the only real downside of stub zone?
One of your interns has been asked to modify the permissions on a...
The _____ tab enables you to specify printer settings that are...
When a PostScript-formatted document is sent to a non-PostScript...
Which of the following is NOT a reason why some devices can't be...
What option under the General tab in the Properties dialog box of a...
One of your administrators is unfamiliar with using the command line,...
A new employee, Alice, has been hired to work at a branch office...
What is the default location of the ADMX files?
Alert!

Advertisement