Windows Server 2008 Online Exam For Practice (Mod-II) - Set-b

50 Questions | Total Attempts: 465

SettingsSettingsSettings
Windows Server 2008 Quizzes & Trivia

Total 50 questions. . . .


Questions and Answers
  • 1. 
    Replication within Active Directory will occur when which of the following conditions is met?
    • A. 

      An object is added or removed from Active Directory.

    • B. 

      The value of an attribute has changed

    • C. 

      The name of an object has changed

    • D. 

      All of the above

  • 2. 
    What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?
    • A. 

      Dcdiag

    • B. 

      Repdiag

    • C. 

      Repadmin

    • D. 

      Netstat

  • 3. 
    Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the beginning of the line and applied before any other changes that are waiting to be replicated.
    • A. 

      Urgent

    • B. 

      Immediate

    • C. 

      Fast

    • D. 

      Pushed

  • 4. 
    Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
    • A. 

      Relative Identifier Master

    • B. 

      Infrastructure Master

    • C. 

      Domain Naming Master

    • D. 

      Schema Master

  • 5. 
    What types of memberships are stored in the global catalog?
    • A. 

      Domain local

    • B. 

      Universal

    • C. 

      Global

    • D. 

      Local workstation

  • 6. 
    What console must be used to move the Domain Naming Master FSMO role?
    • A. 

      Active Directory Users and Computers

    • B. 

      Active Directory Forests and Domains

    • C. 

      Active Directory Schema

    • D. 

      Active Directory Domains and Trusts

  • 7. 
    What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?
    • A. 

      NETDIAG

    • B. 

      NSLOOKUP

    • C. 

      CSVDE

    • D. 

      DCPROMO

  • 8. 
    What special identity group is used by the system to allow permission to protected system files for services to function properly?
    • A. 

      Network Service

    • B. 

      Restricted

    • C. 

      Service

    • D. 

      Self

  • 9. 
    When using CSVDE, what is the first line of the text file that uses proper attribute names?
    • A. 

      Header row

    • B. 

      Header record

    • C. 

      Name row

    • D. 

      Name record

  • 10. 
    Which of the following is not a characteristic of a strong password?
    • A. 

      At least eight characters in length

    • B. 

      At least one character from each of the previous character types

    • C. 

      Is not your birth date

    • D. 

      Differs significantly from other previously used passwords

  • 11. 
    What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
    • A. 

      CKI

    • B. 

      PKI

    • C. 

      DKI

    • D. 

      PCI

  • 12. 
    What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
    • A. 

      Enrollment agent

    • B. 

      Enrollment credential

    • C. 

      Enrollment verification

    • D. 

      Enrollment authority

  • 13. 
    What process applies Group Policy settings to various containers within Active Directory?
    • A. 

      Attaching

    • B. 

      Linking

    • C. 

      Connecting

    • D. 

      Nesting

  • 14. 
    The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
    • A. 

      Default Domain Controller

    • B. 

      Default Domain

    • C. 

      Default

    • D. 

      Domain

  • 15. 
    What policies work with folder redirection to provide the ability to cache files locally?
    • A. 

      Registry-based

    • B. 

      Software installation

    • C. 

      Folder redirection

    • D. 

      Offline file storage

  • 16. 
    What is the path to the default GPT structure for a domain?
    • A. 

      %systemroot%\\sysvol\\sysvol\\domain.com\\Policies

    • B. 

      %systemroot%\\sysvol\\domain.com\\Policies

    • C. 

      %systemroot%\\domain.com\\Policies

    • D. 

      %systemroot%\\Policies

  • 17. 
    What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
    • A. 

      Local Policy

    • B. 

      Security Policy

    • C. 

      Audit Policy

    • D. 

      None of the above

  • 18. 
    What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
    • A. 

      Folder Sharing

    • B. 

      Folder Redirection

    • C. 

      Desktop Redirection

    • D. 

      Profile Redirection

  • 19. 
    Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
    • A. 

      PKI Policies

    • B. 

      Secure Key Policies

    • C. 

      Public Key Policies

    • D. 

      Private Key Policies

  • 20. 
    __________ files are used to apply service packs and hotfixes to installed software.
    • A. 

      Update

    • B. 

      Patch

    • C. 

      Upgrade

    • D. 

      Enhanced

  • 21. 
    Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
    • A. 

      Hash rule

    • B. 

      Certificate rule

    • C. 

      Path rule

    • D. 

      All of the above

  • 22. 
    What policies are designed to identify software and control its execution?
    • A. 

      Software Restriction

    • B. 

      Software Execution Prevention

    • C. 

      Malicious Software Detection

    • D. 

      Malicious Software Removal Policies

  • 23. 
    What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
    • A. 

      Effective Permissions

    • B. 

      Resultant Set of Policy

    • C. 

      Effective Set of Policy

    • D. 

      Applied Policy

  • 24. 
    Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?
    • A. 

      Group Policy Simulator

    • B. 

      Group Policy Planning

    • C. 

      Group Policy Modeling

    • D. 

      Group Policy Results

  • 25. 
    What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?
    • A. 

      Block Policy Inheritance

    • B. 

      Policy Delegation

    • C. 

      Group Based Filtering

    • D. 

      Security Group Filtering

Back to Top Back to top