Вы находитесь на странице: 1из 7

Your Report

Correct Q.1) What allows businesses to define, manage, access, and secure network resources including files, printers, peopl A. B. Directory service (Your Answer) NT directory

Correct Q.2) A __________ is defined as one or more IP subnets that are connected by fast links. A. B. Domain Site (Your Answer)

Correct Q.3) What contains the rules and definitions that are used for creating and modifying object classes and attributes with A. B. Configuration NC Schema NC (Your Answer)

Correct Q.4) What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and o domain-wide? A. B. C$ SYSVOL (Your Answer)

Correct Q.5) What new Windows Server 2008 feature is a special installation option that creates a minimal environment for run and roles? A. B. Server Core (Your Answer) Minimal Installation Option

Incorrect Q.6) What is the minimum amount of storage space required for the Active Directory installation files? A. B. 250 MB (Your Answer) 200 MB (Correct Answer)

Correct Q.7) When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of A. B. Global Admins Schema Admins (Your Answer)

Correct Q.8) When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation W named __________. A. B. Default-First-Site-Name (Your Answer) Default-Site-Name

Correct Q.9) What command-line tool used for monitoring Active Directory provides functionality that includes performing conn A. dcdiag (Your Answer)

B. netdiag Correct Q.10) When replicating information between sites, Active Directory will designate a __________ server in each site to a managing site-to-site replication. A. B. Bridgehead (Your Answer) masthead

Incorrect Q.11) What defines a chain of site links by which domain controllers from different sites can communicate? A. B. Site link chain (Your Answer) Site link bridge (Correct Answer)

Correct Q.12) How many FSMO roles does Active Directory support? A. B. 16 5 (Your Answer)

Correct Q.13) How many RID Masters can a domain have? A. B. 5 1 (Your Answer)

Correct Q.14) What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds recover that role? A. B. Role seizure (Your Answer) Role separation

Correct Q.15) What special identity group contains all authenticated users and domain guests? A. B. Power Users Everyone (Your Answer)

Correct Q.16) __________ name refers to each users login name. A. B. SAM account (Your Answer) AD Name

Incorrect Q.17) You cannot manually modify the group membership of or view the membership lists of __________ groups. A. B. Domain local (Your Answer) Special identity (Correct Answer)

Correct Q.18) What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if nec A. NSLOOKUP

B. LDIFDE (Your Answer) Incorrect Q.19) Which of the following is a benefit of implementing a public key infrastructure (PKI)? A. B.

Users no longer need to remember passwords. (Your Answer) All information is stored on the smart card, making it difficult for anyone except the intended user to use or a

Correct Q.20) What method of authentication requires a smart card and a PIN to provide more secure access to company resou A. B. Complex authentication Two-factor authentication (Your Answer)

Correct Q.21) What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and sm or workstation? A. B. Smart card enrollment station (Your Answer) Certification Authority (CA

Correct Q.22) Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients characters in length. A. B. C. D. 97 64 127 (Your Answer) 142

Correct Q.23) What is a method of controlling settings across your network? A. B. Group Policy (Your Answer) Active Directory

Correct Q.24) What contains all of the Group Policy settings that you wish to implement to user and computer objects within a s A. B. C. Group Policies Group Policy Settings Group Policy Objects (Your Answer)

Correct Q.25) What allows the Group Policy processing order to circle back and reapply the computer policies after all user poli A. B. C. Reverse Processing Switchback Processing Loopback Processing (Your Answer)

Correct Q.26) Local GPO settings are stored in what folder on a computer? A. B. %systemroot%/System32/GroupPolicy (Your Answer) %systemroot%/System32/Drivers/GroupPolicy

C. D.

%systemroot%/System32/Drivers/Etc/GroupPolicy %systemroot%/System/GroupPolicy

Correct Q.27) What policies can be applied to one or more users or groups of users, allowing you to specify a more or less strin subset than the password policy defined for the entire domain? A. B. C. Fine-Tuned Password Policies Fine-Grained Password Policies (Your Answer) Restricted Password Policies

Correct Q.28) Where can you configure the Group Policy refresh interval? A. B. C. D. Computer Configuration\\System\\Group Policy User Configuration\\Administrative Templates\\System\\Group Policy Computer Configuration\\Administrative Templates\\System\\Group Policy (Your Answer) Computer Configuration\\Administrative Templates\\Group Policy

Correct Q.29) Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software tha of file? A. B. C. D. .exe .msi (Your Answer) .mse .inf

Correct Q.30) Modifications to .msi files require transform files, which have the __________ extension. A. B. C. D. .msit .mse .msx .mst (Your Answer)

Correct Q.31) When configuring Software Restriction policies, which option prevents any application from running that requires allows programs to run that only require resources that are accessible by normal users? A. B. C. D. Unrestricted Restricted Basic User (Your Answer) Disallowed

Correct Q.32) What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Re A. B. C. D. Incorrect Linked Group Policy Objects Group Policy Inheritance Delegation (Your Answer) Management

Q.33)

What setting will prevent policy settings from applying to all child objects at the current level and all subordinate le A. B. C. D. Block Policy Propagation Block Policy Inheritance (Correct Answer) Remove Policy Inheritance (Your Answer) Remove Policy Propagation

Correct Q.34) How many WMI filters can be configured per GPO? A. B. C. D. One (Your Answer) Two Three Five

Correct Q.35) To perform a System State restore in Windows Server 2008, you will boot the DC into what mode? A. B. C. D. Active Directory Restore Active Directory Maintenance Directory Services Maintenance Directory Services Restore (Your Answer)

Correct Q.36) In Windows Server 2008, you must back up __________ rather than only backing up the System State data. A. B. C. D. critical volumes (Your Answer) system volumes MBR records MX records

Incorrect Q.37) To back up Active Directory, you must install what feature from the Server Manager console? A. B. C. D. Active Directory Backup Client Windows Backup Utility Windows Server Backup (Correct Answer) BackupExec (Your Answer)

Correct Q.38) What is the process by which one DNS server sends a name resolution request to another DNS server? A. B. C. D. resolution translation referral (Your Answer) propagation

Incorrect Q.39) What DNS server contains no zones and hosts no domains? A. B. C. secondary domain controller global catalog server (Your Answer) secondary DNS server

D. caching-only server (Correct Answer) Correct Q.40) What Windows Server 2008 service can you use to protect sensitive data on a Windows network? A. B. C. D. AD FS AD FTP AD FSMO AD RMS (Your Answer)

Correct Q.41) What enables network administrators and owners to configure access rights for users during the users entire life A. B. C. D. Identity Lifecycle Management (Your Answer) General Lifecycle Management Microsoft Lifecycle Management Lifecycle of Software Management

Correct Q.42) What are small physical devices on which a digital certificate is installed that are usually the size of a credit card A. B. C. D. RSA SecureID digital certificates smart cards (Your Answer) biometric device

Incorrect Q.43) What service responds to requests from clients concerning the revocation status of a particular certificate, returni response indicating the certificates current status? A. B. C. D. Web Enrollment Web Responder enterprise CA (Your Answer) Online Responder (Correct Answer)

Incorrect Q.44) A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a _ A. B. C. D. domain controller (Correct Answer) domain manager global catalog (Your Answer) DNS server

Correct Q.45) What protocol has become an industry standard that enables data exchange between directory services and app A. B. C. D. NTDS LDAP (Your Answer) NDIS AD

Correct Q.46) What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

A. B. C. D.

A records MX records SRV records (Your Answer) SOA records

Correct Q.47) What is the process of replicating DNS information from one DNS server to another? A. B. C. D. replication DNS push zone transfer (Your Answer) DNS update

Correct Q.48) What type of trust relationship allows you to create two-way transitive trusts between separate forests? A. B. C. D. shortcut cross-forest (Your Answer) external real

Correct Q.49) What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolu A. B. C. D. primary lookup secondary lookup forward lookup (Your Answer) reverse lookup

Correct Q.50) What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolu A. B. C. D. primary lookup secondary lookup forward lookup (Your Answer) reverse lookup

Вам также может понравиться