Questions and Answers
1.
What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?A.
Directory service
B.
NT directory
2.
A __________ is defined as one or more IP subnets that are connected by fast links.A.
Domain
B.
Site
3.
What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?A.
Configuration NC
B.
Schema NC
4.
What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?A.
C$
B.
SYSVOL
5.
What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?A.
Server Core
B.
Minimal Installation Option
6.
What is the minimum amount of storage space required for the Active Directory installation files?A.
250 MB
B.
200 MB
7.
When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?A.
Global Admins
B.
Schema Admins
8.
When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.A.
Default-First-Site-Name
B.
Default-Site-Name
9.
What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?A.
Dcdiag
B.
Netdiag
10.
When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.A.
Bridgehead
B.
Masthead
11.
What defines a chain of site links by which domain controllers from different sites can communicate?A.
Site link chain
B.
Site link bridge
12.
How many FSMO roles does Active Directory support?A.
16
B.
5
13.
How many RID Masters can a domain have?A.
5
B.
1
14.
What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?A.
Role seizure
B.
Role separation
15.
What special identity group contains all authenticated users and domain guests?A.
Power Users
B.
Everyone
16.
__________ name refers to each user’s login name.A.
SAM account
B.
AD Name
17.
You cannot manually modify the group membership of or view the membership lists of __________ groups.A.
Domain local
B.
Special identity
18.
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?A.
NSLOOKUP
B.
LDIFDE
19.
Which of the following is a benefit of implementing a public key infrastructure (PKI)?A.
Users no longer need to remember passwords.
B.
All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
20.
What method of authentication requires a smart card and a PIN to provide more secure access to company resources?A.
Complex authentication
B.
Two-factor authentication
21.
What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?A.
Smart card enrollment station
B.
Certification Authority (CA
22.
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.A.
97
B.
64
C.
127
D.
142
23.
What is a method of controlling settings across your network?A.
Group Policy
B.
Active Directory
24.
What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?A.
Group Policies
B.
Group Policy Settings
C.
Group Policy Objects
25.
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?A.
Reverse Processing
B.
Switchback Processing
C.
Loopback Processing
26.
Local GPO settings are stored in what folder on a computer?A.
%systemroot%/System32/GroupPolicy
B.
%systemroot%/System32/Drivers/GroupPolicy
C.
%systemroot%/System32/Drivers/Etc/GroupPolicy
D.
%systemroot%/System/GroupPolicy
27.
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?A.
Fine-Tuned Password Policies
B.
Fine-Grained Password Policies
C.
Restricted Password Policies
28.
Where can you configure the Group Policy refresh interval?A.
Computer Configuration\\System\\Group Policy
B.
User Configuration\\Administrative Templates\\System\\Group Policy
C.
Computer Configuration\\Administrative Templates\\System\\Group Policy
D.
Computer Configuration\\Administrative Templates\\Group Policy
29.
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?A.
.exe
B.
.msi
C.
.mse
D.
.inf
30.
Modifications to .msi files require transform files, which have the __________ extension.A.
.msit
B.
.mse
C.
.msx
D.
.mst
31.
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?A.
Unrestricted
B.
Restricted
C.
Basic User
D.
Disallowed
32.
What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?A.
Linked Group Policy Objects
B.
Group Policy Inheritance
C.
Delegation
D.
Management
33.
What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?A.
Block Policy Propagation
B.
Block Policy Inheritance
C.
Remove Policy Inheritance
D.
Remove Policy Propagation
34.
How many WMI filters can be configured per GPO?A.
One
B.
Two
C.
Three
D.
Five
35.
To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?A.
Active Directory Restore
B.
Active Directory Maintenance
C.
Directory Services Maintenance
D.
Directory Services Restore
36.
In Windows Server 2008, you must back up __________ rather than only backing up the System State data.A.
Critical volumes
B.
System volumes
C.
MBR records
D.
MX records
37.
To back up Active Directory, you must install what feature from the Server Manager console?A.
Active Directory Backup Client
B.
Windows Backup Utility
C.
Windows Server Backup
D.
BackupExec
38.
What is the process by which one DNS server sends a name resolution request to another DNS server?A.
Resolution
B.
Translation
C.
Referral
D.
Propagation
39.
What DNS server contains no zones and hosts no domains?A.
Secondary domain controller
B.
Global catalog server
C.
Secondary DNS server
D.
Caching-only server
40.
What Windows Server 2008 service can you use to protect sensitive data on a Windows network?A.
AD FS
B.
AD FTP
C.
AD FSMO
D.
AD RMS
41.
What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?A.
Identity Lifecycle Management
B.
General Lifecycle Management
C.
Microsoft Lifecycle Management
D.
Lifecycle of Software Management
42.
What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?A.
RSA SecureID
B.
Digital certificates
C.
Smart cards
D.
Biometric device
43.
What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?A.
Web Enrollment
B.
Web Responder
C.
Enterprise CA
D.
Online Responder
44.
A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.A.
Domain controller
B.
Domain manager
C.
Global catalog
D.
DNS server
45.
What protocol has become an industry standard that enables data exchange between directory services and applications?A.
NTDS
B.
LDAP
C.
NDIS
D.
AD
46.
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?A.
A records
B.
MX records
C.
SRV records
D.
SOA records
47.
What is the process of replicating DNS information from one DNS server to another?A.
Replication
B.
DNS push
C.
Zone transfer
D.
DNS update
48.
What type of trust relationship allows you to create two-way transitive trusts between separate forests?A.
Shortcut
B.
Cross-forest
C.
External
D.
Real
49.
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?A.
Primary lookup
B.
Secondary lookup
C.
Forward lookup
D.
Reverse lookup
50.
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?A.
Primary lookup
B.
Secondary lookup
C.
Forward lookup
D.
Reverse lookup
No comments:
Post a Comment