Wednesday, 9 April 2014

Windows Servers 2003,2008 and 2012 online Interview Question [Part 1]

Qus.1 What allows businesses to define, accemanage, ss, and secure network resources including files, printers, people, and applications?
A. network service
B. directory service
C. Directory Infrastructure
D. NT directory

Ans: B

Qus 2 : A __________ is defined as one or more IP subnets that are connected by fast links.
A. domain
B. network
C. site
D. forest

Ans: C

Qus 3 : What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?
A. Configuration NC
B. Schema NC
C. Domain NC
D. DC NC

Ans : B

Qus 4 : What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?
A. SYSVOL
B. AD
C. C$
D. VOLMGR
Ans: A

Qus 5 : What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?
A. Minimal Installation Option
B. Server Core
C. Server Standard
D. Minimal Server Environment (MSE)
Ans: B




Qus 6 : What is the minimum amount of storage space required for the Active Directory installation files?
A. 100 MB
B. 150 MB
C. 200 MB
D. 250 MB
Ans: C

Qus 7 : When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?
A. Schema Admins
B. Enterprise Admins
C. Global Admins
D. Forest Admins
Ans: A

Qus 8 : When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.
A. Default-Site
B. Site-Default
C. Default-Site-Name
D. Default-First-Site-Name
Ans: D

Qus 9 : What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?
A. dcdiag
B. netdiag
C. dcpromo
D. netstat
Ans: A

Qus 10 : When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.
A. primary
B. masthead
C. bridgehead
D. global catalog
Ans: C

Qus 11 : What defines a chain of site links by which domain controllers from different sites can communicate?
A. site link bridge
B. site chain
C. site chain bridge
D. site link chain
Ans: A

Qus 12 : How many FSMO roles does Active Directory support?
A. 2
B. 5
C. 10
D. 12
Ans: B

Qus 13 : How many RID Masters can a domain have?
A. 1
B. 2
C. 3
D. 5
Ans: A

Qus 14 : What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?
A. role transfer
B. role migration
C. role seizure
D. role separation

Ans: C

Qus 15 : What special identity group contains all authenticated users and domain guests?
A. Power Users
B. Everyone
C. Batch
D. Authenticated Users

Ans: B

Qus 16 : __________ name refers to each user’s login name.
A. Common
B. Distinguished
C. SAM account
D. AD Name
Ans: C

Qus 17 : You cannot manually modify the group membership of or view the membership lists of __________ groups.
A. distribution
B. domain local
C. special identity
D. universal
Ans: C

Qus 18 :
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?
A. DCPROMO
B. LDIFDE
C. CSVDE
D. NSLOOKUP
Ans: B

Qus 19 :
Which of the following is a benefit of implementing a public key infrastructure (PKI)?
A. Users no longer need to remember passwords.
B. All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
C. Smart cards can be used from remote locations, such as a home office, to provide authentication services.
D. All of the above
Ans: D

Qus 20 :
What method of authentication requires a smart card and a PIN to provide more secure access to company resources?
A. two-factor authentication
B. dual authentication
C. complex authentication
D. strong authentication
Ans: A

Qus 21 :
What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?
A. PKI server
B. smart card enrollment station
C. smart card verification station
D. Certification Authority (CA)
Ans: B

Qus 22 :
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.
A. 97
B. 68
C. 127
D. 142
Ans: C

Qus 23 :
What is a method of controlling settings across your network?
A. Group Policy
B. Active Directory
C. FSMO roles
D. MMC
Ans: A

Qus 24 :
What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?
A. Group Policies
B. Group Policy Settings
C. Group Policy Objects
D. Group Policy Links
Ans: C

Qus 25 :
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?
A. Reverse Processing
B. Switchback Processing
C. Loopback Processing
D. Repeat Processing
Ans: C

Qus 26 :
Local GPO settings are stored in what folder on a computer?
A. %systemroot%/System32/GroupPolicy
B. %systemroot%/System32/Drivers/GroupPolicy
C. %systemroot%/System32/Drivers/Etc/GroupPolicy
D. %systemroot%/System/GroupPolicy
Ans: A

Qus 27 :
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?
A. Fine-Grained Password Policies
B. Fine-Tuned Password Policies
C. Restricted Password Policies
D. Custom Password Policies
Ans: A

Qus 28 :
Where can you configure the Group Policy refresh interval?
A. Computer Configuration\\System\\Group Policy
B. User Configuration\\Administrative Templates\\System\\Group Policy
C. Computer Configuration\\Administrative Templates\\System\\Group Policy
D. Computer Configuration\\Administrative Templates\\Group Policy
Ans: C

Qus 29 :
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
A. .exe
B. .msi
C. .mse
D. .inf
Ans: B

Qus 30 :
Modifications to .msi files require transform files, which have the __________ extension.
A. .msit
B. .mse
C. .msx
D. .mst
Ans: D

Qus 31 :
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
A. Unrestricted
B. Restricted
C. Basic User
D. Disallowed
Ans: C

Qus 32 :
What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?
A. Linked Group Policy Objects
B. Group Policy Inheritance
C. Delegation
D. Management
Ans: C

Qus 33 :
What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?
A. Block Policy Propagation
B. Block Policy Inheritance
C. Remove Policy Inheritance
D. Remove Policy Propagation
Ans: B

Qus 34 :
How many WMI filters can be configured per GPO?
A. one
B. two
C. three
D. five
Ans: A

Qus 35 :
To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
A. Active Directory Restore
B. Active Directory Maintenance
C. Directory Services Maintenance
D. Directory Services Restore
Ans: D

Qus 36 :
In Windows Server 2008, you must back up __________ rather than only backing up the System State data.
A. critical volumes
B. system volumes
C. MBR records
D. MX records
Ans: A

Qus 37 :
To back up Active Directory, you must install what feature from the Server Manager console?
A. Active Directory Backup Client
B. Windows Backup Utility
C. Windows Server Backup
D. BackupExec
Ans: C



Qus 38 :
What is the process by which one DNS server sends a name resolution request to another DNS server?
A. resolution
B. translation
C. referral
D. propagation
Ans: C

Qus 39 :
What DNS server contains no zones and hosts no domains?
A. secondary domain controller
B. global catalog server
C. secondary DNS server
D. caching-only server
Ans: D

Qus 40 :
What Windows Server 2008 service can you use to protect sensitive data on a Windows network?
A. AD FS
B. AD FTP
C. AD FSMO
D. AD RMS
Ans: D

Qus 41 :
What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?
A. Identity Lifecycle Management
B. General Lifecycle Management
C. Microsoft Lifecycle Management
D. Lifecycle of Software Management
Ans: A

Qus 42 :
What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?
A. RSA SecureID
B. digital certificates
C. smart cards
D. biometric device
Ans: C



Qus 43 :
What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?
A. Web Enrollment
B. Web Responder
C. enterprise CA
D. Online Responder
Ans: D


Qus 44 :
A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
A. domain controller
B. domain manager
C. global catalog
D. DNS server
Ans: A

Qus 45 :
What protocol has become an industry standard that enables data exchange between directory services and applications?
A. NTDS
B. LDAP
C. NDIS
D. AD
Ans: B

Qus 46 :
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
A. A records
B. MX records
C. SRV records
D. SOA records
Ans: C

Qus 47:
What is the process of replicating DNS information from one DNS server to another?
A. replication
B. DNS push
C. zone transfer
D. DNS update
Ans: C

Qus 48 :
What type of trust relationship allows you to create two-way transitive trusts between separate forests?
A. shortcut
B. cross-forest
C. external
D. real
Ans: B

Qus 49 :
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
A. primary lookup
B. secondary lookup
C. forward lookup
D. reverse lookup
Ans: C

Qus 50 :
What DLL must be registered to use the Schema Management snap-in?
A. schmmgnt32.dll
B. schemamanagement.dll
C. schmmgmt.dll
D. adschm.dll
Ans: C

Qus 51 :
Replication within Active Directory will occur when which of the following conditions is met?
A. An object is added or removed from Active Directory.
B. The value of an attribute has changed.
C. The name of an object has changed.
D. All of the above
Ans: D

Qus 52 :
What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?
A. Dcdiag
B. Repdiag
C. Repadmin
D. Netstat
Ans: C



Qus 53 :
Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the beginning of the line and applied before any other changes that are waiting to be replicated.
A. urgent
B. immediate
C. fast
D. pushed
Ans: A

Qus 54 :
Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
A. Relative Identifier Master
B. Infrastructure Master
C. Domain Naming Master
D. Schema Master
Ans: C

Qus 55 :
What types of memberships are stored in the global catalog?
A. domain local
B. universal
C. global
D. local workstation
Ans: B

Qus 56 :
What console must be used to move the Domain Naming Master FSMO role?
A. Active Directory Users and Computers
B. Active Directory Forests and Domains
C. Active Directory Schema
D. Active Directory Domains and Trusts
Ans: D

Qus 57 :
What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?
A. NETDIAG
B. NSLOOKUP
C. CSVDE
D. DCPROMO
Ans: C


Qus 58 :
What special identity group is used by the system to allow permission to protected system files for services to function properly?
A. Network Service
B. Restricted
C. Service
D. Self
Ans: C

Qus 59 :
When using CSVDE, what is the first line of the text file that uses proper attribute names?
A. header row
B. header record
C. name row
D. name record
Ans: B

Qus 60 :
Which of the following is not a characteristic of a strong password?
A. at least eight characters in length
B. at least one character from each of the previous character types
C. is not your birth date
D. differs significantly from other previously used passwords
Ans: C

Qus 61 :
What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
A. CKI
B. PKI
C. DKI
D. PCI
Ans: B

Qus 62 :
What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
A. enrollment agent
B. enrollment credential
C. enrollment verification
D. enrollment authority
Ans: A


Qus 63 :
What process applies Group Policy settings to various containers within Active Directory?
A. attaching
B. linking
C. connecting
D. nesting
Ans: B

Qus 64 :
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
A. Default Domain Controller
B. Default Domain
C. Default
D. Domain
Ans: B

Qus 65 :
What policies work with folder redirection to provide the ability to cache files locally?
A. registry-based
B. software installation
C. folder redirection
D. offline file storage
Ans: D

Qus 66 :
What is the path to the default GPT structure for a domain?
A. %systemroot%\\sysvol\\sysvol\\domain.com\\Policies
B. %systemroot%\\sysvol\\domain.com\\Policies
C. %systemroot%\\domain.com\\Policies
D. %systemroot%\\Policies
Ans: A

Qus 67 :What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
A. Local Policy
B. Security Policy
C. Audit Policy
D. None of the above
Ans: C

Qus 68 :
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
A. Folder Sharing
B. Folder Redirection
C. Desktop Redirection
D. Profile Redirection
Ans: B

Qus 69 :
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
A. PKI Policies
B. Secure Key Policies
C. Public Key Policies
D. Private Key Policies
Ans: C

Qus 70 :
__________ files are used to apply service packs and hotfixes to installed software.
A. Update
B. Patch
C. Upgrade
D. Enhanced
Ans: B

Qus 71 :
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
A. hash rule
B. certificate rule
C. Path rule
D. all of the above
Ans: D

Qus 72 :
What policies are designed to identify software and control its execution?
A. Software Restriction
B. Software Execution Prevention
C. Malicious Software Detection
D. Malicious Software Removal Policies
Ans: A

Qus 73 :
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
A. Effective Permissions
B. Resultant Set of Policy
C. Effective Set of Policy
D. Applied Policy
Ans: B

Qus 74 :
Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?
A. Group Policy Simulator
B. Group Policy Planning
C. Group Policy Modeling
D. Group Policy Results
Ans: D

Qus 75 :
What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?
A. Block Policy Inheritance
B. Policy Delegation
C. Group Based Filtering
D. Security Group Filtering
Ans: D

Qus 76 :
What manual process defragments the Active Directory database in addition to reducing its size?
A. online defragmentation
B. local defragmentation
C. remote defragmentation
D. offline defragmentation
Ans: D

Qus 77 :
The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.
A. objects
B. counters
C. items
D. classes
Ans: A

Qus 78 :
What is the command-line component of the Windows Server Backup snap-in?
A. wbadm
B. wbadmin
C. backadm
D. ntbackup
Ans: B

Qus 79 :
Server Backup does not support the use of which type of backup media?
A. CD drives
B. DVD drives
C. hard drives
D. magnetic tape
Ans: D

Qus 80 :
What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?
A. DNS
B. DHCP
C. NetBIOS
D. ADFS
Ans: A

Qus 81 :
What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?
A. secondary zone
B. stub zone
C. primary zone
D. forwarder zone
Ans: C

Qus 82 :
What are the highest-level DNS servers in the entire namespace?
A. top-level name server
B. root name server
C. authoritative name server
D. upstream name server
Ans: B

Qus 83 :
In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?
A. user organizations
B. account organizations
C. computer organizations
D. resource organizations
Ans: B

Qus 84 :
What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?
A. Active Directory Users and Computers
B. Group Policy
C. Active Directory Certificate Services
D. Active Directory Domains and Trusts
Ans: C

Qus 85 :
What enables a user to manually create a certificate request file using the Certificates MMC snap-in?
A. PKI
B. Certificate Request Wizard
C. Autoenrollment Wizard
D. Enrollment ACL
Ans: B

Qus 86 :
The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called __________.
A. copying
B. osmosis
C. transferring
D. replication
Ans: D

Qus 87 :
__________ is the highest available forest functional level.
A. Windows 2000
B. Windows Server 2003
C. Windows Server 2008
D. Windows 2009
Ans: C

Qus 88 :
A __________ name references an object in the Active Directory directory structure by using its entire hierarchical path, starting with the object itself and including all parent objects up to the root of the domain.
A. common
B. DNS
C. schema
D. distinguished
Ans: D

Qus 89:
To raise the functional level of a forest, you must be logged on as a member of the __________ group.
A. Domain Admins
B. Enterprise Admins
C. Global Admins
D. Universal Admins
Ans: B

Qus 90:
__________ roles work together to enable the multimaster functionality of Active Directory.
A. FSMO
B. FMMO
C. FMSO
D. FOMO
Ans: A

Qus 91:
What utility is used to manually create trust relationships?
A. Active Directory Trust Console
B. Active Directory Trust Wizard
C. Active Directory Domains and Trusts MMC snap-in
D. Active Directory Domains and Trusts control panel
Ans: C

Qus 92:
What role provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications?
A. AD LSD
B. AD SLD
C. AD DLS
D. AD LDS
Ans: D

Qus 93:
The primary goal of intersite replication is to minimize the usage of __________.
A. Active Directory
B. administrative labor
C. bandwidth
D. financial support
Ans: C

Qus 94 :
What process is responsible for selecting a bridgehead server and mapping the topology to be used for replication between sites?
A. Intersite Bridgehead Replicator
B. Intersite Replication Generator
C. Intersite Bridgehead Generator
D. Intersite Topology Generator
Ans: D

Qus 95 :
Which of these design aspects should you consider when planning the appropriate location of FSMO role holders?
A. number of domains that are or will be part of the forest
B. physical structure of the network
C. number of domain controllers that will be available in each domain
D. all of the above
Ans: D

Qus 96 :
What allows a user to be able to log on using a cached copy of his or her logon credentials that have been stored on his or her local workstation?
A. cached login
B. cached credentials
C. stored login
D. stored credentials
Ans: B

Qus 97 :
Which FSMO role is responsible for reference updates from its domain objects to other domains?
A. Relative Identifier Master
B. Infrastructure Master
C. Domain Naming Master
D. Schema Master
Ans: B

Qus 98 :
What port is used by Active Directory to direct search requests to a global catalog server?
A. 3629
B. 3389
C. 3268
D. 3232
Ans: C

Qus 99 :
What is the process of confirming a user’s identity by using a known value, such as a password, pin number on a smart card, or user’s fingerprint or handprint in the Qus of biometric authentication?
A. authorization
B. authentication
C. administration
D. allocation
Ans: B

Qus 100 :
What signifies an object’s relative location within an Active Directory OU structure?
A. common name
B. distinguished name
C. SAM account name
D. AD name
Ans: B

Qus 101 :
The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account.
A. Network
B. Interactive
C. Power User
D. Guest

Ans: D

No comments:

Post a Comment

RADIUS Server Configure in Server 2012

Home About Me Apple Networking Software Storage Downloads Links Contact How to setup Radius for authentication wi...