Qus.1 What allows
businesses to define, accemanage, ss, and secure network resources
including files, printers, people, and applications?
A. network service
B. directory service
C. Directory
Infrastructure
D. NT directory
Ans: B
Qus 2 : A
__________ is defined as one or more IP subnets that are connected by
fast links.
A. domain
B. network
C. site
D. forest
Ans: C
Qus 3 : What
contains the rules and definitions that are used for creating and
modifying object classes and attributes within Active Directory?
A. Configuration NC
B. Schema NC
C. Domain NC
D. DC NC
Ans : B
Qus 4 : What shared
folder exists on all domain controllers and is used to store Group
Policy objects, login scripts, and other files that are replicated
domain-wide?
A. SYSVOL
B. AD
C. C$
D. VOLMGR
Ans: A
Qus 5 : What new
Windows Server 2008 feature is a special installation option that
creates a minimal environment for running only specific services and
roles?
A. Minimal
Installation Option
B. Server Core
C. Server Standard
D. Minimal Server
Environment (MSE)
Ans: B
Qus 6 : What is the
minimum amount of storage space required for the Active Directory
installation files?
A. 100 MB
B. 150 MB
C. 200 MB
D. 250 MB
Ans: C
Qus 7 : When
modifying the schema, Microsoft recommends adding administrators to
what group only for the duration of the task?
A. Schema Admins
B. Enterprise Admins
C. Global Admins
D. Forest Admins
Ans: A
Qus 8 : When you
install the forest root domain controller in an Active Directory
forest, the Active Directory Installation Wizard creates a single
site named __________.
A. Default-Site
B. Site-Default
C. Default-Site-Name
D.
Default-First-Site-Name
Ans: D
Qus 9 : What
command-line tool used for monitoring Active Directory provides
functionality that includes performing connectivity and replication
tests?
A. dcdiag
B. netdiag
C. dcpromo
D. netstat
Ans: A
Qus 10 : When
replicating information between sites, Active Directory will
designate a __________ server in each site to act as a gatekeeper in
managing site-to-site replication.
A. primary
B. masthead
C. bridgehead
D. global catalog
Ans: C
Qus 11 : What
defines a chain of site links by which domain controllers from
different sites can communicate?
A. site link bridge
B. site chain
C. site chain bridge
D. site link chain
Ans: A
Qus 12 : How many
FSMO roles does Active Directory support?
A. 2
B. 5
C. 10
D. 12
Ans: B
Qus 13 : How many
RID Masters can a domain have?
A. 1
B. 2
C. 3
D. 5
Ans: A
Qus 14 : What
procedure is used only when you have experienced a catastrophic
failure of a domain controller that holds a FSMO role and you need to
recover that role?
A. role transfer
B. role migration
C. role seizure
D. role separation
Ans: C
Qus 15 : What
special identity group contains all authenticated users and domain
guests?
A. Power Users
B. Everyone
C. Batch
D. Authenticated
Users
Ans: B
Qus 16 : __________
name refers to each user’s login name.
A. Common
B. Distinguished
C. SAM account
D. AD Name
Ans: C
Qus 17 : You cannot
manually modify the group membership of or view the membership lists
of __________ groups.
A. distribution
B. domain local
C. special identity
D. universal
Ans: C
Qus 18 :
What can be used to
add, delete, or modify objects in Active Directory, in addition to
modifying the schema if necessary?
A. DCPROMO
B. LDIFDE
C. CSVDE
D. NSLOOKUP
Ans: B
Qus 19 :
Which of the
following is a benefit of implementing a public key infrastructure
(PKI)?
A. Users no longer
need to remember passwords.
B. All information
is stored on the smart card, making it difficult for anyone except
the intended user to use or access it.
C. Smart cards can
be used from remote locations, such as a home office, to provide
authentication services.
D. All of the above
Ans: D
Qus 20 :
What method of
authentication requires a smart card and a PIN to provide more secure
access to company resources?
A. two-factor
authentication
B. dual
authentication
C. complex
authentication
D. strong
authentication
Ans: A
Qus 21 :
What dedicated
workstation allows an administrator or another authorized user to
preconfigure certificates and smart cards on behalf of a user or
workstation?
A. PKI server
B. smart card
enrollment station
C. smart card
verification station
D. Certification
Authority (CA)
Ans: B
Qus 22 :
Passwords for
Windows Server 2008, Windows Vista, Windows Server 2003, and
Microsoft Windows XP clients can be __________ characters in length.
A. 97
B. 68
C. 127
D. 142
Ans: C
Qus 23 :
What is a method of
controlling settings across your network?
A. Group Policy
B. Active Directory
C. FSMO roles
D. MMC
Ans: A
Qus 24 :
What contains all of
the Group Policy settings that you wish to implement to user and
computer objects within a site, domain, or OU?
A. Group Policies
B. Group Policy
Settings
C. Group Policy
Objects
D. Group Policy
Links
Ans: C
Qus 25 :
What allows the
Group Policy processing order to circle back and reapply the computer
policies after all user policies and logon scripts run?
A. Reverse
Processing
B. Switchback
Processing
C. Loopback
Processing
D. Repeat Processing
Ans: C
Qus 26 :
Local GPO settings
are stored in what folder on a computer?
A.
%systemroot%/System32/GroupPolicy
B.
%systemroot%/System32/Drivers/GroupPolicy
C.
%systemroot%/System32/Drivers/Etc/GroupPolicy
D.
%systemroot%/System/GroupPolicy
Ans: A
Qus 27 :
What policies can be
applied to one or more users or groups of users, allowing you to
specify a more or less stringent password policy for this subset than
the password policy defined for the entire domain?
A. Fine-Grained
Password Policies
B. Fine-Tuned
Password Policies
C. Restricted
Password Policies
D. Custom Password
Policies
Ans: A
Qus 28 :
Where can you
configure the Group Policy refresh interval?
A. Computer
Configuration\\System\\Group Policy
B. User
Configuration\\Administrative Templates\\System\\Group Policy
C. Computer
Configuration\\Administrative Templates\\System\\Group Policy
D. Computer
Configuration\\Administrative Templates\\Group Policy
Ans: C
Qus 29 :
Microsoft Windows
Server 2008 uses the Windows Installer with Group Policy to install
and manage software that is packaged into what type of file?
A. .exe
B. .msi
C. .mse
D. .inf
Ans: B
Qus 30 :
Modifications to
.msi files require transform files, which have the __________
extension.
A. .msit
B. .mse
C. .msx
D. .mst
Ans: D
Qus 31 :
When configuring
Software Restriction policies, which option prevents any application
from running that requires administrative rights, but allows programs
to run that only require resources that are accessible by normal
users?
A. Unrestricted
B. Restricted
C. Basic User
D. Disallowed
Ans: C
Qus 32 :
What tab displays
groups and users with permission to link, perform modeling analyses,
or read Group Policy Results information?
A. Linked Group
Policy Objects
B. Group Policy
Inheritance
C. Delegation
D. Management
Ans: C
Qus 33 :
What setting will
prevent policy settings from applying to all child objects at the
current level and all subordinate levels?
A. Block Policy
Propagation
B. Block Policy
Inheritance
C. Remove Policy
Inheritance
D. Remove Policy
Propagation
Ans: B
Qus 34 :
How many WMI filters
can be configured per GPO?
A. one
B. two
C. three
D. five
Ans: A
Qus 35 :
To perform a System
State restore in Windows Server 2008, you will boot the DC into what
mode?
A. Active Directory
Restore
B. Active Directory
Maintenance
C. Directory
Services Maintenance
D. Directory
Services Restore
Ans: D
Qus 36 :
In Windows Server
2008, you must back up __________ rather than only backing up the
System State data.
A. critical volumes
B. system volumes
C. MBR records
D. MX records
Ans: A
Qus 37 :
To back up Active
Directory, you must install what feature from the Server Manager
console?
A. Active Directory
Backup Client
B. Windows Backup
Utility
C. Windows Server
Backup
D. BackupExec
Ans: C
Qus 38 :
What is the process
by which one DNS server sends a name resolution request to another
DNS server?
A. resolution
B. translation
C. referral
D. propagation
Ans: C
Qus 39 :
What DNS server
contains no zones and hosts no domains?
A. secondary domain
controller
B. global catalog
server
C. secondary DNS
server
D. caching-only
server
Ans: D
Qus 40 :
What Windows Server
2008 service can you use to protect sensitive data on a Windows
network?
A. AD FS
B. AD FTP
C. AD FSMO
D. AD RMS
Ans: D
Qus 41 :
What enables network
administrators and owners to configure access rights for users during
the users’ entire lifecycle within an organization?
A. Identity
Lifecycle Management
B. General Lifecycle
Management
C. Microsoft
Lifecycle Management
D. Lifecycle of
Software Management
Ans: A
Qus 42 :
What are small
physical devices on which a digital certificate is installed that are
usually the size of a credit card or keychain fob?
A. RSA SecureID
B. digital
certificates
C. smart cards
D. biometric device
Ans: C
Qus 43 :
What service
responds to requests from clients concerning the revocation status of
a particular certificate, returning a digitally signed response
indicating the certificate’s current status?
A. Web Enrollment
B. Web Responder
C. enterprise CA
D. Online Responder
Ans: D
Qus 44 :
A Windows Server
2008 computer that has been configured with the Active Directory DS
role is referred to as a __________.
A. domain controller
B. domain manager
C. global catalog
D. DNS server
Ans: A
Qus 45 :
What protocol has
become an industry standard that enables data exchange between
directory services and applications?
A. NTDS
B. LDAP
C. NDIS
D. AD
Ans: B
Qus 46 :
What locator records
within DNS allow clients to locate an Active Directory domain
controller or global catalog?
A. A records
B. MX records
C. SRV records
D. SOA records
Ans: C
Qus 47:
What is the process
of replicating DNS information from one DNS server to another?
A. replication
B. DNS push
C. zone transfer
D. DNS update
Ans: C
Qus 48 :
What type of trust
relationship allows you to create two-way transitive trusts between
separate forests?
A. shortcut
B. cross-forest
C. external
D. real
Ans: B
Qus 49 :
What type of zone is
necessary for computer hostname-to-IP address mappings, which are
used for name resolution by a variety of services?
A. primary lookup
B. secondary lookup
C. forward lookup
D. reverse lookup
Ans: C
Qus 50 :
What DLL must be
registered to use the Schema Management snap-in?
A. schmmgnt32.dll
B.
schemamanagement.dll
C. schmmgmt.dll
D. adschm.dll
Ans: C
Qus 51 :
Replication within
Active Directory will occur when which of the following conditions is
met?
A. An object is
added or removed from Active Directory.
B. The value of an
attribute has changed.
C. The name of an
object has changed.
D. All of the above
Ans: D
Qus 52 :
What command-line
tool can be used to manually create a replication topology if site
link bridging is disabled if the network is not fully routed?
A. Dcdiag
B. Repdiag
C. Repadmin
D. Netstat
Ans: C
Qus 53 :
Certain operations,
such as a password change or an account lockout, will be transmitted
by using __________ replication, which means that the change will be
placed at the beginning of the line and applied before any other
changes that are waiting to be replicated.
A. urgent
B. immediate
C. fast
D. pushed
Ans: A
Qus 54 :
Which FSMO role has
the authority to manage the creation and deletion of domains, domain
trees, and application data partitions in the forest?
A. Relative
Identifier Master
B. Infrastructure
Master
C. Domain Naming
Master
D. Schema Master
Ans: C
Qus 55 :
What types of
memberships are stored in the global catalog?
A. domain local
B. universal
C. global
D. local workstation
Ans: B
Qus 56 :
What console must be
used to move the Domain Naming Master FSMO role?
A. Active Directory
Users and Computers
B. Active Directory
Forests and Domains
C. Active Directory
Schema
D. Active Directory
Domains and Trusts
Ans: D
Qus 57 :
What command-line
utility is used to import or export Active Directory information from
a comma-separated value (.csv) file?
A. NETDIAG
B. NSLOOKUP
C. CSVDE
D. DCPROMO
Ans: C
Qus 58 :
What special
identity group is used by the system to allow permission to protected
system files for services to function properly?
A. Network Service
B. Restricted
C. Service
D. Self
Ans: C
Qus 59 :
When using CSVDE,
what is the first line of the text file that uses proper attribute
names?
A. header row
B. header record
C. name row
D. name record
Ans: B
Qus 60 :
Which of the
following is not a characteristic of a strong password?
A. at least eight
characters in length
B. at least one
character from each of the previous character types
C. is not your birth
date
D. differs
significantly from other previously used passwords
Ans: C
Qus 61 :
What is a system of
digital certificates, certification authorities (CAs), and other
registration authorities (RAs) that verify and authenticate the
validity of each party involved in an electronic transaction through
the use of public key cryptography?
A. CKI
B. PKI
C. DKI
D. PCI
Ans: B
Qus 62 :
What types of
certificates are generated by the enterprise CA and used to generate
a smart card logon certificate for users in the organization?
A. enrollment agent
B. enrollment
credential
C. enrollment
verification
D. enrollment
authority
Ans: A
Qus 63 :
What process applies
Group Policy settings to various containers within Active Directory?
A. attaching
B. linking
C. connecting
D. nesting
Ans: B
Qus 64 :
The __________
Policy is linked to the domain, and its settings affect all users and
computers in the domain.
A. Default Domain
Controller
B. Default Domain
C. Default
D. Domain
Ans: B
Qus 65 :
What policies work
with folder redirection to provide the ability to cache files
locally?
A. registry-based
B. software
installation
C. folder
redirection
D. offline file
storage
Ans: D
Qus 66 :
What is the path to
the default GPT structure for a domain?
A.
%systemroot%\\sysvol\\sysvol\\domain.com\\Policies
B.
%systemroot%\\sysvol\\domain.com\\Policies
C.
%systemroot%\\domain.com\\Policies
D.
%systemroot%\\Policies
Ans: A
Qus 67 :What section
of GPO Local Policies allows administrators to log successful and
failed security events such as logon events, account access, and
object access?
A. Local Policy
B. Security Policy
C. Audit Policy
D. None of the above
Ans: C
Qus 68 :
What provides
administrators with the ability to redirect the contents of certain
folders to a network location or to another location on the user’s
local computer?
A. Folder Sharing
B. Folder
Redirection
C. Desktop
Redirection
D. Profile
Redirection
Ans: B
Qus 69 :
Settings available
in the __________ area of Group Policy allow greater administrative
control in establishing rules and governing the issuance,
maintenance, and guidelines within a public key infrastructure (PKI).
A. PKI Policies
B. Secure Key
Policies
C. Public Key
Policies
D. Private Key
Policies
Ans: C
Qus 70 :
__________ files are
used to apply service packs and hotfixes to installed software.
A. Update
B. Patch
C. Upgrade
D. Enhanced
Ans: B
Qus 71 :
Which of the
following is a software restriction rule that can be used to govern
which programs can or cannot run on your network?
A. hash rule
B. certificate rule
C. Path rule
D. all of the above
Ans: D
Qus 72 :
What policies are
designed to identify software and control its execution?
A. Software
Restriction
B. Software
Execution Prevention
C. Malicious
Software Detection
D. Malicious
Software Removal Policies
Ans: A
Qus 73 :
What is the sum of
the policies applied to a user or computer after all filters,
security group permissions, and inheritance settings, such as Block
Policy Inheritance and Enforce, have finished processing?
A. Effective
Permissions
B. Resultant Set of
Policy
C. Effective Set of
Policy
D. Applied Policy
Ans: B
Qus 74 :
Rather than
simulating policy effects like the Group Policy Modeling Wizard, what
obtains RSoP information from the client computer to show the actual
effects that policies have on the client computer and user
environment?
A. Group Policy
Simulator
B. Group Policy
Planning
C. Group Policy
Modeling
D. Group Policy
Results
Ans: D
Qus 75 :
What refines the
application of a GPO to include or exclude certain users, groups, or
computers based on the ACL that is applied to the GPO?
A. Block Policy
Inheritance
B. Policy Delegation
C. Group Based
Filtering
D. Security Group
Filtering
Ans: D
Qus 76 :
What manual process
defragments the Active Directory database in addition to reducing its
size?
A. online
defragmentation
B. local
defragmentation
C. remote
defragmentation
D. offline
defragmentation
Ans: D
Qus 77 :
The Reliability and
Performance Monitor uses categories called performance __________ to
organize the items that can be monitored.
A. objects
B. counters
C. items
D. classes
Ans: A
Qus 78 :
What is the
command-line component of the Windows Server Backup snap-in?
A. wbadm
B. wbadmin
C. backadm
D. ntbackup
Ans: B
Qus 79 :
Server Backup does
not support the use of which type of backup media?
A. CD drives
B. DVD drives
C. hard drives
D. magnetic tape
Ans: D
Qus 80 :
What is the name
resolution mechanism that computers use for all Internet
communications and for private networks that use the Active Directory
domain services included with Microsoft Windows Server 2008, Windows
Server 2003, and Windows 2000 Server?
A. DNS
B. DHCP
C. NetBIOS
D. ADFS
Ans: A
Qus 81 :
What type of zone
contains the master copy of the zone database in which administrators
make all changes to the zone’s resource records?
A. secondary zone
B. stub zone
C. primary zone
D. forwarder zone
Ans: C
Qus 82 :
What are the
highest-level DNS servers in the entire namespace?
A. top-level name
server
B. root name server
C. authoritative
name server
D. upstream name
server
Ans: B
Qus 83 :
In terms of AD FS,
what organizations contain the user accounts that are accessing the
resources controlled by resource organizations, similar to a trusted
domain in a traditional Windows trust relationship?
A. user
organizations
B. account
organizations
C. computer
organizations
D. resource
organizations
Ans: B
Qus 84 :
What role in ILM is
to provide services for managing public key certificates that can be
used by any security system that relies on a PKI for authentication
or authorization?
A. Active Directory
Users and Computers
B. Group Policy
C. Active Directory
Certificate Services
D. Active Directory
Domains and Trusts
Ans: C
Qus 85 :
What enables a user
to manually create a certificate request file using the Certificates
MMC snap-in?
A. PKI
B. Certificate
Request Wizard
C. Autoenrollment
Wizard
D. Enrollment ACL
Ans: B
Qus 86 :
The process of
keeping each domain controller in synch with changes that have been
made elsewhere on the network is called __________.
A. copying
B. osmosis
C. transferring
D. replication
Ans: D
Qus 87 :
__________ is the
highest available forest functional level.
A. Windows 2000
B. Windows Server
2003
C. Windows Server
2008
D. Windows 2009
Ans: C
Qus 88 :
A __________ name
references an object in the Active Directory directory structure by
using its entire hierarchical path, starting with the object itself
and including all parent objects up to the root of the domain.
A. common
B. DNS
C. schema
D. distinguished
Ans: D
Qus 89:
To raise the
functional level of a forest, you must be logged on as a member of
the __________ group.
A. Domain Admins
B. Enterprise Admins
C. Global Admins
D. Universal Admins
Ans: B
Qus 90:
__________ roles
work together to enable the multimaster functionality of Active
Directory.
A. FSMO
B. FMMO
C. FMSO
D. FOMO
Ans: A
Qus 91:
What utility is used
to manually create trust relationships?
A. Active Directory
Trust Console
B. Active Directory
Trust Wizard
C. Active Directory
Domains and Trusts MMC snap-in
D. Active Directory
Domains and Trusts control panel
Ans: C
Qus 92:
What role provides
developers with the ability to store data for directory-enabled
applications without incurring the overhead of extending the Active
Directory schema to support their applications?
A. AD LSD
B. AD SLD
C. AD DLS
D. AD LDS
Ans: D
Qus 93:
The primary goal of
intersite replication is to minimize the usage of __________.
A. Active Directory
B. administrative
labor
C. bandwidth
D. financial support
Ans: C
Qus 94 :
What process is
responsible for selecting a bridgehead server and mapping the
topology to be used for replication between sites?
A. Intersite
Bridgehead Replicator
B. Intersite
Replication Generator
C. Intersite
Bridgehead Generator
D. Intersite
Topology Generator
Ans: D
Qus 95 :
Which of these
design aspects should you consider when planning the appropriate
location of FSMO role holders?
A. number of domains
that are or will be part of the forest
B. physical
structure of the network
C. number of domain
controllers that will be available in each domain
D. all of the above
Ans: D
Qus 96 :
What allows a user
to be able to log on using a cached copy of his or her logon
credentials that have been stored on his or her local workstation?
A. cached login
B. cached
credentials
C. stored login
D. stored
credentials
Ans: B
Qus 97 :
Which FSMO role is
responsible for reference updates from its domain objects to other
domains?
A. Relative
Identifier Master
B. Infrastructure
Master
C. Domain Naming
Master
D. Schema Master
Ans: B
Qus 98 :
What port is used by
Active Directory to direct search requests to a global catalog
server?
A. 3629
B. 3389
C. 3268
D. 3232
Ans: C
Qus 99 :
What is the process
of confirming a user’s identity by using a known value, such as a
password, pin number on a smart card, or user’s fingerprint or
handprint in the Qus of biometric authentication?
A. authorization
B. authentication
C. administration
D. allocation
Ans: B
Qus 100 :
What signifies an
object’s relative location within an Active Directory OU structure?
A. common name
B. distinguished
name
C. SAM account name
D. AD name
Ans: B
Qus 101 :
The two built-in
user accounts that are created on a Windows Server 2008 computer are
the Administrator account and the __________ account.
A. Network
B. Interactive
C. Power User
D. Guest
Ans: D
No comments:
Post a Comment