-
1.What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?
-
A.
Directory service
-
B.
NT directory
-
A.
-
2.A __________ is defined as one or more IP subnets that are connected by fast links.
-
A.
Domain
-
B.
Site
-
A.
-
3.What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?
-
A.
Configuration NC
-
B.
Schema NC
-
A.
-
4.What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?
-
A.
C$
-
B.
SYSVOL
-
A.
-
5.What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?
-
A.
Server Core
-
B.
Minimal Installation Option
-
A.
-
6.What is the minimum amount of storage space required for the Active Directory installation files?
-
A.
250 MB
-
B.
200 MB
-
A.
-
7.When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?
-
A.
Global Admins
-
B.
Schema Admins
-
A.
-
8.When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.
-
A.
Default-First-Site-Name
-
B.
Default-Site-Name
-
A.
-
9.What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?
-
A.
Dcdiag
-
B.
Netdiag
-
A.
-
10.When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.
-
A.
Bridgehead
-
B.
Masthead
-
A.
-
11.What defines a chain of site links by which domain controllers from different sites can communicate?
-
A.
Site link chain
-
B.
Site link bridge
-
A.
-
12.How many FSMO roles does Active Directory support?
-
A.
16
-
B.
5
-
A.
-
13.How many RID Masters can a domain have?
-
A.
5
-
B.
1
-
A.
-
14.What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?
-
A.
Role seizure
-
B.
Role separation
-
A.
-
15.What special identity group contains all authenticated users and domain guests?
-
A.
Power Users
-
B.
Everyone
-
A.
-
16.__________ name refers to each user’s login name.
-
A.
SAM account
-
B.
AD Name
-
A.
-
17.You cannot manually modify the group membership of or view the membership lists of __________ groups.
-
A.
Domain local
-
B.
Special identity
-
A.
-
18.What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?
-
A.
NSLOOKUP
-
B.
LDIFDE
-
A.
-
19.Which of the following is a benefit of implementing a public key infrastructure (PKI)?
-
A.
Users no longer need to remember passwords.
-
B.
All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
-
A.
-
20.What method of authentication requires a smart card and a PIN to provide more secure access to company resources?
-
A.
Complex authentication
-
B.
Two-factor authentication
-
A.
-
21.What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?
-
A.
Smart card enrollment station
-
B.
Certification Authority (CA
-
A.
-
22.Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.
-
A.
97
-
B.
64
-
C.
127
-
D.
142
-
A.
-
23.What is a method of controlling settings across your network?
-
A.
Group Policy
-
B.
Active Directory
-
A.
-
24.What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?
-
A.
Group Policies
-
B.
Group Policy Settings
-
C.
Group Policy Objects
-
A.
-
25.What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?
-
A.
Reverse Processing
-
B.
Switchback Processing
-
C.
Loopback Processing
-
A.
-
26.Local GPO settings are stored in what folder on a computer?
-
A.
%systemroot%/System32/GroupPolicy
-
B.
%systemroot%/System32/Drivers/GroupPolicy
-
C.
%systemroot%/System32/Drivers/Etc/GroupPolicy
-
D.
%systemroot%/System/GroupPolicy
-
A.
-
27.What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?
-
A.
Fine-Tuned Password Policies
-
B.
Fine-Grained Password Policies
-
C.
Restricted Password Policies
-
A.
-
28.Where can you configure the Group Policy refresh interval?
-
A.
Computer Configuration\\System\\Group Policy
-
B.
User Configuration\\Administrative Templates\\System\\Group Policy
-
C.
Computer Configuration\\Administrative Templates\\System\\Group Policy
-
D.
Computer Configuration\\Administrative Templates\\Group Policy
-
A.
-
29.Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
-
A.
.exe
-
B.
.msi
-
C.
.mse
-
D.
.inf
-
A.
-
30.Modifications to .msi files require transform files, which have the __________ extension.
-
A.
.msit
-
B.
.mse
-
C.
.msx
-
D.
.mst
-
A.
-
31.When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
-
A.
Unrestricted
-
B.
Restricted
-
C.
Basic User
-
D.
Disallowed
-
A.
-
32.What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?
-
A.
Linked Group Policy Objects
-
B.
Group Policy Inheritance
-
C.
Delegation
-
D.
Management
-
A.
-
33.What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?
-
A.
Block Policy Propagation
-
B.
Block Policy Inheritance
-
C.
Remove Policy Inheritance
-
D.
Remove Policy Propagation
-
A.
-
34.How many WMI filters can be configured per GPO?
-
A.
One
-
B.
Two
-
C.
Three
-
D.
Five
-
A.
-
35.To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
-
A.
Active Directory Restore
-
B.
Active Directory Maintenance
-
C.
Directory Services Maintenance
-
D.
Directory Services Restore
-
A.
-
36.In Windows Server 2008, you must back up __________ rather than only backing up the System State data.
-
A.
Critical volumes
-
B.
System volumes
-
C.
MBR records
-
D.
MX records
-
A.
-
37.To back up Active Directory, you must install what feature from the Server Manager console?
-
A.
Active Directory Backup Client
-
B.
Windows Backup Utility
-
C.
Windows Server Backup
-
D.
BackupExec
-
A.
-
38.What is the process by which one DNS server sends a name resolution request to another DNS server?
-
A.
Resolution
-
B.
Translation
-
C.
Referral
-
D.
Propagation
-
A.
-
39.What DNS server contains no zones and hosts no domains?
-
A.
Secondary domain controller
-
B.
Global catalog server
-
C.
Secondary DNS server
-
D.
Caching-only server
-
A.
-
40.What Windows Server 2008 service can you use to protect sensitive data on a Windows network?
-
A.
AD FS
-
B.
AD FTP
-
C.
AD FSMO
-
D.
AD RMS
-
A.
-
41.What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?
-
A.
Identity Lifecycle Management
-
B.
General Lifecycle Management
-
C.
Microsoft Lifecycle Management
-
D.
Lifecycle of Software Management
-
A.
-
42.What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?
-
A.
RSA SecureID
-
B.
Digital certificates
-
C.
Smart cards
-
D.
Biometric device
-
A.
-
43.What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?
-
A.
Web Enrollment
-
B.
Web Responder
-
C.
Enterprise CA
-
D.
Online Responder
-
A.
-
44.A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
-
A.
Domain controller
-
B.
Domain manager
-
C.
Global catalog
-
D.
DNS server
-
A.
-
45.What protocol has become an industry standard that enables data exchange between directory services and applications?
-
A.
NTDS
-
B.
LDAP
-
C.
NDIS
-
D.
AD
-
A.
-
46.What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
-
A.
A records
-
B.
MX records
-
C.
SRV records
-
D.
SOA records
-
A.
-
47.What is the process of replicating DNS information from one DNS server to another?
-
A.
Replication
-
B.
DNS push
-
C.
Zone transfer
-
D.
DNS update
-
A.
-
48.What type of trust relationship allows you to create two-way transitive trusts between separate forests?
-
A.
Shortcut
-
B.
Cross-forest
-
C.
External
-
D.
Real
-
A.
-
49.What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
-
A.
Primary lookup
-
B.
Secondary lookup
-
C.
Forward lookup
-
D.
Reverse lookup
-
A.
-
50.What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
-
A.
Primary lookup
-
B.
Secondary lookup
-
C.
Forward lookup
-
D.
Reverse lookupXem tại [http://www.proprofs.com/quiz-school/story.php?title=online-exam-practice-for-windows-server-2008-administration-modii-set-a]
-
A.