Showing posts with label Windows 2008 Active directory Objective type Questions and Answers. Show all posts
Showing posts with label Windows 2008 Active directory Objective type Questions and Answers. Show all posts

Thursday, 10 September 2015

Windows 2008 Active directory Objective type Questions and Answers

11) One of your administrators is unfamiliar with using the command line, but needs to be able to manage a Windows Server 2008 Core install. While attemtping to used an MMC snap-in to manage Server Core, he finds that he is unable to do so. He notes that some snap-ins, such as Shared Folders and Services worked perfectly remotely, while MMCs such as Event Viewer do not.  What is most likely the issue?
 
  A. The administrator has permissions to access only specific MMC consoles from his remote machine
  B. the other MMCs that the Administrator is trying to access are not available on Server Core
  C. A group policy setting is preventing him from viewing higher management level MMCs
  D. Server Core's firewall needs to be reconfigured for the Administrator to access certain MMCs
Ans:  D

12) Which of the following is a GUI tool that enables you to view the replication topology graphically and monitor replication performance and status?
 
  A. repadmin
  B. replmon
  C. dcdiag
  D. repstat
Ans:   B

13) The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site:
 
  A. A KCC leader
  B. Subnet
  C. Bridgehead server
  D. Domain controller
Ans:   C

14) The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.
 
  A. General
  B. Type
  C. Notes
  D. Location and Comment
Ans:   D

15) A user has been on a 7 month long sabbatical. Upon return, you discover that her user object was deleted by accident on the same day she left.  Assuming that Active Directory is configured with the default tombstone lifetime, how much longer do you have before you can no longer recover her username object with an authoritative restore?
 
  A. No time, the user object has already been cleaned during garbage collection
  B. 40 days
  C. 90 days
  D. 180 days
Ans:   A

16) Which description best fits the CA Administrator role?
 
  A. Approves requests for certificate enrollment and revocation
  B. manages auditing logs
  C. configures and maintains CA servers, and can assign all other CA roles and renew the CA certificate
  D. Able to backup and restore files and directories
Ans:   C

17) Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.
 
  A. archiving
  B. logging
  C. tracking
  D. auditing
Ans:   D

18) Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____.
 
  A. Virtual Private Network (VPN)
  B. Secure Socket Tunneling Protocol (SSTP)
  C. Secure HTTP (HTTPS)
  D. Network Address Translation (NAT)
Ans:   C

19) This command is used to display and modify the boot configuration data store.
 
  A. edit boot.ini
  B. edit bcd
  C. bcmod
  D. bcedit
Ans:   D

20) Windows Internet Name Service (WINS) is a legacy name service used to resolve ...
 
  A. Domain names to IP address
  B. Bootp names
  C. MAC addresses to IP addresses
  D. NetBIOS names
Ans:   D

More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6

Top 60 Windows 2008 Active directory Objective type Questions and Answers

1) The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as ....
 
  A. Simple Certificate Enrollment Protocol (SCEP)
  B. Special Device Certification Protocol (SDCP)
  C. Secured Network Device Protocol (SNMP)
  D. Special Certificate Enrollment Protocol (SCEP)
Ans:  A

2) The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.
 
  A. advanced
  B. device settings
  C. printer preferences
  D. output settings
Ans:  B

3) If a software package is assigned to a group of targeted computers via the Computer Configuration node, what happens?
 
  A. Next time a user logs in to one of the targeted computers, they are prompted to install the package
  B. The package is advertised in Add/Remove programs as an installation option
  C. The package is placed on the computers but is not installed until a member of the Administrators group installs it
  D. The package installation is mandatory and begins the next time the computer starts
Ans:  D

4) What does round robin do?
 
  A. Allows an administrator to configure multiple routes that user must make "rounds" through in order to reach a service, improving security
  B. causes network performance issues by continuously rotating the IP addresses associated with services
  C. creates invalid DNS records by disabling DNS timestamp scavenging
  D. creates a load sharing/ balancing mechanism for servers that have identical services, such as two servers that hose the same website.
Ans:   D

5) Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server.
 
  A. The server can do zone transfer for stub zones
  B. The AD-integrated domain DNS zones will be created automatically
  C. Active Directory integrated secondary zones would be possible
  D. resource consolidation
Ans:   B

6) If multiple default gateways are assigned to a computer (such as a multihomed server), what determines which default gateway will be used?
 
  A. a random process
  B. the default gateway with the highest address is the one used
  C. the metric
  D. the gateway on the smaller subnet will be used
Ans:  C

7) The _____ attribute is checked to indicate that the folder or file needs to be backed up because it is new or changed.
 
  A. read-only
  B. system
  C. backup
  D. archive
Ans:  D

8) What command can you type to perform a system state backup?
 
  A. wbadmin start systemstatebackup
  B. wbadmin start sysstatebackup
  C. wbadmin begin systemstatebackup
  D. wbadmin start statebackup
Ans:  A

9) Select the answer below that is not a service a public key infrastructure provides to a network:
 
  A. Confidentiality
  B. Integrity
  C. Nonrepudiation
  D. Secure tunneling
Ans:   D

10) One of the below IP address / subnet mask pairs is invalid; find the invalid answer.
 
  A. 10.0.239.254/255.0.255.0
  B. 172.31.1.200/255.255.0.0
  C. 192.168.2.190/255.255.255.128
  D. 10.200.139.1/255.255.255.248
Ans:   A

More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6