AD-70-640-DISC Flashcards
What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications? network service. directory service. Directory Infrastructure. NT directory.
directory service
A \_\_\_\_\_\_\_\_\_\_ is defined as one or more IP subnets that are connected by fast links. domain. network. site. forest.
site
What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory? Configuration NC. Schema NC. Domain NC. DC NC.
Schema NC
What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide? SYSVOL. AD. C$. VOLMGR.
SYSVOL
What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles? Minimal Installation Option. Server Core. Server Standard. Minimal Server Environment (MSE).
Server Core
What is the minimum amount of storage space required for the Active Directory installation files? 100 MB. 150 MB. 200 MB. 250 MB.
200 MB
When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task? Schema Admins. Enterprise Admins. Global Admins. Forest Admins.
Schema Admins
When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named \_\_\_\_\_\_\_\_\_\_. Default-Site Site-Default Default-Site-Name Default-First-Site-Name
Default-First-Site-Name
What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests? dcdiag. netdiag. dcpromo. netstat
dcdiag
When replicating information between sites, Active Directory will designate a \_\_\_\_\_\_\_\_\_\_ server in each site to act as a gatekeeper in managing site-to-site replication. primary. masthead. bridgehead. global catalog.
bridgehead
What defines a chain of site links by which domain controllers from different sites can communicate? site link bridge. site chain. site chain bridge. site link chain
site link bridge
How many FSMO roles does Active Directory support? 2. 5. 10. 12.
5
How many RID Masters can a domain have? 1. 2. 3. 5.
1
What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role? role transfer. role migration. role seizure. role separation
role seizure
What special identity group contains all authenticated users and domain guests? Power Users. Everyone. Batch. Authenticated Users.
Everyone
\_\_\_\_\_\_\_\_\_\_ name refers to each user’s login name. Common. Distinguished. SAM account. AD Name
SAM account
You cannot manually modify the group membership of or view the membership lists of \_\_\_\_\_\_\_\_\_\_ groups. distribution. domain local. special identity. universal
special identity
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary? DCPROMO. LDIFDE. CSVDE. NSLOOKUP
LDIFDE
Which of the following is a benefit of implementing a public key infrastructure (PKI)?
Users no longer need to remember passwords.
All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
Smart cards can be used from remote locations, such as a home office, to provide authentication services.
All of the above
All of the above
What method of authentication requires a smart card and a PIN to provide more secure access to company resources? two-factor authentication. dual authentication. complex authentication. strong authentication.
two-factor authentication
What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation? PKI server. smart card enrollment station. smart card verification station. Certification Authority (CA).
smart card enrollment station
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be \_\_\_\_\_\_\_\_\_\_ characters in length. 97. 68. 127. 142.
127
What is a method of controlling settings across your network? Group Policy. Active Directory. FSMO roles. MMC
Group Policy
What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU? Group Policies Group Policy Settings Group Policy Objects Group Policy Links
Group Policy Objects
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run? Reverse Processing Switchback Processing Loopback Processing Repeat Processing
Loopback Processing
Local GPO settings are stored in what folder on a computer?
%systemroot%/System32/GroupPolicy.
%systemroot%/System32/Drivers/GroupPolicy.
%systemroot%/System32/Drivers/Etc/GroupPolicy.
%systemroot%/System/GroupPolicy.
%systemroot%/System32/GroupPolicy.
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain? Fine-Grained Password Policies. Fine-Tuned Password Policies. Restricted Password Policies. Custom Password Policies.
Fine-Grained Password Policies.
Where can you configure the Group Policy refresh interval?
Computer Configuration\System\Group Policy.
User Configuration\Administrative Templates\System\Group Policy.
Computer Configuration\Administrative Templates\System\Group Policy.
Computer Configuration\Administrative Templates\Group Policy.
Computer Configuration\Administrative Templates\System\Group Policy
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file? .exe .msi .mse .inf
.msi
Modifications to .msi files require transform files, which have the \_\_\_\_\_\_\_\_\_\_ extension. .msit .mse .msx .mst
.mst
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users? Unrestricted. Restricted. Basic User. Disallowed.
Basic User
What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information? Linked Group Policy Objects. Group Policy Inheritance. Delegation. Management.
Delegation
What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels? Block Policy Propagation. Block Policy Inheritance. Remove Policy Inheritance. Remove Policy Propagation.
Block Policy Inheritance.
How many WMI filters can be configured per GPO? one. two. three. five.
one
To perform a System State restore in Windows Server 2008, you will boot the DC into what mode? Active Directory Restore. Active Directory Maintenance. Directory Services Maintenance. Directory Services Restore.
Directory Services Restore
In Windows Server 2008, you must back up \_\_\_\_\_\_\_\_\_\_ rather than only backing up the System State data. critical volumes. system volumes. MBR records. MX records.
critical volumes
To back up Active Directory, you must install what feature from the Server Manager console? Active Directory Backup Client. Windows Backup Utility. Windows Server Backup. BackupExec.
Windows Server Backup
What is the process by which one DNS server sends a name resolution request to another DNS server? resolution. translation. referral. propagation
referral.
What DNS server contains no zones and hosts no domains? secondary domain controller. global catalog server. secondary DNS server. caching-only server.
caching-only server
What Windows Server 2008 service can you use to protect sensitive data on a Windows network? AD FS AD FTP AD FSMO AD RMS
AD RMS
What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization? Identity Lifecycle Management. General Lifecycle Management. Microsoft Lifecycle Management. Lifecycle of Software Management.
Identity Lifecycle Management
What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob? RSA SecureID. digital certificates. smart cards. biometric device.
smart cards
What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status? Web Enrollment. Web Responder. enterprise CA. Online Responder.
Online Responder
What protocol has become an industry standard that enables data exchange between directory services and applications? NTDS LDPA NDIS AD
LDPA
What is the process of replicating DNS information from one DNS server to another? replication DNS push zone transfer DNS update
zone transfer
What DLL must be registered to use the Schema Management snap-in?
schmmgnt32. dll
schemamanagement. dll
schmmgmt. dll
adschm. dll
schmmgmt.dll
Certain operations, such as a password change or an account lockout, will be transmitted by using \_\_\_\_\_\_\_\_\_\_ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated. Urgent. Immidate. Fast. Pushed,
Urgent
Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest? Relative Identifier Master. Infrastructure Master. Domain Naming Master. Schema Master.
Domain Naming Master.
What types of memberships are stored in the global catalog? Domain local. Universal. Global. Local Workstation.
Universal.
What console must be used to move the Domain Naming Master FSMO role? Active Directory Users and Computers. Active Directory Forests and Domains. Active Directory Schema. Active Directory Domains and Trusts.
Active Directory Domains and Trusts
What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file? NETDIAG NSLOOKUP CSVDE DCPROMO
CSVDE
What special identity group is used by the system to allow permission to protected system files for services to function properly? Network Service. Restricted. Service. Self.
Service
When using CSVDE, what is the first line of the text file that uses proper attribute names? Header row. Header record Name row name record
Header record
Which of the following is not a characteristic of a strong password?
at least eight characters in length.
at least one character from each of the previous character types.
is not your birth date.
differs significantly from other previously used passwords
is not your birth date
What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization? enrollment agent. enrollment credential. enrollment verification. enrollment authority.
enrollment agent
What process applies Group Policy settings to various containers within Active Directory? Attaching. Linking. Connecting. Nesting
Linking.
The \_\_\_\_\_\_\_\_\_\_ Policy is linked to the domain, and its settings affect all users and computers in the domain. Default Domain Controller. Default Domain. Default. Domain
Default Domain
What policies work with folder redirection to provide the ability to cache files locally? registry-based. software installation. folder redirection. offline file storage
offline file storage
What is the path to the default GPT structure for a domain?
%systemroot%\sysvol\sysvol\domain.com\Policies.
%systemroot%\sysvol\domain.com\Policies.
%systemroot%\domain.com\Policies.
%systemroot%\Policies
%systemroot%\sysvol\sysvol\domain.com\Policies
What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access? Local Policy. Security Policy. Audit Policy. None of the above
Audit Policy
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer? Folder Sharing. Folder Redirection. Desktop Redirection. Profile Redirection
Folder Redirection
Settings available in the \_\_\_\_\_\_\_\_\_\_ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI). PKI Policies. Secure Key Policies. Public Key Policies. Private Key Policies
Public Key Policies
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network? hash rule. certificate rule. Path rule. all of the above
all of the above
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing? Effective Permissions. Resultant Set of Policy. Effective Set of Policy. Applied Policy
Resultant Set of Policy
Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment? Group Policy Simulator. Group Policy Planning. Group Policy Modeling. Group Policy Results
Group Policy Results
What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO? Block Policy Inheritance. Policy Delegation. Group Based Filtering. Security Group Filtering.
Security Group Filtering
What manual process defragments the Active Directory database in addition to reducing its size? online defragmentation. local defragmentation. remote defragmentation. offline defragmentation
offline defragmentation
What is the command-line component of the Windows Server Backup snap-in? wbadm wbadmin backadm ntbackup
wbadmin
Server Backup does not support the use of which type of backup media? CD DVD HDD Magnetic Tape
Magnetic Tape
What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records? secondary zone. stub zone. primary zone. forwarder zone
primary zone
In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship? user organizations. account organizations. computer organizations. resource organizations
account organizations
What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization? Active Directory Users and Computers. Group Policy. Active Directory Certificate Services. Active Directory Domains and Trusts
Active Directory Certificate Services
What enables a user to manually create a certificate request file using the Certificates MMC snap-in? PKI Certificate Request Wizard. Autoenrollment Wizard. Enrollment ACL
Certificate Request Wizard
What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing? enrollment agents. smart cards. Certificate Authority. access point
enrollment agents
Interoperability with prior versions of Microsoft Windows is available in Windows Server 2008 through the use of \_\_\_\_\_\_\_\_\_\_. domain controllers, functional levels. global catalogs. DNS servers.
functional levels
Active Directory uses \_\_\_\_\_\_\_\_\_\_ relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks. Trust Domain. Forest. Global
Trust
What processes can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date? searching and destroying. aging and scavenging. seeking and removing. finding and deleting
aging and scavenging
How often does intersite replication occur by default? 5min 10min 15min 1hr
15min
For both intrasite and intersite replication, what protocol does Active Directory use for all replication traffic? RPC over SMTP. RPC over TCP RPC over IP RPC over ARP
RPC over IP
What process is used when you move a FSMO role gracefully from one domain controller to another? Role seizure. Role Transfer. Role Migration. Role Seperation
Role transfer
What Windows Server 2008 feature stores universal group memberships on a local domain controller that can be used for logon to the domain, eliminating the need for frequent access to a global catalog server? global group membership caching. domain group membership caching. local group membership caching. universal group membership caching
universal group membership caching
What is the process of confirming that an authenticated user has the correct permissions to access one or more network resources? authorization. authentication, administration. allocation.
authorization
What describes the process of configuring one or more groups as members of another group? group nesting. group hierarchy. group leveling. group forests
group nesting.
What provides a robust scripting method that supports a multitude of administrative tasks including creating Active Directory objects, mapping drives, connecting to printers, modifying environment variables, and modifying registry keys? Windows Script Host. JavaScript. Windows Powershell. CMD.EXE.
Windows Script Host
What component issues and manages certificates for individuals, computers, and organizations? enrollment agent PKI server certificate server Certification Authority
Certification Authority
Which OU is created by default when Active Directory is installed? Domain Controllers. Users. Computers. Member Servers
Domain Controllers
What can be measured by tangible benefits, such as implementation costs and ongoing support? return on implementation. total cost of investment. total cost of ownership. return on investment.
return on investment
What means that each policy must be read and applied completely before the next policy can be invoked? asymmetric processing. symmetric processing. asynchronous processing. synchronous processing.
synchronous processing
What policy can specify software that you wish to run on computers? Local Policies. Event Log Policies. Software Restriction Policies. Account Policies
Software Restriction Policies
What setting logs events related to successful user logons to a domain? Account Logon Events. Logon Events. System Events. Policy Change Events
Account Logon Events
What option allows users to install the applications that they consider useful to them? Assign. Require. Amend. Publish
Publish
What Software Restriction Policy properties allow an administrator to control how certificate rules are handled? enforcement. designated file types. security settings. trusted publishers
trusted publishers
Group Policy Management started being natively installed with what version of Windows Server? NT4 2000 2003 2008
2008
What component of the Microsoft Windows operating system allows administrators to create queries based on hardware, software, operating systems, and services?
VBScript.
Windows Scripting Language.
Windows Management Instrumentation..NET Framework
Windows Management Instrumentation
What database of information includes hardware, Group Policy Software Installation settings, Internet Explorer Maintenance settings, scripts, Folder Redirection settings, and Security settings? CICOM CIMOM DOM DCOM
CIMOM
Changes in Active Directory are referred to as \_\_\_\_\_\_\_\_\_\_. Buffers Transactions Modifications. Alterations
Transactions
What logging setting should you use if Minimal logging is not producing sufficient error messages to allow you to troubleshoot a particular issue? Basic. Extensive. Verbose. Internal
Basic
What type of restore will restore Active Directory objects with their original Update Sequence Number (USN), which is the number that each domain controller assigns to every transaction that is either originated on the DC or replicated in from another domain controller? nonauthoritative restore. authoritative restore. full restore. incremental restore.
nonauthoritative restore
What resource record provides the name-to-IP-address mappings that DNS name servers use to perform name resolution? Start of Authority (SOA). Name Server (NS). Host (A). Mail Exchange (MX)
Host (A)
What has direct access to at least one name server and can also process referrals to direct its queries to other name servers when necessary? name server. DNS SERVER host file resolver
resolver
What is a secret piece of information that is shared between two parties prior to being able to communicate securely? Public Key {Private Key PKI SHared Secret Key
Shared secret key
Which of the following are not able to be performed by those with the Auditor predefined security role?
configure audit parameters.
read records and configuration information in the CA database.
define key recovery agents.
possesses the system audit user right.
define key recovery agents
Each class or attribute that you add to the schema should have a valid \_\_\_\_\_\_\_\_\_\_. Username. Password. OID. SID
OID
Active Directory \_\_\_\_\_\_\_\_\_\_ provide the means by which administrators can control replication traffic. Services Sites Domains forests
sites
Which of the following is not a function performed by a global catalog server?
facilitating searches for objects in the forest.
maintaining universal group membership information.
maintaining a backup of all data stored on a domain controller.
maintaining a copy of all objects in the domain.
maintaining a backup of all data stored on a domain controller
All default groups are \_\_\_\_\_\_\_\_\_\_ groups. Distribution. Domain local. built-in Security.
security
What can be defined as a password that follows guidelines that make it difficult for a potential hacker to determine the user’s password? complex password. encrypted password. strong password. RSA SecureID
strong password
Administrators find that Group Policy implementation helps them to achieve \_\_\_\_\_\_\_\_\_\_. enhanced security. faster performance. centralized management. virus-free networks
centralized management
What folder located under the Computer Configuration node in the Group Policy Management Editor contains security settings and scripts that apply to all users who log on to Active Directory from that specific computer? Software Settings. Windows Settings. Security Settings. Administrative Templates
Windows Settings
What advanced technique allows you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups? Linking. Nesting. Security group filtering. Group Policy filtering
Security group filtering.