Sie sind auf Seite 1von 56

Skip to main content

Thit k v qun tr Mng 01-12 (N01)


Question 1
Correct Mark 1.00 out of 1.00

Flag question If an administrator were unable to update references to objects in other domains in the forest, this might indicate a failure of the ____________. Select one: a. Schema master b. PDC emulator c. RID master d. Infrastructure master

Question 2
Incorrect Mark 0.00 out of 1.00

Flag question When you create a new GPO or edit an existing one, and if you have configured new settings in the Computer Configuration node, users affected by the GPO must _________________. Select one: a. Refresh the desktop b. Reboot their computers c. Do nothing because the settings will automatically apply d. Log off and log back on again

Question 3

Correct Mark 1.00 out of 1.00

Flag question You can increase the level of detail that various Active Directory processes record in the Directory Service log by Select one: a. Starting Event Viewer from the command line b. Editing the registry c. Selecting the Customize Details option d. None of the above.

Question 4
Correct Mark 1.00 out of 1.00

Flag question Directory Services Restore Mode is used for all AD DS recovery operations, and requires you to log on as __________________. Select one: a. The domain administrator b. A backup operator c. An enterprise administrator d. A local administrator

Question 5
Correct Mark 1.00 out of 1.00

Flag question You can modify application behavior by adjusting its priority in Task Manager or by starting the application at a different priority. Which choice lists the Windows 7 application priorities in decreasing order? Select one: a. Above Normal, Normal, Below Normal, Realtime, High b. None of the above. c. High, Realtime, AboveNormal, Normal, Below Normal d. Realtime, High, AboveNormal, Normal, Below Normal

Question 6
Correct Mark 1.00 out of 1.00

Flag question Which Windows log displays results of audited actions Select one: a. Forwarded Events b. Setup c. Security d. System

Question 7
Correct Mark 1.00 out of 1.00

Flag question

The SAM database is encrypted with a locally stored system key. For additional security, you can configure Windows to store the startup key on a floppy disk or you can specify a password to be entered manually at startup. The command-line for this is _____________. Select one: a. Syskey b. dsmgmt c. pkey d. Rodcmgmt

Question 8
Incorrect Mark 0.00 out of 1.00

Flag question If the software is available to all authenticated users of the computer, regardless of their group membership or privileges, this is an example of __________________. Select one: a. Publishing software to computers b. Assigning software to computers c. Assigning software to computers d. Publishing software to users

Question 9
Incorrect Mark 0.00 out of 1.00

Flag question You can administer the password replication policy from the command line by using the ________command Select one: a. Repadmin b. Pkey

c. Dsmgmt d. Syskey

Question 10
Correct Mark 1.00 out of 1.00

Remove flag Which of these is not an Active Directory partition? Select one: a. Domain partition b. System partition c. Application partition d. Schema partition Next Skip Quiz navigation Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Nguyn Vn An (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 11
Correct Mark 1.00 out of 1.00

Flag question ________ is a load-balancing mechanism used by DNS servers to distribute name resolution activity among all available DNS servers. Select one: a. Dividing b. None of the above c. Round robin d. Clustering

Question 12
Incorrect Mark 0.00 out of 1.00

Flag question You can also specify forwarders from the command line by using the ______ command. Select one: a. ipconfig /dns b. None of the above c. dnscmd d. forconfig

Question 13
Correct Mark 1.00 out of 1.00

Flag question By default, only members of the Domain Admins and Group Policy Creator Owners groups have permission to ________________.

Select one: a. View GPOs b. Create GPOs c. None of the above. d. Manage GPOs

Question 14
Correct Mark 1.00 out of 1.00

Remove flag The command-line tool to stop or restart AD DS is _____________. Select one: a. Ldp.exe b. Ntds.exe c. Net.exe d. None of the above

Question 15
Correct Mark 1.00 out of 1.00

Remove flag The subcontainer found under both the Computer and User Configuration Policies containers that holds most of the settings that control the appearance of the desktop environment is called Select one: a. Windows Settings b. Preferences c. Administrative templates d. Policies

Question 16
Correct Mark 1.00 out of 1.00

Flag question For locating and removing stale resource DNS records, a process known as _____________ is employed. Select one: a. None of the above b. Garbage collection d. c. Cleaning d. Scavenging

Question 17
Correct Mark 1.00 out of 1.00

Flag question . Group Policy __________ are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information. Select one: a. Definitions b. Templates c. Containers d. Objects

Question 18
Correct Mark 1.00 out of 1.00

Flag question __________enables you to create and work with rights-protected files and folders and ensure that only authorized users have access to these types of data. Select one: a. The Ldp.exe administrative tool b. The Active Directory Schema snap-in c. Active Directory Rights Management Services d. The Active Directory Services Interface (ADSI) Edit snap-in

Question 19
Correct Mark 1.00 out of 1.00

Flag question Which Windows log displays events logged by Windows kernel and device driver including reasons for the failure of services to start and the cause of stop (blue screen) errors? Select one: a. Setup b. Security c. Forwarded Events d. System

Question 20
Correct Mark 1.00 out of 1.00

Flag question The main difference between trees and forests is ______________________.

Select one: a. Domains within a forest share organizational units, whereas domains located in different trees in the same forest have a disjointed namespace. b. Domains within a tree share a disjointed namespace, whereas domains located in different trees in the same forest have a contiguous namespace. c. Organizational units are easier to delegate. d. Domains within a tree share a contiguous namespace, whereas domains located in different trees in the same forest have a disjointed namespace. Next Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Nguyn Vn An (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 21
Correct Mark 1.00 out of 1.00

Flag question The purpose of using sites is _______________________________. Select one: a. To arrange network topology b. To configure users and groups c. To control Active Directory replication across slow links between different physical locations

Question 22

Correct Mark 1.00 out of 1.00

Flag question Which DNS zone type is a master copy of zone data hosted on a DNS server that is the primary source of information for records found in this zone? Select one: a. Primary zone b. Stub zone c. Secondary zone d. Active Directory-intergrated zone

Question 23
Correct Mark 1.00 out of 1.00

Flag question ________ enables you to track actions performed by users across the domain, such as logging on and off or file and folder access. Select one: a. Publishing b. Roaming c. Logging d. Auditing

Question 24
Correct Mark 1.00 out of 1.00

Flag question A _________ is one that can contain users or global groups from any domain in the forest. Select one: a. Universal group b. Domain global group c. None of the above. d. Domain local group

Question 25
Incorrect Mark 0.00 out of 1.00

Flag question The partial attribute set is a ______ attribute that tracks the internal replication status of partial replicas, such as those found on GC servers. Attributes included in the partial attribute set are those required by the schema plus the attributes most commonly utilized during user search Select one: a. Domain b. None of the above. c. User d. Schema

Question 26
Incorrect Mark 0.00 out of 1.00

Flag question

The subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called ______________. Select one: a. Policies b. Windows Settings c. Preferences d. Administrative templates

Question 27
Correct Mark 1.00 out of 1.00

Flag question Permissions and user rights to back up data are, by default, granted to three built-in groups: administrators, backup operators, and _______________. Select one: a. Authenticated users b. Power users c. Server operators d. Volume operators

Question 28
Correct Mark 1.00 out of 1.00

Flag question The Active Directory Installation Wizard enables you to prestage the installation of an RODC by _____________________. Select one: a. None of the above b. Configuring a site for the RODC.

c. Creating a computer account for the RODC on an existing domain controller d. Creating an answer file

Question 29
Correct Mark 1.00 out of 1.00

Flag question The tool that queries computers running Windows XP/Vista/7/Server 2003/Server 2008 and informs you of which policies have been applied and in what order is __________________. Select one: a. None of the above. b. Resultant Set of Policy c. Group Policy Viewer d. Policy Alert

Question 30
Correct Mark 1.00 out of 1.00

Flag question The minimum number of domain controllers in a domain is ______. Select one: a. Four b. One c. Three d. Two Next Skip to main content

Thit k v qun tr Mng 01-12 (N01)

You are logged in as Nguyn Vn An (Logout) Page path


Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 31
Correct Mark 1.00 out of 1.00

Flag question When you configure ___________________, any domain controller that services a users logon will store the users universal group information when he logs on to that domain controller for the first time. Select one: a. The global catalog b. Name caching c. Auditing d. Universal Group Membership Caching (UGMC)

Question 32
Correct Mark 1.00 out of 1.00

Flag question A(n) ______________ is a logical subgroup within Active Directory that you can employ to locate resources used by a single workgroup, section, or department in a company and apply policies that apply to only these resources. Select one: a. Domain b. Organizational unit

c. Group d. Site

Question 33
Correct Mark 1.00 out of 1.00

Flag question DNS servers that receive zone updates for zones that are not integrated with AD DS are known as ________. Select one: a. Secondary name servers b. None of the above c. Additional name servers

Question 34
Correct Mark 1.00 out of 1.00

Flag question ________ files, which are Windows Installer package files with the .mst extension, are used to make changes to an installation database. Select one: a. MSI b. PKG c. Transform d. Transform

Question 35
Incorrect Mark 0.00 out of 1.00

Remove flag The relationship between domains in the same tree is Select one: a. A one-way intransitive trust b. A one-way transitive trust c. A two-way transitive trust d. A two-way intransitive trust

Question 36
Correct Mark 1.00 out of 1.00

Flag question The reverse lookup file maps IP addresses to hostnames by using a special domain name that ends in __________. Select one: a. DNS b. loca c. Com d. in-addr.arpa

Question 37
Correct Mark 1.00 out of 1.00

Flag question You cannot perform Windows Server Backup to ________. Select one:

a. Magnetic tape b. A local hard drive c. DVDs d. CDs

Question 38
Correct Mark 1.00 out of 1.00

Flag question ________ never changes even if you move or rename the object Select one: a. The distinguished name b. The user principal name c. The relative distinguished name d. The GUID

Question 39
Correct Mark 1.00 out of 1.00

Flag question The _____________ is the FSMO that holds the only writeable copy of the Active Directory schema. Select one: a. None of the above. b. PDC emulator c. Schema master d. Infrastructure master

Question 40
Correct Mark 1.00 out of 1.00

Flag question A (n) __________is a logical subgroup within a domain Select one: a. Tree b. Organizational unit c. Child d. Site Skip Quiz navigation Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Bi nh Tuyn (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Started on Tuesday, 11 December 2012, 08:54 AM Completed on Tuesday, 11 December 2012, 09:20 AM Time taken 25 mins 42 secs 38.00/40.00 Marks 95.00 out of a maximum of 100.00 Grade

Question 1
Correct Mark 1.00 out of 1.00

Flag question __________enables you to create and work with rights-protected files and folders and ensure that only authorized users have access to these types of data. Select one: a. The Active Directory Schema snap-in b. The Active Directory Services Interface (ADSI) Edit snap-in c. The Ldp.exe administrative tool d. Active Directory Rights Management Services

Question 2
Correct Mark 1.00 out of 1.00

Flag question By default, a new domain controller is placed in this site when you first install Active Directory. Select one: a. None of the above b. Default-First-Site-Name c. Default-Site-Name d. First-Site

Question 3
Correct Mark 1.00 out of 1.00

Flag question If the software follows users to whatever computers they log on to and is always available to each user, this is an example of

Select one: a. Publishing software to computers b. Assigning software to computers c. Assigning software to users d. Publishing software to users

Question 4
Correct Mark 1.00 out of 1.00

Flag question You would perform an authoritative restore if an object such as a user, group, or OU was deleted by mistake because Select one: a. An authoritative restore replicates changes made to the AD DS database since the last backup b. None of the above. c. Performing a nonauthoratitive restore would only restore deleted objects temporarily, since AD DS replication would replicate the most recent copy back to the restored server, and the restored information would be lost d. An authoritative restore specifically queries for recently deleted objects

Question 5
Correct Mark 1.00 out of 1.00

Flag question When you configure ___________________, any domain controller that services a users logon will store the users universal group information when he logs on to that domain controller for the first time. Select one: a. Universal Group Membership Caching (UGMC)

b. The global catalog c. Name caching d. Auditing

Question 6
Correct Mark 1.00 out of 1.00

Flag question A ________ is an object used by Active Directory to replicate information between sites. Select one: a. Site link bridge d. Replicator b. Site link c. Replicator d. Link

Question 7
Correct Mark 1.00 out of 1.00

Flag question ________ enables you to track actions performed by users across the domain, such as logging on and off or file and folder access. Select one: a. Auditing b. Publishing c. Logging d. Roaming

Question 8

Correct Mark 1.00 out of 1.00

Flag question A ________ is a special DNS server that accepts requests for name resolution from another DNS server. Select one: a. Directory server b. Resolver c. Forwarder d. Query server

Question 9
Incorrect Mark 0.00 out of 1.00

Flag question The subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called ______________. Select one: a. Administrative templates b. Policies c. Windows Settings d. Preferences

Question 10
Correct Mark 1.00 out of 1.00

Flag question A forest trust is _____________________. Select one: a. A one-way or two-way transitive trust between every domain in each forest b. A one-way transitive trust between every domain in each forest c. A realm trustt d. A two-way transitive trust between every domain in each forest Next Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Bi nh Tuyn (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 11
Correct Mark 1.00 out of 1.00

Flag question The SAM database is encrypted with a locally stored system key. For additional security, you can configure Windows to store the startup key on a floppy disk or you can specify a password to be entered manually at startup. The command-line for this is _____________. Select one: a. Rodcmgmt b. dsmgmt c. pkey

d. Syskey

Question 12
Correct Mark 1.00 out of 1.00

Flag question Which of these is not an Active Directory partition? Select one: a. Application partition b. System partition c. Schema partition d. Domain partition

Question 13
Correct Mark 1.00 out of 1.00

Flag question The command-line tool to stop or restart AD DS is _____________. Select one: a. Net.exe b. Ldp.exe c. None of the above d. Ntds.exe

Question 14
Correct Mark 1.00 out of 1.00

Flag question The subcontainer found under both the Computer and User Configuration Policies containers that holds most of the settings that control the appearance of the desktop environment is called Select one: a. Preferences b. Administrative templates c. Windows Settings d. Policies

Question 15
Correct Mark 1.00 out of 1.00

Flag question DNS servers that receive zone updates for zones that are not integrated with AD DS are known as ________. Select one: a. None of the above b. Secondary name servers c. Additional name servers

Question 16
Correct Mark 1.00 out of 1.00

Flag question Using Dynamic DNS, clients can dynamically update their A and ________ records in the master zone file on startup or whenever their configuration changes. Select one:

a. None of the above b. PTR c. NS d. CNAME

Question 17
Correct Mark 1.00 out of 1.00

Flag question Permissions and user rights to back up data are, by default, granted to three built-in groups: administrators, backup operators, and _______________. Select one: a. Server operators b. Authenticated users c. Volume operators d. Power users

Question 18
Correct Mark 1.00 out of 1.00

Flag question One-way individual trust relationships that you can set up between two domains in different forests are known as _____________ Select one: a. None of the above. b. Forest c. External d. Realm

Question 19
Correct Mark 1.00 out of 1.00

Flag question When creating a customized log in Event Viewer, this choice enables you to select the number that uniquely defines each type of event. Select one: a. Logged b. Event level c. None of the above. d. By Log

Question 20
Correct Mark 1.00 out of 1.00

Flag question For locating and removing stale resource DNS records, a process known as _____________ is employed. Select one: a. None of the above b. Garbage collection d. c. Cleaning d. Scavenging Next Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Bi nh Tuyn (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 21
Correct Mark 1.00 out of 1.00

Flag question You cannot perform Windows Server Backup to ________. Select one: a. CDs b. DVDs c. Magnetic tape d. A local hard drive

Question 22
Correct Mark 1.00 out of 1.00

Flag question Users requesting directory data from AD LDS instances must be authenticated before they can receive access. In general, these users run a directory-enabled application that makes an LDAP request to AD LDS. AD LDS must successfully authenticate users to the directory, which is a process also known as _____________. Select one: a. None of the above b. Controlling c. Attaching d. Binding

Question 23
Correct Mark 1.00 out of 1.00

Flag question Directory Services Restore Mode is used for all AD DS recovery operations, and requires you to log on as __________________. Select one: a. A backup operator b. An enterprise administrator c. The domain administrator d. A local administrator

Question 24
Correct Mark 1.00 out of 1.00

Flag question Accidental corruption or deletion of database components or the ________ folder by an inexperienced individual in a branch office does not have any impact on network operations. Select one: a. Sysvol b. None of the above. c. System d. Application

Question 25
Correct Mark 1.00 out of 1.00

Flag question Deploying software using a GPO requires that you use the Universal Naming Convention (UNC). Why is this required? Select one: a. None of the above. b. Operating systems other than Windows may need to access GPO. c. Use of the UNC is not necessary. d. Users will be unable to locate the package

Question 26
Correct Mark 1.00 out of 1.00

Flag question You can increase the level of detail that various Active Directory processes record in the Directory Service log by Select one: a. Editing the registry b. Selecting the Customize Details option c. Starting Event Viewer from the command line d. None of the above.

Question 27
Correct Mark 1.00 out of 1.00

Flag question

To configure a fine-grained password policy, you must be a member of the ________________ group Select one: a. None of the above b. Domain Users c. Backup Operators d. Everyone

Question 28
Incorrect Mark 0.00 out of 1.00

Flag question You can also specify forwarders from the command line by using the ______ command. Select one: a. dnscmd b. None of the above c. forconfig d. ipconfig /dns

Question 29
Correct Mark 1.00 out of 1.00

Flag question By default, AD LDS uses ports __________________ for a server that is not a domain controller. Select one: a. 389 and 636 b. 1000 and 1001 c. None of the above

d. 387 and 389

Question 30
Correct Mark 1.00 out of 1.00

Flag question A recommended group nesting strategy is ________________. Select one: a. Accounts to global groups to permissions to domain local groups b. Accounts to permissions to domain local groups to global groups c. None of the above d. Accounts to domain groups to domain global groups to permissions Next Skip to main content

Thit k v qun tr Mng 01-12 (N01)


You are logged in as Bi nh Tuyn (Logout) Page path

Home / My courses / Thit k v qun tr Mng 01-12 (N01) / 12 December - 18 December / thi cui k

Question 31
Correct Mark 1.00 out of 1.00

Flag question

By default, only members of the Domain Admins and Group Policy Creator Owners groups have permission to ________________. Select one: a. None of the above. b. Create GPOs c. View GPOs d. Manage GPOs

Question 32
Correct Mark 1.00 out of 1.00

Flag question The tool that queries computers running Windows XP/Vista/7/Server 2003/Server 2008 and informs you of which policies have been applied and in what order is __________________. Select one: a. Group Policy Viewer b. Resultant Set of Policy c. Policy Alert d. None of the above.

Question 33
Correct Mark 1.00 out of 1.00

Flag question Which of these domain controller roles need to pull changes form an RODC? Select one: a. Global catalog server b. None of the above c. RID master

d. PDC emulator

Question 34
Correct Mark 1.00 out of 1.00

Flag question ________ never changes even if you move or rename the object Select one: a. The distinguished name b. The GUID c. The user principal name d. The relative distinguished name

Question 35
Correct Mark 1.00 out of 1.00

Flag question You can modify application behavior by adjusting its priority in Task Manager or by starting the application at a different priority. Which choice lists the Windows 7 application priorities in decreasing order? Select one: a. High, Realtime, AboveNormal, Normal, Below Normal b. Realtime, High, AboveNormal, Normal, Below Normal c. None of the above. d. Above Normal, Normal, Below Normal, Realtime, High

Question 36
Correct Mark 1.00 out of 1.00

Flag question A(n) _________ specific item that can be cataloged in Active Directory. Select one: a. Class b. Object c. None of the above d. Attribute

Question 37
Correct Mark 1.00 out of 1.00

Flag question The only tool you can use to configure audit policy on a Server Core computer is _______________. Select one: a. Auditpol.exe b. Corconfig.exe c. None of the above. d. Event.exe

Question 38
Correct Mark 1.00 out of 1.00

Flag question

The partial attribute set is a ______ attribute that tracks the internal replication status of partial replicas, such as those found on GC servers. Attributes included in the partial attribute set are those required by the schema plus the attributes most commonly utilized during user search Select one: a. None of the above. b. Schema c. Domain d. User

Question 39
Correct Mark 1.00 out of 1.00

Flag question A(n) ______________ is a logical subgroup within Active Directory that you can employ to locate resources used by a single workgroup, section, or department in a company and apply policies that apply to only these resources. Select one: a. Site b. Organizational unit c. Domain d. Group

Question 40
Correct Mark 1.00 out of 1.00

Flag question If an administrator were unable to update references to objects in other domains in the forest, this might indicate a failure of the ____________. Select one: a. Infrastructure master

b. PDC emulator c. RID master d. Schema master Skip Quiz navigation Chuyn ti ni dung chnh

Thit k v qun tr Mng 01-12 (N02)


Bn ang ng nhp vi tn Trn Vn Tuyn (Thot ra) ng dn n trang

Trang ch / Cc kho hc ca ti / Thit k v qun tr Mng 01-12 (N02) / 11 Thng mi hai - 17 Thng mi hai / thi cui k

Bt u vo lc Th ba, 11 Thng mi hai 2012, 09:10 AM Th ba, 11 Thng mi hai 2012, 09:26 AM Kt thc lc Thi gian thc hin 15 pht 45 giy 34,00/40,00 im 85,00 trn ti a of 100,00 im

Question 1
Correct Mark 1,00 out of 1,00

Remove flag If you can create a nested hierarchy of OUs, when more than one level of OU is present, policies linked to the parent OU are applied first, followed by Select one: a. Domains, sites, and child OUs in order b. None of the above. c. Sites, domains, and child OUs in order

Question 2

Correct Mark 1,00 out of 1,00

Flag question Relative distinguished names and distinguished names are paths used with the _______ protocol. Select one: a. GUID b. TCP/IP c. LDAP d. None of the above. d. LDAP

Question 3
Correct Mark 1,00 out of 1,00

Flag question . Group Policy __________ are objects that are defined within AD DS and are used to store the properties of GPOs, including attributes and version information. Select one: a. Templates b. Definitions c. Objects d. Containers

Question 4
Correct Mark 1,00 out of 1,00

Flag question

Which Windows log displays results of audited actions Select one: a. System b. Setup c. Forwarded Events d. Security

Question 5
Correct Mark 1,00 out of 1,00

Flag question __________enables you to create and work with rights-protected files and folders and ensure that only authorized users have access to these types of data. Select one: a. The Active Directory Schema snap-in b. The Ldp.exe administrative tool c. The Active Directory Services Interface (ADSI) Edit snap-in d. Active Directory Rights Management Services

Question 6
Correct Mark 1,00 out of 1,00

Flag question DNS servers that receive zone updates for zones that are not integrated with AD DS are known as ________. Select one: a. Secondary name servers b. None of the above c. Additional name servers

Question 7
Correct Mark 1,00 out of 1,00

Flag question The purpose of using sites is _______________________________. Select one: a. To arrange network topology b. To control Active Directory replication across slow links between different physical locations c. To configure users and groups

Question 8
Correct Mark 1,00 out of 1,00

Flag question The name and address records for every available root server are called the ____________. Select one: a. Dnslookups b. Root hints c. Nslookup d. None of the above

Question 9
Correct Mark 1,00 out of 1,00

Flag question Accidental corruption or deletion of database components or the ________ folder by an inexperienced individual in a branch office does not have any impact on network operations. Select one: a. None of the above. b. Sysvol c. Application d. System

Question 10
Correct Mark 1,00 out of 1,00

Flag question You can administer the password replication policy from the command line by using the ________command Select one: a. Pkey b. Syskey c. Dsmgmt d. Repadmin Tip theo Chuyn ti ni dung chnh

Thit k v qun tr Mng 01-12 (N02)


Bn ang ng nhp vi tn Trn Vn Tuyn (Thot ra) ng dn n trang

Trang ch / Cc kho hc ca ti / Thit k v qun tr Mng 01-12 (N02)

/ 11 Thng mi hai - 17 Thng mi hai / thi cui k

Question 11
Correct Mark 1,00 out of 1,00

Flag question You can perform most of the DNS administrative tasks from the command line by using the ________ utility provided with Windows Server 2008. Select one: a. server b. dnscmd.exe c. netsh d. ipconfig

Question 12
Correct Mark 1,00 out of 1,00

Flag question Deploying software using a GPO requires that you use the Universal Naming Convention (UNC). Why is this required? Select one: a. Use of the UNC is not necessary. b. Users will be unable to locate the package c. Operating systems other than Windows may need to access GPO. d. None of the above.

Question 13
Correct

Mark 1,00 out of 1,00

Flag question ________ enables you to track actions performed by users across the domain, such as logging on and off or file and folder access. Select one: a. Auditing b. Publishing c. Roaming d. Logging

Question 14
Correct Mark 1,00 out of 1,00

Remove flag Which of the following operations master roles updates references in its domain from objects such as domain group memberships, to objects in other domains? Select one: a. PDC emulator b. Schema master c. Infrastructure master d. RID master

Question 15
Correct Mark 1,00 out of 1,00

Flag question

The SAM database is encrypted with a locally stored system key. For additional security, you can configure Windows to store the startup key on a floppy disk or you can specify a password to be entered manually at startup. The command-line for this is _____________. Select one: a. Syskey b. pkey c. dsmgmt d. Rodcmgmt

Question 16
Correct Mark 1,00 out of 1,00

Flag question By default, a new domain controller is placed in this site when you first install Active Directory. Select one: a. First-Site b. Default-Site-Name c. None of the above d. Default-First-Site-Name

Question 17
Incorrect Mark 0,00 out of 1,00

Flag question The subcontainer found under both the Computer and User Configuration Policies and Preferences containers that holds script and security settings is called ______________. Select one: a. Policies b. Preferences

c. Windows Settings d. Administrative templates

Question 18
Correct Mark 1,00 out of 1,00

Flag question To configure a fine-grained password policy, you must be a member of the ________________ group Select one: a. Domain Users b. Everyone c. Backup Operators d. None of the above

Question 19
Correct Mark 1,00 out of 1,00

Remove flag The subcontainer found under both the Computer and User Configuration Policies containers that holds most of the settings that control the appearance of the desktop environment is called Select one: a. Windows Settings b. Policies c. Preferences d. Administrative templates

Question 20

Correct Mark 1,00 out of 1,00

Flag question Which of the following is not one of the three types of user accounts present in an AD DS network? Select one: a. Domain user accounts b. Built-in user accounts c. Enterprise user accounts d. Local user accounts Tip theo B qua Quiz navigation Chuyn ti ni dung chnh

Thit k v qun tr Mng 01-12 (N02)


Bn ang ng nhp vi tn Trn Vn Tuyn (Thot ra) ng dn n trang

Trang ch / Cc kho hc ca ti / Thit k v qun tr Mng 01-12 (N02) / 11 Thng mi hai - 17 Thng mi hai / thi cui k

Question 21
Correct Mark 1,00 out of 1,00

Flag question Which Windows log displays events logged by Windows kernel and device driver including reasons for the failure of services to start and the cause of stop (blue screen) errors? Select one: a. Setup

b. Forwarded Events c. System d. Security

Question 22
Correct Mark 1,00 out of 1,00

Flag question By default, only members of the Domain Admins and Group Policy Creator Owners groups have permission to ________________. Select one: a. View GPOs b. None of the above. c. Manage GPOs d. Create GPOs

Question 23
Correct Mark 1,00 out of 1,00

Flag question A ________ is an object used by Active Directory to replicate information between sites. Select one: a. Site link b. Replicator c. Link d. Site link bridge d. Replicator

Question 24

Correct Mark 1,00 out of 1,00

Remove flag You must run the Adprep /forestprep command on the ___________ of the forest first. Select one: a. Schema master b. First domain controller installed c. Global catalog d. DNS server

Question 25
Correct Mark 1,00 out of 1,00

Remove flag A ________ is a special DNS server that accepts requests for name resolution from another DNS server. Select one: a. Query server b. Resolver c. Forwarder d. Directory server

Question 26
Correct Mark 1,00 out of 1,00

Flag question

When you run dcpromo, you must be a ________________ on the server on which you install Active Directory to proceed. Select one: a. Domain administrator b. LAN administrator c. Local administrator d. Backup operator

Question 27
Incorrect Mark 0,00 out of 1,00

Remove flag The relationship between domains in the same tree is Select one: a. A two-way intransitive trust b. A two-way transitive trust c. A one-way transitive trust d. A one-way intransitive trust

Question 28
Correct Mark 1,00 out of 1,00

Flag question The _____________ is the FSMO that holds the only writeable copy of the Active Directory schema. Select one: a. Schema master b. None of the above. c. Infrastructure master

d. PDC emulator

Question 29
Correct Mark 1,00 out of 1,00

Flag question When creating a customized log in Event Viewer, this choice enables you to select the number that uniquely defines each type of event. Select one: a. Logged b. None of the above. c. By Log d. Event level

Question 30
Incorrect Mark 0,00 out of 1,00

Remove flag You can also specify forwarders from the command line by using the ______ command. Select one: a. dnscmd b. None of the above c. ipconfig /dns d. forconfig Tip theo Chuyn ti ni dung chnh

Thit k v qun tr Mng 01-12 (N02)

Bn ang ng nhp vi tn Trn Vn Tuyn (Thot ra) ng dn n trang


Trang ch / Cc kho hc ca ti / Thit k v qun tr Mng 01-12 (N02) / 11 Thng mi hai - 17 Thng mi hai / thi cui k

Question 31
Incorrect Mark 0,00 out of 1,00

Remove flag To add a server role from the command-line version, type the command ________________. Select one: a. Servermanagercmd install role b. ManageServer add role c. None of the above. d. Serveradd role

Question 32
Correct Mark 1,00 out of 1,00

Flag question The reverse lookup file maps IP addresses to hostnames by using a special domain name that ends in __________. Select one: a. Com b. DNS c. loca d. in-addr.arpa

Question 33
Correct Mark 1,00 out of 1,00

Flag question Which DNS zone type is a master copy of zone data hosted on a DNS server that is the primary source of information for records found in this zone? Select one: a. Active Directory-intergrated zone b. Secondary zone c. Primary zone d. Stub zone

Question 34
Correct Mark 1,00 out of 1,00

Remove flag The _____________ ensures that clocks on all computers in the domain remain synchronized. Select one: a. RID master b. PDC emulator c. Infrastructure master d. Schema master

Question 35
Correct Mark 1,00 out of 1,00

Flag question You can increase the level of detail that various Active Directory processes record in the Directory Service log by Select one: a. Editing the registry b. Starting Event Viewer from the command line c. None of the above. d. Selecting the Customize Details option

Question 36
Correct Mark 1,00 out of 1,00

Flag question One-way individual trust relationships that you can set up between two domains in different forests are known as _____________ Select one: a. Realm b. Forest c. External d. None of the above.

Question 37
Correct Mark 1,00 out of 1,00

Flag question

You would perform an authoritative restore if an object such as a user, group, or OU was deleted by mistake because Select one: a. Performing a nonauthoratitive restore would only restore deleted objects temporarily, since AD DS replication would replicate the most recent copy back to the restored server, and the restored information would be lost b. An authoritative restore replicates changes made to the AD DS database since the last backup c. An authoritative restore specifically queries for recently deleted objects d. None of the above.

Question 38
Correct Mark 1,00 out of 1,00

Flag question You cannot perform Windows Server Backup to ________. Select one: a. Magnetic tape b. DVDs c. A local hard drive d. CDs

Question 39
Incorrect Mark 0,00 out of 1,00

Remove flag If an administrator were unable to update references to objects in other domains in the forest, this might indicate a failure of the ____________. Select one: a. Infrastructure master

b. PDC emulator c. RID master d. Schema master

Question 40
Incorrect Mark 0,00 out of 1,00

Flag question Permissions and user rights to back up data are, by default, granted to three built-in groups: administrators, backup operators, and _______________. Select one: a. Authenticated users b. Power users c. Volume operators d. Server operators

Das könnte Ihnen auch gefallen