Sie sind auf Seite 1von 4

PAPER CODE : WINDOWS SERVER BOOK II, III NAME :

TOTAL MARKS : 50 ROLL NO:

MARKS OBTAIN: BATCH:

Q. NO. 1Windows Server 2008 supports types of Backup. (Choose Two) 1. Daily Backup 2. Incremental Backup 3. Manual Backup 4. Scheduled Backup 5. None Of The Above Q. NO. 2Domain controller provides _____________. (Choose Two) 1. Local Resources 2. Active Directory Users 3. Local Group 4. Share Folder 5. None Of Teh Above Q. NO. 3Which of the following are required to create a domain controller successfully? (Choose Two.) 1. A valid DNS domain name 2. A valid NetBIOS name 3. A DHCP server to assign an IP address to the domain controller 4. A DNS server 5. None Of The Above Q. NO. 4 Which of the following authentication protocols can the IIS7 Windows Authentication module use? (Choose Two) 1. NTLMv2 2. KDC 3. Kerberos 4. SSL 5. None Of The Above Q. NO. 5 Which Group Policy settings require that Desktop Experience be installed on a Windows Server 2008 server? (Choose Two) 1. Disk Diagnostic: Configure Execution Level 2. Do Not Allow Clipboard Redirection 3. Enforce Removal Of Remote Desktop Wallpaper 4. Set Update Interval To NIS Subordinate Server 5. Disk Diagnostic: Configure Custom Alert Text Q. NO. 6SYSVOL folder in a Active Directory Stores. (Choose Three) 1. login scripts 2. Group Policy Objects 3. Replicated files 4. System Event viewer Information 5. None Of The above Q. NO.7You have created and configured a PSO that contains non-default account lock-out policies. To which entities can you apply this PSO? (Choose Two.) 1. A global security group 2. A domain user account 3. An OU 4. A global distribution group 5. A computer account Q. NO. 8To back up Active Directory, you must install what feature from the Server Manager console? 1. Active Directory Backup Client 2. Windows Backup Utility 3. Windows Server Backup 4. BackupExec 5. None of The Above Q. NO. 9What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels? 1. Block Policy Propagation 2. Block Policy Inheritance 3. Remove Policy Inheritance 4. Remove Policy Propagation 5. None Of The Above Q. NO. 10What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog? 1. A records 2. MX records 3. SRV records 4. SOA records 5. None Of The Above Q. NO. 11When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users? 1. Unrestricted 2. Restricted 3. Basic User 4. Disallowed 5. None of The Above

Q. NO. 12Where can you configure the Group Policy refresh interval? 1. Computer Configuration\\System\\Group Policy 2. User Configuration\\Administrative Templates\\System\\Group Policy 3. Computer Configuration\\Administrative Templates\\System\\Group Policy 4. Computer Configuration\\Administrative Templates\\Group Policy 5. None of The Above Q. NO. 13What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information? 1. Linked Group Policy Objects 2. Group Policy Inheritance 3. Delegation 4. Management 5. None of The above Q. NO. 14Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file? 1. .exe 2. .msi 3. .mse 4. .inf 5. None of The Above Q. NO. 15What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificates current status? 1. Web Enrollment 2. Web Responder 3. enterprise CA 4. Online Responder 5. None Of The Above Q. NO. 16How many FSMO roles does Active Directory support? 1. 2 2. 5 3. 10 4. 12 5. None Of The Above Q. NO. 17When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task? 1. Schema Admins 2. Enterprise Admins 3. Global Admins 4. Forest Admins 5. None Of The Above Q. NO. 18What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary? 1. DCPROMO 2. LDIFDE 3. CSVDE 4. NSLOOKUP 5. None Of The Above Q. NO. 19What defines a chain of site links by which domain controllers from different sites can communicate? 1. site link bridge 2. site chain 3. site chain bridge 4. site link chain 5. sdfsdfsd Q. NO. 20When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication. 1. primary 2. masthead 3. bridgehead 4. global catalog 5. None Of The Above Q. NO. 21What special identity group contains all authenticated users and domain guests? 1. Power Users 2. Everyone 3. Batch 4. Authenticated Users 5. None Of The Above Q. NO. 22What is a method of controlling settings across your network? 1. Group Policy 2. Active Directory 3. FSMO roles 4. MMC 5. None Of The Above Q. NO.23What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU? 1. Group Policies 2. Group Policy Settings

3. 4. 5.

Group Policy Objects Group Policy Links None Of The above

Q. NO. 24What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory? 1. Configuration NC 2. Schema NC 3. Domain NC 4. DC NC 5. None of The Above Q. NO. 25What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles? 1. Minimal Installation Option 2. Server Core 3. Server Standard 4. Minimal Server Environment (MSE) 5. None Of the Above Q. NO. 26What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests? 1. dcdiag 2. netdiag 3. dcpromo 4. netstat 5. None Of The Above Q. NO. 27What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide? 1. SYSVOL 2. AD 3. C$ 4. VOLMGR 5. None of The Above Q. NO. 28What DLL must be registered to use the Schema Management snap-in? 1. schmmgnt32.dll 2. schemamanagement.dll 3. schmmgmt.dll 4. adschm.dll 5. None Of The Above Q. NO. 29What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain? 1. Fine-Grained Password Policies 2. Fine-Tuned Password Policies 3. Restricted Password Policies 4. Custom Password Policies 5. None Of The Above Q. NO. 30What is the minimum amount of storage space required for the Active Directory installation files? 1. 100 MB 2. 150 MB 3. 200 MB 4. 250 MB 5. None Of The Above Q. NO. 31What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role? 1. role transfer 2. role migration 3. role seizure 4. role separation 5. None Of The Above Q. NO. 32 __________ name refers to each users login name. 1. Common 2. Distinguished 3. SAM account 4. AD Name 5. None Of The Above Q. NO. 33What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation? 1. PKI server 2. smart card enrollment station 3. smart card verification station 4. Certification Authority (CA) 5. None Of The Above Q. NO. 34What special identity group contains all authenticated users and domain guests? 1. Power Users 2. Everyone 3. Batch

4. 5.

Authenticated Users None Of The Above

Q. NO. 35Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length 1. 97 2. 68 3. 127 4. 142 5. None Of The Above Q. NO. 36What type of trust relationship allows you to create two-way transitive trusts between separate forests? 1. shortcut 2. cross-forest 3. external 4. real Q. NO. 37A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________. 1. domain controller 2. domain manager 3. global catalog 4. DNS server 5. None Of The Above Q. NO. 38What enables network administrators and owners to configure access rights for users during the users entire lifecycle within an organization? 1. Identity Lifecycle Management 2. General Lifecycle Management 3. Microsoft Lifecycle Management 4. Lifecycle of Software Management 5. None Of The above Q. NO. 39To perform a System State restore in Windows Server 2008, you will boot the DC into what mode? 1. Active Directory Restore 2. Active Directory Maintenance 3. Directory Services Maintenance 4. Directory Services Restore 5. None of The Above Q. NO. 40What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications? 1. network service 2. directory service 3. Directory Infrastructure 4. NT directory 5. None Of The Above Q. NO. 41How many RID Masters can a domain have? 1. 1 2. 2 3. 3 4. 5 5. None of the Above Q. NO. 42To back up Active Directory , you must to install the Windows Sever Backup feature from the Server Manager console. 1. TRUE 2. FALSE Q. NO. 43Windows Server 2008 supports 5 types of backup. 1. TRUE 2. FALSE Q. NO. 44In a Active Directory SYSVOL folder can store Logging Scripts, Database. 1. TRUE 2. FALSE Q. NO. 45Active Directory Domain Service is required for STAND-ALONE NAMESPACE. 1. TRUE 2. FALSE Q. NO. 46BIND is stands for Basic Internet Name Domain. 1. TRUE 2. FALSE Q. NO. 47RODC stands for Read Only Domain Controller. 1. TRUE 2. FALSE Q. NO. 48TFTP is a lightweight version of FTP that uses the UDP protocol, which is used by the BOOTP protocol to transmit network configuration information. 1. TRUE 2. FALSE Q. NO. 49ADDS stands for Active Directory Domain Service. 1. TRUE 2. FALSE

Das könnte Ihnen auch gefallen