1.
View Exhibit. The newly acquired domain shown in the exhibit needs to be allowed to access a file server in �Insure.MetroTech.com� child domain. For this purpose, you are required to build the relevant trust relationship between the domains. Which of the following choices would be an appropriate direction of trust here?View Exhibit
Correct Answer
C. �Insure.MetroTech.com� should be establishing external trust with the new domain
Explanation
Since the new domain here needs to b e the trusted domain and the child of the existing infrastructure needs to be the trusting domain, it is appropriate for �Insure.MetroTech.com� to be establishing external trust with the new domain.
2.
View Exhibit. Shown in the exhibit are three sites Site A, Site B and Site C. Each site has 2 DCs each. There are persistent links configured between each two sites BA, BC and AC. For the purpose of replication, it is required that only A_DC2 replicates with C_DC2 and B_DC2, whereas the only C_DC2 replicates with B_DC2. How would you achieve this?
Correct Answer
B. Configure A_DC2, B_DC2 and C_DC2 as preferred bridgehead servers.
Explanation
Configuring A_DC2, B_DC2 and C_DC2 as preferred bridgehead servers would ensure that during replication between sites only the DCs configured, as preferred bridgehead servers will be looked up for replication.
3.
Your software development team has a proposed design for an application that will be configured to send Company related news to all users who are logged on to the network. This application will be using the ADS to store its data. You are required to allow the team the relevant permissions to create the application directory partition as required by the application to function accurately. Which of the following choices would help you achieve the same in this situation?
Correct Answer
D. Delegate permissions to the team for the created cross-reference object
Explanation
For the team to be able to successfully create the application directory partition that is required, you must first create a cross-reference object that will hold all relevant information pertaining to the application directory partition and then delegate permissions to the team over the cross-reference object.
4.
Type the command used to de-promote a domain controller from the ADS.
Correct Answer
D. DCPROMO
Explanation
Since the question statement is referring to a command and not an application, the correct answer is DCPROMO
5.
View the exhibit.Which of the following statements are true?
Correct Answer
D. A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. Infinity.com trusts B.MetroTech.com
Explanation
As per the exhibit, MetrTech.com has an implicit bi-directional trust with its child domains A.MetroTech.com and B.MetroTech.com. Infinity.com is the trusting domain and B.MetroTech.com is the domain being trusted by Infintiy.com.
6.
Which of the following statements that relate to preferred Bridgehead servers are true?
Correct Answer(s)
B. They are the DCs preferred for replication between partners across a site.
C. They are capable of replicating with DCs internal to the site as well.
Explanation
The preferred bridgehead server is a server that replicates across the WAN and then replicates the changes down to the other domain controllers that are in the same site. They are capable of replication across WAN links and Ethernet Links as well.
7.
You have just enabled your DC that was running as GC (Global Catalog) server to also function as Infrastructure master to ensure all domain related changes get replicated as quickly as possible. You have at least 10 DCs in the domain. But you hear complaints form administrators that this has not affected the functioning for the better at all. Many changes that were made were not replicated and hence not reflected. What could the problem be?
Correct Answer
D. The GC and IM should not be hosted on the same DC.
Explanation
The infrastructure master role is responsible for reflecting changes made in the local domain to the other domains in the network. Unless there is only one domain controller in the domain, you should not host eh GC and the IM in the same DC.
8.
You have an AD forest that has 3 levels of hierarchy under the root with a implicit bi-directional trust between all the levels. You have now configured a single direction external trust with the last level of domains and a domain of a company that you have recently acquired. Once the merger is complete, you are required to re-name this domain. Which of the following is true about the after effects of re-naming the new domain?
Correct Answer(s)
B. You will have to rebuild the trust after the renaming is done
C. Unless the re-building of trust is done the new domain will be inaccessible to the domains in your forest.
Explanation
You should delete and recreate the two-way trust relationship between the domains because the previously created trust relationships will not be valid anymore after the new domain gets renamed.
9.
You are the administrator for MetroTech.com that has an Active Directory infrastructure that consists of a single domain that resides on three domain controllers. During the latest replication, one of the OUs residing on one of the domain controller was not replicated to the other domain controllers. As a work around you instruct a junior administrator to perform a manual replication and he receives �access is denied� when the replication is attempted. What could the problem be?
Correct Answer
B. Assign the relevant permission to the administrator.
Explanation
The Replication Synchronization permission for the relevant OU has to be assigned to the administrator without which he cannot carry out the replication task.
10.
Which of the following are ideal situations to perform a non-authoritative restore on a DC?
Correct Answer
B. When only the data needs to be restored
Explanation
You should perform a non-authoritative restore when you want to only restore data and not the Active Directory related information. Any AD related updation requires an authoritative restore.
11.
You have for some time now been receiving Hard disk space related error messages on your DC that is running a Windows Server 2003 domain. Active Directory is generating numerous errors due to the lack of hard drive space. You decide to install and configure a new HDD to rectify the problem. Which of the following should you first perform before you move the Active Directory to the new HDD?
Correct Answer
D. Restart the domain controller in Directory Services Restore Mode.
Explanation
Active Directory is a combination of database and log files. To move the database, you must restart in Directory Service Restore Mode, not in either Safe Mode or Normal mode.
12.
Which of the following should be done to restore Active Directory to a DC from a tape backup?
Correct Answer
B. Perform an authoritative restore.
Explanation
Performing an authoritative restore ensures that the restored data is replicated throughout the domain by assigning the highest USN to the updated information.
13.
Which of the following admin groups will be able to run "adprep /forestprep" successfully?
Correct Answer(s)
A. Schema Admins group
B. Domain Admins group
Explanation
The Enterprise Admins group and the Schema Admins group are forest level groups and can hence run the forest prep commands successfully.
14.
You have just physically removed one of the DCs from the AD as it has suffered hardware failure and cannot be recovered. You now need to remove all reference of this object from the AD. You decide to use NTDSUTIL for this purpose. Which of the following are the most suitable NTDSUTIL command options to be chosen in this situation?
Correct Answer
A. Metadata cleanup
Explanation
Use the Active Directory Diagnostic Tool and the Metadata Cleanup to remove the failed domain controller (DC) object metadata from the Active Directory database.
15.
Your DC that is also a GC currently is suffering performance wise. You have decided to introduce a new DC into the AD network, move the GC to this new DC and clean the disk space on the original GC so it can be used as a file server. You will be using the Active Directory Sites and Services tool for this purpose.What should you do? (Choose all that apply)
Correct Answer(s)
A. Using NTDS settings on new DC check the GC setting.
D. Using NTDS settings on old DC uncheck the GC setting.
Explanation
You need to ensure that the new DC will be the GC and the old DC will no longer be the GC and as a result will be containing that much free space. For this purpose you must use Active directory sites and services and:
� On the old DC use the NTDS settings to uncheck GC settings
� On the new DC check the NTDS settings to check the GC settings
16.
Your Windows Server 2003 AD network has one root and 5 child domains spread across as many locations. The network has a special set of users who will require unconditional access on all resource servers across domains and the network. These servers and users are spread across all locations in the network. Which of the following groups will be ideal to grant security access to the said users?
Correct Answer
A. Universal
Explanation
In the said situation, it would be ideal to create Universal group and make the special users a part of the Universal group and then provide resource access to the group.
17.
As a part of the internal audit exercise, your organization has decided that a couple of employees from each department will be grouped under a department called audit to ensure the audit exercise will be carried out smoothly. In accordance you will be required to deploy policies that will affect this group and provide them necessary permissions and access rights across the network. As a senior administrator of MetroTech.com forest, you decide to deploy a few of the team members of the IT department on to the task of managing the network scenario.Which of the following would be an ideal way of managing this scenario?
Correct Answer
A. A. Create a new organizational unit (OU) under MetroTech.com named Audit and move the audit users into it. Delegate the appropriate level of permissions at the audit OU to the IT users who will manage the users and computers. Create and link a GPO to the Audit OU that will restrict the client computers and distribute the applications.
Explanation
The most efficient way to provide a solution for the management of the Audit users is to create a new organizational unit (OU) under MetroTech.com named Audit and move the research users into it. Delegate the appropriate level of permissions at the Audit OU to the IT users who will manage the users and computers. Create and link a GPO to the Audit OU that will restrict the client computers and distribute the applications.
18.
MetroTech Finance has an AD structure that contains Windows Server 2003 forest/domain. They have just acquired a small subsidiary that will be treated as a child domain under the root. This organization has so far been running on Windows NT 4.0 network. Although there are plans for upgrade in the near future, you will be required to manage the existing setup as is. Each of the organization has offices spread across different geographical location and each office has a finance department. A part of each of the finance team is dedicated for auditing and is entitled to resources access across the network. You will be needed to work out a security strategy that will need to meet with the needs and will also specifically satisfy these goals:
� The finance department's employees in each office should be able to access resources in the other office.
� Administrators in each office will be responsible for managing the users in the group or groups.
Which of the following will help you achieve the said strategy with minimum efforts?
Choose all that apply. Each answer is part of the solution.
Correct Answer(s)
D. Create global groups named after the location.
E. Add individual finance members to the global groups created based on locations.
Explanation
You should first create a global group for the finance department in each domain. You can then add individual members to these global groups. Global group members are not replicated to every global catalog in the forest. Because the majority of the finance employees are auditors, global groups can prevent frequent membership changes from being replicated to the global catalog.
19.
Which of the following can the Universal group be a parent to?
Correct Answer(s)
A. User accounts
B. Global groups
C. Universal groups
Explanation
Universal groups can contain user accounts, global groups, and other universal groups from any domain in the forest as members. Local groups are usually not made members of Universal groups
20.
Ywhile calculating the combined effect of Local permissions and Share permissions to arrive at NTFS permissions, which of the following statements can be considered true?
Correct Answer
A. The cumulative effect is most restrictive
Explanation
To determine the appropriate NTFS permission, you must determine how the combined share and NTFS permissions will interact to create the resulting access permission. When combining both sets of permissions, the resulting permission is the more restrictive of the NTFS and the share permission.
21.
You wish to audit resource access of certain folders create and accessed by users belonging to a specific OU. You are required to use Group Policy Editor for computers in that OU. How can you achieve the said goal?
Correct Answer
D. Enable Audit object access.
Explanation
If you enable Audit object access, events relating to users accessing resources will be logged. This includes accessing folders on a computer. You can configure Success or Failure audits, or both.
22.
You are the administrator for a single Active Directory domain called MetroTech.com. Your network is a Windows Server 2003/Windows XP platform.
Each department has been assigned one OU. You are currently administering the Sales OU. You have a team of junior administrators. One of your junior administrator has reported that she is unable to modify existing Group Policy Objects (GPOs) links for the OU. The other administrators are not experiencing this problem.
You need to achieve the following goals:
� Provide this administrator with the ability to manage GPOs linked to the Sales OU.
� Retain the exclusive ability to create new GPOs to yourselves.
Which of the following would help you achieve the said goals?
Correct Answer
B. Use the Delegation of Control wizard to assign the Manage Group Policy links setting to this administrator for the Sales OU.
Explanation
You should use the Delegation of Control wizard to assign the Manage Group Policy links setting to this administrator for the Sales OU.
23.
You are the network administrator for MetroTech. The company's network consists of a single Active Directory forest that contains three domains: MetroTech.com, east. MetroTech.com, and west. MetroTech.com. The forest operates at the Windows Server 2003 forest functional level.
The root domain contains administrative user accounts and computer accounts for three domain controllers and a member server hosting Routing and Remote Access Service (RRAS). Both child domains contain user accounts and computer accounts for client computers, file servers, application servers, and print servers. Each child domain contains user accounts for users in the sales, marketing, and accounting departments.
You want to define MetroTech 's organizational unit (OU) structure to allow the creation of group policies that achieve the following goals:
� Group policies can be applied to all users in each child domain and configured so that they are not overridden.
� Group policies can be applied to users in each department in each domain.
� All Group Policy Objects (GPOs) will be linked to OU objects.
� A minimal number of OU objects will be created.
� A minimal number of GPO links will be used.
Which OU structure can be created to meet these goals
Correct Answer
A. You should create a parent OU container in each child domain. Then, you should create a child OU container below each parent container named for each of the three departments.
Explanation
You should create a parent OU container in each child domain. Then, you should create a child OU container below each parent container named for each of the three departments: Sales, Eng, and Manu. This design will allow group policies to be created for all users and configured so that they cannot be overridden.
24.
You are the network administrator for MetroData. All servers run Windows Server 2003, and all client computers run Windows XP Professional. All domains operate at the Windows 2003 native domain functional level.
Each domain has helpdesk personnel that are members of a global group named HDesk. An OU named Contract is located in MetroData.com, which contains the user accounts for all contract employees.
You want to delegate the ability to reset passwords for users accounts located in the Contract OU to the helpdesk personnel in each domain.
Which of the following should you perform? Choose two. Each correct answer represents part of the solution.
Correct Answer(s)
C. Create a universal group named U-HDesk in MetroData.com and add the three HDesk groups to this group.
D. On the Contract OU, delegate the Reset passwords on user accounts permission to the U-HDesk universal group.
Explanation
You should create a universal group named U-HDesk in premier.com and add the three HDesk groups to this group. On the Contract OU, you should delegate the Reset passwords on user accounts permission to the U-HDesk universal group.
25.
Your network consists of two domain controllers running Microsoft Windows Server 2003 and 5,000 workstation computers running Microsoft Windows 2000 Professional. There are 2 sites and organizational units (OUs) are set up for Accounting and Human Resources (HR). There is a domain controller at each site.
You have three links configured between the Site A and Site B: 56 Kbps (slow link), 512 Kbps, and T1.
Group Policy settings are applied at the site, domain, and organizational unit (OU) levels. You want to determine the effects of software deployment options settings on individual computers.
You want to customize how group policy is applied to computers in the domain. You also want to allow the processing of software installation policy Group Policy object (GPO) settings over slow link connections.
How can you accomplish this?
Correct Answer
D. From the Computer Configuration Administrative Templates, click System, and then Group Policy. Under the Software Installation policy properties setting, select Enabled, and then select Allow processing across a slow network connection.
Explanation
To accomplish customizing how group policy is applied to computers in the domain and allowing the processing of software installation policy GPO settings over slow link connections, you should go to the Computer Configuration Administrative Templates, click System, and then Group Policy. Under the Software Installation policy properties setting, select Enabled, and then select Allow processing across a slow network connection. This will enable the background refresh of group policy and ensure that software deployment options settings are applied to individual computers even over slow network connections.
26.
You are the network administrator responsible for desktop configuration in your company. You are required to deploy three different configurations of Microsoft Office XP Professional to different groups of users. You identify the software distribution point as \\SRVMET\officexp.
What should you do to accomplish your goal?
Correct Answer
C. Using Windows Installer, create a separate .mst file for each configuration of Office XP Professional. Copy the .mst files to the software distribution point.
Explanation
.msi file is a basic installable form of a push installation. .mst is used to obtain variants of configurations from the .msi file.
27.
The Finance OU of your company�s AD domain contains two child OUs named Accounts and Audit.
You need to deploy a new line of Finance applications to the Finance department. The applications need to be installed on all the computers in Finance and should be available to any user who logs on to a Finance computer, including managers from other departments. If a member of the Finance department logs on to a computer that is not in the Finance department, the applications cannot be installed due to the limited amount of licenses that you have.
What is the best way to provide a solution?
Correct Answer
A. Create and link a Group Policy object on the Finance OU that assigns the Finance applications to the computers.
Explanation
To install the Finance applications on all of the computers in the Finance department and make those applications available to anyone who logs on to a Finance computer, you should create and link a Group Policy object on the Finance OU that assigns the Finance applications to the computers.
28.
Active Directory configuration consists of a single forest, single domain, and single site. You want to configure group policy so that the user�s local data that is important will be backed up regularly as part of the network backup procedure.
What is the best way to accomplish this? (Choose all that apply.)
Correct Answer(s)
A. Select the "Move the contents of My Documents to the new location" option from Group Policy Object Editor Folder Redirection properties.
B. Make sure that the users copy their important files to a network share.
Explanation
When you enable the "Move the contents of My Documents to the new location", the user no longer has to back documents that are placed in the My Documents folder on his local computer.
29.
You are in the process of configuring user security settings using a Group Policy Object (GPO). You would like to deploy a script to the users that will run a program that will check each client computer to which they log on for the presence a specific software. It is also required that when the user logs on to the computer, you would like to verify if all the pre-requisites for this script to be run is available and only then run the script.
What should you do?
Correct Answer
D. Create a GPO that will run the logon script and link it to the domain. Create a WMI Filter on the GPO that checks for the presence of the pre-requisite by using a query.
Explanation
WMI filters contain WQL based queries, which are evaluated dynamically at the computer startup or user logon, and depending on their outcome, allow or disallow the GPO settings to be applied.
30.
Your company�s Active Directory structure consists of a single domain and a single site. You have organizational units (OUs) set up for each department.
You want to configure settings for audit policies and user rights assignments for computers in the domain. How can you accomplish this?
Correct Answer
A. Use Computer Configuration, Windows Settings, Security Settings, from the Group Policy Object Editor.
Explanation
To configure local account policies, such as password policy, account lockout policy, and Kerberos policy, you should use Computer Configuration, Windows Settings, and Security Settings, from the Group Policy Object Editor. You should select the Default Domain Policy Group Policy object Editor in this scenario.
31.
Keeping in view that Internet access ahs been hampering the network performance, your company�s written policies have been revised as follows:
� Provide a way to allow the users to only run line of business applications that have been installed on their computers in the d:\userapps folder.
� Prevent users from running any other applications.
� The solution should not affect anyone in the Support Managers global group.
What is the best way to accomplish your goal?
Correct Answer
B. Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to disallowed. Create a path rule for d:\userapps and set the security level of the rule to unrestricted. Deny Apply Group Policy to the Support Managers global group.
Explanation
A Software Restriction Policy, which is implemented with a Group Policy object (GPO), can be used to control which software each user can run.
32.
Recently the management modified the written security policy requiring the local administrator account on all servers to be disabled. You configure the Default Domain Policy GPO to disable these accounts. When you complete this task, you discover that you are unable to log on to the domain controllers using the domain administrative account. No other account has the log on locally user right on the company's domain controllers.
You must take corrective action to allow you to access the domain administrative account.
What should you do first?
Correct Answer
A. Restart one of the domain controllers in Safe mode.
Explanation
You should restart one of the domain controllers in Safe mode, create a new user account with the appropriate permissions for modifying group policy, restart using the new user account, and remove the restrictions from the Default Domain Policy GPO.
33.
Jake, one of the users who is transferred from one department to the other informs you that he can still open Active Directory Users and Computers from his desktop.
What should you do to determine the problem? (Choose all that apply.)
Correct Answer(s)
B. Using Jake 's user account, run Gpresult and determine if the Software Installation policy was applied.
C. From the domain controller used during Jake 's most recent logon, run the GPOTool tool and verify that there is no version mismatch on this policy.
E. Open the GPO containing the Software Installation policy, check the package properties, and ensure that the Uninstall this application when it falls out of the scope of management option is enabled.
Explanation
You should take the three following actions:
o Using Jake 's user account, run Gpresult and determine if the Software Installation policy was applied.
o From the domain controller used during Jake 's most recent logon, run the GPOTool tool and verify that there is no version mismatch on this policy.
Open the GPO containing the Software Installation policy, check the package properties, and ensure that the Uninstall this application when it falls out of the scope of management option
34.
After completing the delegation administration to two users who will be assisting you in daily administration tasks, you want to track the changes made to Active Directory by these users.
You perform the following actions
� Create a Group Policy Object (GPO) called AcctManage GPO for the Domain Controllers container
� Assign the Read and Apply Group Policy permissions to Samantha and Raul.
What else should you do?
Correct Answer
A. You should configure the Audit Directory Services Access and Account Management policies in the AcctManageGPO.
Explanation
You should configure the Audit Directory Services Access and Account Management policies in the AcctManageGPO.This will allow you to track successful and failed audit attempts, if configured, to be logged in the Directory Service event log.
35.
You are the network administrator for your company. The company's network consists of three Active Directory domains: Metro.com, mktg. Metro.com, and sales. Metro.com. All servers run Windows Server 2003, and all client computers run Windows XP Professional. All domains are located in the Los Angeles site. Each domain contains organizational units (OUs)
Group policy objects (GPOs) exist with the GPO
A user named Jane, a member of the S2 OU, logs on to a computer in the S2 OU.
What are her effective settings?
Correct Answer
D. A combination of the settings from the Premier GPO and the S2 GPO
Explanation
Jane's effective settings will be a combination of the settings from the Metro GPO and the S2 GPO.
36.
Your company has just purchased new software that will be used by the test & QA team. The software is under free trial for a period of 30 days. Within this period you are required to deploy it to users in the test and QA team if they volunteer to assess the software only. You need to configure a GPO to install the application based on the user's choice. No modifications should be made to a user's computers unless the user chooses to participate in the assessment.
How should the software installation GPO be configured?
Correct Answer
D. Link the software installation GPO to the Draft OU and Configure the GPO to publish the application.
Explanation
You should configure the GPO to publish the application and link the software installation GPO to the Draft OU.
Using Group Policy Software Installation helps administrators to specify how applications are installed and maintained within your organization. There are two primary methods for deploying software using Group Policy Objects (GPOs): assigning the software or publishing the software
37.
You are required to configure the following for your network:
� All servers should receive automatic updates.
� Client computers should receive updates from servers after having tested the updates.
Which tool should you use to accomplish this?
Correct Answer
A. Software Update Services
Explanation
Microsoft Software Update is used to synchronize updates with the Windows Update Web site and places them on the said server.
38.
You had recently deployed a MS Office package using MSI file to the Finance OU.
Users in the Finance department have requested increased functionality from the application. You decide to distribute an upgrade to the Finance users. After distributing the upgrade, you discover that other departments as well are allowed access to the said package.
Which of the following will help to troubleshoot the problem?
Correct Answer
A. Run Resultant Set of Policy (RSoP) in logging mode.
Explanation
By running Resultant Set of Policy (RSoP) in logging mode, you can determine why the other users received the upgrade.
39.
Your company�s written policy states that all the computers in the network must have the company logo as their computer�s wallpaper. Users in the design department report that their client computers are not displaying the new custom wallpaper. You restart one of the computers and verify that the correct settings are not applied on the computer.
How can you troubleshoot this problem? Choose all that apply. Each answer is a unique solution.
Correct Answer(s)
A. Open Group Policy Management Console and run Resultant Set of Policy (RSoP) in logging mode.
B. Use the Run command to execute the Gpresults.exe command.
Explanation
You could open the Group Policy Management Console (GPMC) and run Resultant Set of Policy (RSoP) in logging mode, or you could use the Run command to execute the Gpresults.exe command.