MCSE 70-294 Practice Exam -1 Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 616,128
Questions: 39 | Attempts: 1,008

SettingsSettingsSettings
MCSE Quizzes & Trivia

MCSE 70-294 Practice Exam - 1: "Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure". This MCSE 70-294 practice exam tests you on tests you about Active Directory. You are required to be comfortable with Windows Server 2003 forests, domains, sites, Group Policies, and trusts. Also, try free MCSE practice questions and other resources from our free online MCSE school.


Questions and Answers
  • 1. 

    View Exhibit. The newly acquired domain shown in the exhibit needs to be allowed to access a file server in �Insure.MetroTech.com� child domain. For this purpose, you are required to build the relevant trust relationship between the domains. Which of the following choices would be an appropriate direction of trust here?View Exhibit

    • A.

      A bi-directional trust between the root and the newly acquired domain

    • B.

      The root should be establishing external trust with the new domain

    • C.

      �Insure.MetroTech.com� should be establishing external trust with the new domain

    • D.

      �Insure.MetroTech.com� should be establishing external trust with the new domain

    Correct Answer
    C. �Insure.MetroTech.com� should be establishing external trust with the new domain
    Explanation
    Since the new domain here needs to b e the trusted domain and the child of the existing infrastructure needs to be the trusting domain, it is appropriate for �Insure.MetroTech.com� to be establishing external trust with the new domain.

    Rate this question:

  • 2. 

    View Exhibit. Shown in the exhibit are three sites Site A, Site B and Site C. Each site has 2 DCs each. There are persistent links configured between each two sites BA, BC and AC. For the purpose of replication, it is required that only A_DC2 replicates with C_DC2 and B_DC2, whereas the only C_DC2 replicates with B_DC2. How would you achieve this?

    • A.

      Ensure all DCs other than the mentioned get down graded to member servers.

    • B.

      Configure A_DC2, B_DC2 and C_DC2 as preferred bridgehead servers.

    • C.

      Configure A_DC1, B_DC1 and C_DC1 as preferred bridgehead servers.

    • D.

      D. Remove all DCs other than the ones that need to replicate.

    Correct Answer
    B. Configure A_DC2, B_DC2 and C_DC2 as preferred bridgehead servers.
    Explanation
    Configuring A_DC2, B_DC2 and C_DC2 as preferred bridgehead servers would ensure that during replication between sites only the DCs configured, as preferred bridgehead servers will be looked up for replication.

    Rate this question:

  • 3. 

    Your software development team has a proposed design for an application that will be configured to send Company related news to all users who are logged on to the network. This application will be using the ADS to store its data. You are required to allow the team the relevant permissions to create the application directory partition as required by the application to function accurately. Which of the following choices would help you achieve the same in this situation?

    • A.

      Allow them permissions to modify the Schema.

    • B.

      Add the team to the Enterprise Admins group.

    • C.

      Add the team to the domain Admins group

    • D.

      Delegate permissions to the team for the created cross-reference object

    Correct Answer
    D. Delegate permissions to the team for the created cross-reference object
    Explanation
    For the team to be able to successfully create the application directory partition that is required, you must first create a cross-reference object that will hold all relevant information pertaining to the application directory partition and then delegate permissions to the team over the cross-reference object.

    Rate this question:

  • 4. 

    Type the command used to de-promote a domain controller from the ADS.

    • A.

      Configure your server wizard

    • B.

      Active Directory Schema

    • C.

      Active Directory Installation Wizard

    • D.

      DCPROMO

    Correct Answer
    D. DCPROMO
    Explanation
    Since the question statement is referring to a command and not an application, the correct answer is DCPROMO

    Rate this question:

  • 5. 

    View the exhibit.Which of the following statements are true?

    • A.

      A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. MetroTech.com trusts Infinity.com

    • B.

      A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. B.MetroTech.com trusts Infinity.com

    • C.

      A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. Infinity.com trusts Infinity.com

    • D.

      A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. Infinity.com trusts B.MetroTech.com

    Correct Answer
    D. A.MetroTech.com has a bi-directional trust with A.MetroTech.com and B.MetroTech.com. Infinity.com trusts B.MetroTech.com
    Explanation
    As per the exhibit, MetrTech.com has an implicit bi-directional trust with its child domains A.MetroTech.com and B.MetroTech.com. Infinity.com is the trusting domain and B.MetroTech.com is the domain being trusted by Infintiy.com.

    Rate this question:

  • 6. 

    Which of the following statements that relate to preferred Bridgehead servers are true?

    • A.

      They are servers that have the best hardware configuration in the entire forest/domain.

    • B.

      They are the DCs preferred for replication between partners across a site.

    • C.

      They are capable of replicating with DCs internal to the site as well.

    • D.

      They can only replicate across a WAN link and not within a site using Ethernet links.

    Correct Answer(s)
    B. They are the DCs preferred for replication between partners across a site.
    C. They are capable of replicating with DCs internal to the site as well.
    Explanation
    The preferred bridgehead server is a server that replicates across the WAN and then replicates the changes down to the other domain controllers that are in the same site. They are capable of replication across WAN links and Ethernet Links as well.

    Rate this question:

  • 7. 

    You have just enabled your DC that was running as GC (Global Catalog) server to also function as Infrastructure master to ensure all domain related changes get replicated as quickly as possible. You have at least 10 DCs in the domain. But you hear complaints form administrators that this has not affected the functioning for the better at all. Many changes that were made were not replicated and hence not reflected. What could the problem be?

    • A.

      The Infrastructure Master configuration was incorrect.

    • B.

      The GC configuration was incorrect.

    • C.

      The service pack version is incorrect.

    • D.

      The GC and IM should not be hosted on the same DC.

    Correct Answer
    D. The GC and IM should not be hosted on the same DC.
    Explanation
    The infrastructure master role is responsible for reflecting changes made in the local domain to the other domains in the network. Unless there is only one domain controller in the domain, you should not host eh GC and the IM in the same DC.

    Rate this question:

  • 8. 

    You have an AD forest that has 3 levels of hierarchy under the root with a implicit bi-directional trust between all the levels. You have now configured a single direction external trust with the last level of domains and a domain of a company that you have recently acquired. Once the merger is complete, you are required to re-name this domain. Which of the following is true about the after effects of re-naming the new domain?

    • A.

      This domain will be accessible as usual to all the domains in your AD forest.

    • B.

      You will have to rebuild the trust after the renaming is done

    • C.

      Unless the re-building of trust is done the new domain will be inaccessible to the domains in your forest.

    • D.

      You will have to rename the last level domains in your AD forest as well.

    Correct Answer(s)
    B. You will have to rebuild the trust after the renaming is done
    C. Unless the re-building of trust is done the new domain will be inaccessible to the domains in your forest.
    Explanation
    You should delete and recreate the two-way trust relationship between the domains because the previously created trust relationships will not be valid anymore after the new domain gets renamed.

    Rate this question:

  • 9. 

    You are the administrator for MetroTech.com that has an Active Directory infrastructure that consists of a single domain that resides on three domain controllers. During the latest replication, one of the OUs residing on one of the domain controller was not replicated to the other domain controllers. As a work around you instruct a junior administrator to perform a manual replication and he receives �access is denied� when the replication is attempted. What could the problem be?

    • A.

      FRS is not configured properly

    • B.

      Assign the relevant permission to the administrator.

    • C.

      Links are not functioning properly

    • D.

      None of the above

    Correct Answer
    B. Assign the relevant permission to the administrator.
    Explanation
    The Replication Synchronization permission for the relevant OU has to be assigned to the administrator without which he cannot carry out the replication task.

    Rate this question:

  • 10. 

    Which of the following are ideal situations to perform a non-authoritative restore on a DC?

    • A.

      When all the Active Directory related information needs to be updated manually

    • B.

      When only the data needs to be restored

    • C.

      When only Active Directory related information needs to be restored

    • D.

      When all updated data needs to be discarded

    Correct Answer
    B. When only the data needs to be restored
    Explanation
    You should perform a non-authoritative restore when you want to only restore data and not the Active Directory related information. Any AD related updation requires an authoritative restore.

    Rate this question:

  • 11. 

    You have for some time now been receiving Hard disk space related error messages on your DC that is running a Windows Server 2003 domain. Active Directory is generating numerous errors due to the lack of hard drive space. You decide to install and configure a new HDD to rectify the problem. Which of the following should you first perform before you move the Active Directory to the new HDD?

    • A.

      Run the ntdsutil command.

    • B.

      Restart the domain controller in safe mode

    • C.

      Restart the domain controller normally.

    • D.

      Restart the domain controller in Directory Services Restore Mode.

    Correct Answer
    D. Restart the domain controller in Directory Services Restore Mode.
    Explanation
    Active Directory is a combination of database and log files. To move the database, you must restart in Directory Service Restore Mode, not in either Safe Mode or Normal mode.

    Rate this question:

  • 12. 

    Which of the following should be done to restore Active Directory to a DC from a tape backup?

    • A.

      Perform a non-authoritative restore.

    • B.

      Perform an authoritative restore.

    • C.

      Use DCPROMO to upgrade the DC status.

    • D.

      Re-install Active Directory.

    Correct Answer
    B. Perform an authoritative restore.
    Explanation
    Performing an authoritative restore ensures that the restored data is replicated throughout the domain by assigning the highest USN to the updated information.

    Rate this question:

  • 13. 

    Which of the following admin groups will be able to run "adprep /forestprep" successfully?

    • A.

      Schema Admins group

    • B.

      Domain Admins group

    • C.

      Enterprise Admins group

    • D.

      Administrators local group

    Correct Answer(s)
    A. Schema Admins group
    B. Domain Admins group
    Explanation
    The Enterprise Admins group and the Schema Admins group are forest level groups and can hence run the forest prep commands successfully.

    Rate this question:

  • 14. 

    You have just physically removed one of the DCs from the AD as it has suffered hardware failure and cannot be recovered. You now need to remove all reference of this object from the AD. You decide to use NTDSUTIL for this purpose. Which of the following are the most suitable NTDSUTIL command options to be chosen in this situation?

    • A.

      Metadata cleanup

    • B.

      Authoritative restore

    • C.

      Semantic database analysis

    • D.

      None of the above

    Correct Answer
    A. Metadata cleanup
    Explanation
    Use the Active Directory Diagnostic Tool and the Metadata Cleanup to remove the failed domain controller (DC) object metadata from the Active Directory database.

    Rate this question:

  • 15. 

    Your DC that is also a GC currently is suffering performance wise. You have decided to introduce a new DC into the AD network, move the GC to this new DC and clean the disk space on the original GC so it can be used as a file server. You will be using the Active Directory Sites and Services tool for this purpose.What should you do? (Choose all that apply)

    • A.

      Using NTDS settings on new DC check the GC setting.

    • B.

      Using NTDS settings on old DC check the GC setting.

    • C.

      Using NTDS settings on new DC uncheck the GC setting.

    • D.

      Using NTDS settings on old DC uncheck the GC setting.

    Correct Answer(s)
    A. Using NTDS settings on new DC check the GC setting.
    D. Using NTDS settings on old DC uncheck the GC setting.
    Explanation
    You need to ensure that the new DC will be the GC and the old DC will no longer be the GC and as a result will be containing that much free space. For this purpose you must use Active directory sites and services and:
    � On the old DC use the NTDS settings to uncheck GC settings
    � On the new DC check the NTDS settings to check the GC settings

    Rate this question:

  • 16. 

    Your Windows Server 2003 AD network has one root and 5 child domains spread across as many locations. The network has a special set of users who will require unconditional access on all resource servers across domains and the network. These servers and users are spread across all locations in the network. Which of the following groups will be ideal to grant security access to the said users?

    • A.

      Universal

    • B.

      Domain Local

    • C.

      Global

    • D.

      Local

    Correct Answer
    A. Universal
    Explanation
    In the said situation, it would be ideal to create Universal group and make the special users a part of the Universal group and then provide resource access to the group.

    Rate this question:

  • 17. 

    As a part of the internal audit exercise, your organization has decided that a couple of employees from each department will be grouped under a department called audit to ensure the audit exercise will be carried out smoothly. In accordance you will be required to deploy policies that will affect this group and provide them necessary permissions and access rights across the network. As a senior administrator of MetroTech.com forest, you decide to deploy a few of the team members of the IT department on to the task of managing the network scenario.Which of the following would be an ideal way of managing this scenario?

    • A.

      A. Create a new organizational unit (OU) under MetroTech.com named Audit and move the audit users into it. Delegate the appropriate level of permissions at the audit OU to the IT users who will manage the users and computers. Create and link a GPO to the Audit OU that will restrict the client computers and distribute the applications.

    • B.

      B. Create a new organizational unit (OU) under MetroTech.com named Audit and move the audit users into it. Place all the audit users and computers into a universal group called audit. Delegate control of the audit OU to the IT users. Create and link a GPO to the audit universal group that will restrict the desktops and distribute the applications.

    • C.

      C. Create a child domain named audit.MetroTech.com. Add the IT users who need control over the users and computers in to the Domain Admins group. Create and link a GPO to the new domain to restrict the client computers and distribute the applications.

    • D.

      D. Create a universal group named Audit and place the new audit users and computers into it. Delegate control over the universal group to the IT staff responsible for management of the audit users and computers. Create and link a GPO to the audit universal group that will restrict the client computers and distribute the applications.

    Correct Answer
    A. A. Create a new organizational unit (OU) under MetroTech.com named Audit and move the audit users into it. Delegate the appropriate level of permissions at the audit OU to the IT users who will manage the users and computers. Create and link a GPO to the Audit OU that will restrict the client computers and distribute the applications.
    Explanation
    The most efficient way to provide a solution for the management of the Audit users is to create a new organizational unit (OU) under MetroTech.com named Audit and move the research users into it. Delegate the appropriate level of permissions at the Audit OU to the IT users who will manage the users and computers. Create and link a GPO to the Audit OU that will restrict the client computers and distribute the applications.

    Rate this question:

  • 18. 

    MetroTech Finance has an AD structure that contains Windows Server 2003 forest/domain. They have just acquired a small subsidiary that will be treated as a child domain under the root. This organization has so far been running on Windows NT 4.0 network. Although there are plans for upgrade in the near future, you will be required to manage the existing setup as is. Each of the organization has offices spread across different geographical location and each office has a finance department. A part of each of the finance team is dedicated for auditing and is entitled to resources access across the network. You will be needed to work out a security strategy that will need to meet with the needs and will also specifically satisfy these goals: � The finance department's employees in each office should be able to access resources in the other office. � Administrators in each office will be responsible for managing the users in the group or groups. Which of the following will help you achieve the said strategy with minimum efforts? Choose all that apply. Each answer is part of the solution.

    • A.

      Add the Finance groups of each location as members to MetroTech Finance.

    • B.

      Create a universal group named MetroTech Finance.

    • C.

      Create two domain local groups named after locations.

    • D.

      Create global groups named after the location.

    • E.

      Add individual finance members to the global groups created based on locations.

    Correct Answer(s)
    D. Create global groups named after the location.
    E. Add individual finance members to the global groups created based on locations.
    Explanation
    You should first create a global group for the finance department in each domain. You can then add individual members to these global groups. Global group members are not replicated to every global catalog in the forest. Because the majority of the finance employees are auditors, global groups can prevent frequent membership changes from being replicated to the global catalog.

    Rate this question:

  • 19. 

    Which of the following can the Universal group be a parent to?

    • A.

      User accounts

    • B.

      Global groups

    • C.

      Universal groups

    • D.

      Local groups

    Correct Answer(s)
    A. User accounts
    B. Global groups
    C. Universal groups
    Explanation
    Universal groups can contain user accounts, global groups, and other universal groups from any domain in the forest as members. Local groups are usually not made members of Universal groups

    Rate this question:

  • 20. 

    Ywhile calculating the combined effect of Local permissions and Share permissions to arrive at NTFS permissions, which of the following statements can be considered true?

    • A.

      The cumulative effect is most restrictive

    • B.

      The cumulative effect is least restrictive

    • C.

      Local permissions override share permissions

    • D.

      Share permissions override local permissions

    Correct Answer
    A. The cumulative effect is most restrictive
    Explanation
    To determine the appropriate NTFS permission, you must determine how the combined share and NTFS permissions will interact to create the resulting access permission. When combining both sets of permissions, the resulting permission is the more restrictive of the NTFS and the share permission.

    Rate this question:

  • 21. 

    You wish to audit resource access of certain folders create and accessed by users belonging to a specific OU. You are required to use Group Policy Editor for computers in that OU. How can you achieve the said goal?

    • A.

      Enable Audit account management.

    • B.

      Enable Audit system events.

    • C.

      Enable Audit logon events.

    • D.

      Enable Audit object access.

    Correct Answer
    D. Enable Audit object access.
    Explanation
    If you enable Audit object access, events relating to users accessing resources will be logged. This includes accessing folders on a computer. You can configure Success or Failure audits, or both.

    Rate this question:

  • 22. 

    You are the administrator for a single Active Directory domain called MetroTech.com. Your network is a Windows Server 2003/Windows XP platform. Each department has been assigned one OU. You are currently administering the Sales OU. You have a team of junior administrators. One of your junior administrator has reported that she is unable to modify existing Group Policy Objects (GPOs) links for the OU. The other administrators are not experiencing this problem. You need to achieve the following goals: � Provide this administrator with the ability to manage GPOs linked to the Sales OU. � Retain the exclusive ability to create new GPOs to yourselves. Which of the following would help you achieve the said goals?

    • A.

      Use the Delegation of Control wizard to assign the Read all user information setting to this administrator for the domain.

    • B.

      Use the Delegation of Control wizard to assign the Manage Group Policy links setting to this administrator for the Sales OU.

    • C.

      Use the Active Directory Users and Computers console to add this administrator to the Owners/Creators group for the Sales OU.

    • D.

      Use the Active Directory Users and Computers console to assign this administrator the Full Control permission for all relevant GPOs.

    • E.

      Use the Active Directory Users and Computers console to assign this administrator the Read and Assign Group Policy Object permissions for all relevant GPOs.

    Correct Answer
    B. Use the Delegation of Control wizard to assign the Manage Group Policy links setting to this administrator for the Sales OU.
    Explanation
    You should use the Delegation of Control wizard to assign the Manage Group Policy links setting to this administrator for the Sales OU.

    Rate this question:

  • 23. 

    You are the network administrator for MetroTech. The company's network consists of a single Active Directory forest that contains three domains: MetroTech.com, east. MetroTech.com, and west. MetroTech.com. The forest operates at the Windows Server 2003 forest functional level. The root domain contains administrative user accounts and computer accounts for three domain controllers and a member server hosting Routing and Remote Access Service (RRAS). Both child domains contain user accounts and computer accounts for client computers, file servers, application servers, and print servers. Each child domain contains user accounts for users in the sales, marketing, and accounting departments. You want to define MetroTech 's organizational unit (OU) structure to allow the creation of group policies that achieve the following goals: � Group policies can be applied to all users in each child domain and configured so that they are not overridden. � Group policies can be applied to users in each department in each domain. � All Group Policy Objects (GPOs) will be linked to OU objects. � A minimal number of OU objects will be created. � A minimal number of GPO links will be used. Which OU structure can be created to meet these goals

    • A.

      You should create a parent OU container in each child domain. Then, you should create a child OU container below each parent container named for each of the three departments.

    • B.

      You should create a parent OU container in each child domain.

    • C.

      You should create a parent OU container in each level

    • D.

      None of the above

    Correct Answer
    A. You should create a parent OU container in each child domain. Then, you should create a child OU container below each parent container named for each of the three departments.
    Explanation
    You should create a parent OU container in each child domain. Then, you should create a child OU container below each parent container named for each of the three departments: Sales, Eng, and Manu. This design will allow group policies to be created for all users and configured so that they cannot be overridden.

    Rate this question:

  • 24. 

    You are the network administrator for MetroData. All servers run Windows Server 2003, and all client computers run Windows XP Professional. All domains operate at the Windows 2003 native domain functional level. Each domain has helpdesk personnel that are members of a global group named HDesk. An OU named Contract is located in MetroData.com, which contains the user accounts for all contract employees. You want to delegate the ability to reset passwords for users accounts located in the Contract OU to the helpdesk personnel in each domain. Which of the following should you perform? Choose two. Each correct answer represents part of the solution.

    • A.

      Create a domain local group named ResetPass in MetroData.com and place U-HDesk in this group.

    • B.

      Create a global group named U-HDesk in MetroData.com and add the three HDesk groups to this group.

    • C.

      Create a universal group named U-HDesk in MetroData.com and add the three HDesk groups to this group.

    • D.

      On the Contract OU, delegate the Reset passwords on user accounts permission to the U-HDesk universal group.

    Correct Answer(s)
    C. Create a universal group named U-HDesk in MetroData.com and add the three HDesk groups to this group.
    D. On the Contract OU, delegate the Reset passwords on user accounts permission to the U-HDesk universal group.
    Explanation
    You should create a universal group named U-HDesk in premier.com and add the three HDesk groups to this group. On the Contract OU, you should delegate the Reset passwords on user accounts permission to the U-HDesk universal group.

    Rate this question:

  • 25. 

    Your network consists of two domain controllers running Microsoft Windows Server 2003 and 5,000 workstation computers running Microsoft Windows 2000 Professional. There are 2 sites and organizational units (OUs) are set up for Accounting and Human Resources (HR). There is a domain controller at each site. You have three links configured between the Site A and Site B: 56 Kbps (slow link), 512 Kbps, and T1. Group Policy settings are applied at the site, domain, and organizational unit (OU) levels. You want to determine the effects of software deployment options settings on individual computers. You want to customize how group policy is applied to computers in the domain. You also want to allow the processing of software installation policy Group Policy object (GPO) settings over slow link connections. How can you accomplish this?

    • A.

      From the Computer Configuration Administrative Templates, enable the background refresh of group policy.

    • B.

      From the Computer Configuration Windows Settings, configure Software Restriction Policies.

    • C.

      From the Computer Configuration Windows Settings, configure Security Settings.

    • D.

      From the Computer Configuration Administrative Templates, click System, and then Group Policy. Under the Software Installation policy properties setting, select Enabled, and then select Allow processing across a slow network connection.

    Correct Answer
    D. From the Computer Configuration Administrative Templates, click System, and then Group Policy. Under the Software Installation policy properties setting, select Enabled, and then select Allow processing across a slow network connection.
    Explanation
    To accomplish customizing how group policy is applied to computers in the domain and allowing the processing of software installation policy GPO settings over slow link connections, you should go to the Computer Configuration Administrative Templates, click System, and then Group Policy. Under the Software Installation policy properties setting, select Enabled, and then select Allow processing across a slow network connection. This will enable the background refresh of group policy and ensure that software deployment options settings are applied to individual computers even over slow network connections.

    Rate this question:

  • 26. 

    You are the network administrator responsible for desktop configuration in your company. You are required to deploy three different configurations of Microsoft Office XP Professional to different groups of users. You identify the software distribution point as \\SRVMET\officexp. What should you do to accomplish your goal?

    • A.

      Use the appropriate .msi file for each configuration type.

    • B.

      Set up a different software distribution point for each Office XP Professional configuration.

    • C.

      Using Windows Installer, create a separate .mst file for each configuration of Office XP Professional. Copy the .mst files to the software distribution point.

    • D.

      None of the above

    Correct Answer
    C. Using Windows Installer, create a separate .mst file for each configuration of Office XP Professional. Copy the .mst files to the software distribution point.
    Explanation
    .msi file is a basic installable form of a push installation. .mst is used to obtain variants of configurations from the .msi file.

    Rate this question:

  • 27. 

    The Finance OU of your company�s AD domain contains two child OUs named Accounts and Audit. You need to deploy a new line of Finance applications to the Finance department. The applications need to be installed on all the computers in Finance and should be available to any user who logs on to a Finance computer, including managers from other departments. If a member of the Finance department logs on to a computer that is not in the Finance department, the applications cannot be installed due to the limited amount of licenses that you have. What is the best way to provide a solution?

    • A.

      Create and link a Group Policy object on the Finance OU that assigns the Finance applications to the computers.

    • B.

      Create and link a Group Policy object on the Finance OU that publishes the Finance applications to the computers.

    • C.

      Create and link a Group Policy object on the Finance OU that assigns the Finance applications to the users.

    • D.

      Create and link a Group Policy object on the Finance OU that publishes the Finance applications to the users.

    Correct Answer
    A. Create and link a Group Policy object on the Finance OU that assigns the Finance applications to the computers.
    Explanation
    To install the Finance applications on all of the computers in the Finance department and make those applications available to anyone who logs on to a Finance computer, you should create and link a Group Policy object on the Finance OU that assigns the Finance applications to the computers.

    Rate this question:

  • 28. 

    Active Directory configuration consists of a single forest, single domain, and single site. You want to configure group policy so that the user�s local data that is important will be backed up regularly as part of the network backup procedure. What is the best way to accomplish this? (Choose all that apply.)

    • A.

      Select the "Move the contents of My Documents to the new location" option from Group Policy Object Editor Folder Redirection properties.

    • B.

      Make sure that the users copy their important files to a network share.

    • C.

      Make sure that the users store their important files in their C:\ root directory.

    • D.

      None of the above

    Correct Answer(s)
    A. Select the "Move the contents of My Documents to the new location" option from Group Policy Object Editor Folder Redirection properties.
    B. Make sure that the users copy their important files to a network share.
    Explanation
    When you enable the "Move the contents of My Documents to the new location", the user no longer has to back documents that are placed in the My Documents folder on his local computer.

    Rate this question:

  • 29. 

    You are in the process of configuring user security settings using a Group Policy Object (GPO). You would like to deploy a script to the users that will run a program that will check each client computer to which they log on for the presence a specific software. It is also required that when the user logs on to the computer, you would like to verify if all the pre-requisites for this script to be run is available and only then run the script. What should you do?

    • A.

      Check each computer for the pre-requisite. For the computers that do comply, run the script locally.

    • B.

      Create a GPO that installs the pre-requisite and link it to the domain. Create a GPO that will run the logon script and link it to the domain.

    • C.

      Create a GPO that will run the logon script and link it to the domain. Instruct the users to not run the GPO until they verify that the pre-requisite is installed. Place the pre-requisite files in a network share and instruct the users who do not have it installed to connect to the share and run the executable that will install it.

    • D.

      Create a GPO that will run the logon script and link it to the domain. Create a WMI Filter on the GPO that checks for the presence of the pre-requisite by using a query.

    Correct Answer
    D. Create a GPO that will run the logon script and link it to the domain. Create a WMI Filter on the GPO that checks for the presence of the pre-requisite by using a query.
    Explanation
    WMI filters contain WQL based queries, which are evaluated dynamically at the computer startup or user logon, and depending on their outcome, allow or disallow the GPO settings to be applied.

    Rate this question:

  • 30. 

    Your company�s Active Directory structure consists of a single domain and a single site. You have organizational units (OUs) set up for each department. You want to configure settings for audit policies and user rights assignments for computers in the domain. How can you accomplish this?

    • A.

      Use Computer Configuration, Windows Settings, Security Settings, from the Group Policy Object Editor.

    • B.

      Use Security Settings, Windows Settings, Computer Configuration, from the Group Policy Object Editor.

    • C.

      Use Security Settings, Windows Settings, Computer Configuration, from the Active Directory Users and Computers

    • D.

      None of the above.

    Correct Answer
    A. Use Computer Configuration, Windows Settings, Security Settings, from the Group Policy Object Editor.
    Explanation
    To configure local account policies, such as password policy, account lockout policy, and Kerberos policy, you should use Computer Configuration, Windows Settings, and Security Settings, from the Group Policy Object Editor. You should select the Default Domain Policy Group Policy object Editor in this scenario.

    Rate this question:

  • 31. 

    Keeping in view that Internet access ahs been hampering the network performance, your company�s written policies have been revised as follows: � Provide a way to allow the users to only run line of business applications that have been installed on their computers in the d:\userapps folder. � Prevent users from running any other applications. � The solution should not affect anyone in the Support Managers global group. What is the best way to accomplish your goal?

    • A.

      Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to unrestricted. Create a path rule for d:\userapps and set the security level of the rule to disallowed. Deny Apply Group Policy to the Support OU.

    • B.

      Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to disallowed. Create a path rule for d:\userapps and set the security level of the rule to unrestricted. Deny Apply Group Policy to the Support Managers global group.

    • C.

      Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to disallowed. Create a path rule for d:\userapps and set the security level of the rule to unrestricted. Deny Apply Group Policy to the Support OU.

    • D.

      Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to unrestricted. Create a path rule for d:\userapps and set the security level of the rule to disallowed. Deny Apply Group Policy to the Support Managers global group.

    Correct Answer
    B. Create and link a Group Policy object at the domain that configures a Software Restriction Policy. Set the security in the policy to disallowed. Create a path rule for d:\userapps and set the security level of the rule to unrestricted. Deny Apply Group Policy to the Support Managers global group.
    Explanation
    A Software Restriction Policy, which is implemented with a Group Policy object (GPO), can be used to control which software each user can run.

    Rate this question:

  • 32. 

    Recently the management modified the written security policy requiring the local administrator account on all servers to be disabled. You configure the Default Domain Policy GPO to disable these accounts. When you complete this task, you discover that you are unable to log on to the domain controllers using the domain administrative account. No other account has the log on locally user right on the company's domain controllers. You must take corrective action to allow you to access the domain administrative account. What should you do first?

    • A.

      Restart one of the domain controllers in Safe mode.

    • B.

      Create a new user account with the appropriate permissions for modifying group policy.

    • C.

      Restart using the new user account and remove the restrictions from the Default Domain Policy GPO.

    • D.

      Restart one of the domain controllers in Debug mode

    • E.

      Restart one of the domain controllers in LKGC mode

    Correct Answer
    A. Restart one of the domain controllers in Safe mode.
    Explanation
    You should restart one of the domain controllers in Safe mode, create a new user account with the appropriate permissions for modifying group policy, restart using the new user account, and remove the restrictions from the Default Domain Policy GPO.

    Rate this question:

  • 33. 

    Jake, one of the users who is transferred from one department to the other informs you that he can still open Active Directory Users and Computers from his desktop. What should you do to determine the problem? (Choose all that apply.)

    • A.

      From the domain controller used during Jake 's most recent logon, run the Dcgpofix tool.

    • B.

      Using Jake 's user account, run Gpresult and determine if the Software Installation policy was applied.

    • C.

      From the domain controller used during Jake 's most recent logon, run the GPOTool tool and verify that there is no version mismatch on this policy.

    • D.

      Open the GPO containing the Software Installation policy, check the package properties, and verify that the value in the Path to the .MSI package setting is valid.

    • E.

      Open the GPO containing the Software Installation policy, check the package properties, and ensure that the Uninstall this application when it falls out of the scope of management option is enabled.

    Correct Answer(s)
    B. Using Jake 's user account, run Gpresult and determine if the Software Installation policy was applied.
    C. From the domain controller used during Jake 's most recent logon, run the GPOTool tool and verify that there is no version mismatch on this policy.
    E. Open the GPO containing the Software Installation policy, check the package properties, and ensure that the Uninstall this application when it falls out of the scope of management option is enabled.
    Explanation
    You should take the three following actions:
    o Using Jake 's user account, run Gpresult and determine if the Software Installation policy was applied.
    o From the domain controller used during Jake 's most recent logon, run the GPOTool tool and verify that there is no version mismatch on this policy.
    Open the GPO containing the Software Installation policy, check the package properties, and ensure that the Uninstall this application when it falls out of the scope of management option

    Rate this question:

  • 34. 

    After completing the delegation administration to two users who will be assisting you in daily administration tasks, you want to track the changes made to Active Directory by these users. You perform the following actions � Create a Group Policy Object (GPO) called AcctManage GPO for the Domain Controllers container � Assign the Read and Apply Group Policy permissions to Samantha and Raul. What else should you do?

    • A.

      You should configure the Audit Directory Services Access and Account Management policies in the AcctManageGPO.

    • B.

      You should enable the Oakley log

    • C.

      You should view the system log of the event viewer

    • D.

      None of the above

    Correct Answer
    A. You should configure the Audit Directory Services Access and Account Management policies in the AcctManageGPO.
    Explanation
    You should configure the Audit Directory Services Access and Account Management policies in the AcctManageGPO.This will allow you to track successful and failed audit attempts, if configured, to be logged in the Directory Service event log.

    Rate this question:

  • 35. 

    You are the network administrator for your company. The company's network consists of three Active Directory domains: Metro.com, mktg. Metro.com, and sales. Metro.com. All servers run Windows Server 2003, and all client computers run Windows XP Professional. All domains are located in the Los Angeles site. Each domain contains organizational units (OUs) Group policy objects (GPOs) exist with the GPO A user named Jane, a member of the S2 OU, logs on to a computer in the S2 OU. What are her effective settings?

    • A.

      Only the settings from the S2 GPO

    • B.

      Only the settings from the Metro GPO

    • C.

      Only the settings from the Ohio GPO

    • D.

      A combination of the settings from the Premier GPO and the S2 GPO

    Correct Answer
    D. A combination of the settings from the Premier GPO and the S2 GPO
    Explanation
    Jane's effective settings will be a combination of the settings from the Metro GPO and the S2 GPO.

    Rate this question:

  • 36. 

    Your company has just purchased new software that will be used by the test & QA team. The software is under free trial for a period of 30 days. Within this period you are required to deploy it to users in the test and QA team if they volunteer to assess the software only. You need to configure a GPO to install the application based on the user's choice. No modifications should be made to a user's computers unless the user chooses to participate in the assessment. How should the software installation GPO be configured?

    • A.

      Link the software installation GPO to the Draft OU and Configure the GPO to assign the application.

    • B.

      Link the software installation GPO to the domain and Configure the GPO to assign the application.

    • C.

      Link the software installation GPO to the domain and Configure the GPO to publish the application.

    • D.

      Link the software installation GPO to the Draft OU and Configure the GPO to publish the application.

    Correct Answer
    D. Link the software installation GPO to the Draft OU and Configure the GPO to publish the application.
    Explanation
    You should configure the GPO to publish the application and link the software installation GPO to the Draft OU.
    Using Group Policy Software Installation helps administrators to specify how applications are installed and maintained within your organization. There are two primary methods for deploying software using Group Policy Objects (GPOs): assigning the software or publishing the software

    Rate this question:

  • 37. 

    You are required to configure the following for your network: � All servers should receive automatic updates. � Client computers should receive updates from servers after having tested the updates. Which tool should you use to accomplish this?

    • A.

      Software Update Services

    • B.

      Intellimirror

    • C.

      Dynamic Update

    • D.

      Auto Update

    Correct Answer
    A. Software Update Services
    Explanation
    Microsoft Software Update is used to synchronize updates with the Windows Update Web site and places them on the said server.

    Rate this question:

  • 38. 

    You had recently deployed a MS Office package using MSI file to the Finance OU. Users in the Finance department have requested increased functionality from the application. You decide to distribute an upgrade to the Finance users. After distributing the upgrade, you discover that other departments as well are allowed access to the said package. Which of the following will help to troubleshoot the problem?

    • A.

      Run Resultant Set of Policy (RSoP) in logging mode.

    • B.

      From the User Configuration, Windows Settings folder, click on Remote Installation Services.

    • C.

      Use the Computer Management snap-in.

    • D.

      From the User Configuration, Software Settings folder, click on Software Installation.

    • E.

      From the User Configuration, Administrative Templates folder, click on Windows Components.

    Correct Answer
    A. Run Resultant Set of Policy (RSoP) in logging mode.
    Explanation
    By running Resultant Set of Policy (RSoP) in logging mode, you can determine why the other users received the upgrade.

    Rate this question:

  • 39. 

    Your company�s written policy states that all the computers in the network must have the company logo as their computer�s wallpaper. Users in the design department report that their client computers are not displaying the new custom wallpaper. You restart one of the computers and verify that the correct settings are not applied on the computer. How can you troubleshoot this problem? Choose all that apply. Each answer is a unique solution.

    • A.

      Open Group Policy Management Console and run Resultant Set of Policy (RSoP) in logging mode.

    • B.

      Use the Run command to execute the Gpresults.exe command.

    • C.

      Open Group Policy Management Console and run Resultant Set of Policy (RSoP) in planning mode.

    • D.

      Use the Run command to execute the Gpupdate.exe command.

    Correct Answer(s)
    A. Open Group Policy Management Console and run Resultant Set of Policy (RSoP) in logging mode.
    B. Use the Run command to execute the Gpresults.exe command.
    Explanation
    You could open the Group Policy Management Console (GPMC) and run Resultant Set of Policy (RSoP) in logging mode, or you could use the Run command to execute the Gpresults.exe command.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 25, 2007
    Quiz Created by
    Vaibhav Agarwal

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.