1.
Which of the following is not a type of user account that can be configured in Windows Server 2012 R2?
Correct Answer
C. Network accounts
Explanation
In Windows Server 2012 R2, network accounts are not a type of user account that can be configured. Local accounts are created and managed on individual servers, domain accounts are managed by a domain controller in an Active Directory domain, and built-in accounts are pre-configured accounts that have specific administrative purposes. However, network accounts are not a recognized type of user account in Windows Server 2012 R2.
2.
Which of the following strategies for enforcing software restrictions will prevent any executable from running except for those that have been specifically allowed by an administrator?
Correct Answer
B. Disallowed
Explanation
The correct answer is "Disallowed" because this strategy involves prohibiting the execution of any executable unless it has been explicitly authorized by an administrator. This means that only approved programs will be allowed to run, providing a higher level of security and control over the software environment.
3.
To find which of the following Active Directory containers can Group Policies be applied?
Correct Answer
D. All of the above
Explanation
Group Policies can be applied to all of the Active Directory containers mentioned in the options: sites, OUs (Organizational Units), and domains. Group Policies are used to manage and control the settings for users and computers within an Active Directory environment. By applying Group Policies at the site level, they can be enforced across multiple domains. OUs allow for more granular control by applying policies to specific groups of users or computers. Domains also serve as a container for Group Policies, allowing for broader policy application across all objects within the domain. Therefore, all of the mentioned containers can have Group Policies applied to them.
4.
Which of the following terms describes the process of granting users access to file server shares by reading their permissions?
Correct Answer
B. Authorization
Explanation
Authorization is the correct answer because it refers to the process of granting users access to file server shares by reading their permissions. This involves determining what level of access a user has to specific files or folders on the server based on their assigned permissions. Authentication, on the other hand, is the process of verifying the identity of a user, while enumeration refers to the process of gathering information about a system or network. Assignment does not accurately describe the process of granting access based on permissions.
5.
Which of the following cannot contain multiple Active Directory domains?
Correct Answer
A. Organizational units
Explanation
Organizational units (OU) cannot contain multiple Active Directory domains. OUs are containers used to organize and manage objects within a single domain. While a domain can have multiple OUs, each OU belongs to a single domain and cannot contain multiple domains. In contrast, sites, trees, and forests can all contain multiple Active Directory domains. Sites represent physical locations, trees are collections of domains with a common namespace, and forests are collections of multiple trees.
6.
Which of the following does an Active Directory client use to locate objects in another domain?
Correct Answer
B. Global Catalog
Explanation
An Active Directory client uses the Global Catalog to locate objects in another domain. The Global Catalog is a distributed data repository that contains a subset of attributes for all objects in the forest. It provides a way to search for objects across multiple domains in the forest without the need for referrals. The Global Catalog is essential for cross-domain queries and is used to locate objects such as users, groups, and resources in different domains within the Active Directory forest.
7.
Which type of IP address must a system have to be visible from the Internet?
Correct Answer
A. Registered
Explanation
A system must have a registered IP address to be visible from the Internet. A registered IP address is assigned by an Internet Service Provider (ISP) and is unique to that system. It allows the system to communicate with other devices on the Internet and be accessible to users worldwide. Without a registered IP address, the system would not be able to establish connections or receive incoming data from the Internet.
8.
Which of the following tools cannot enable and disable the Network Discovery firewall rules?
Correct Answer
C. Action Center
Explanation
The Action Center is not able to enable and disable the Network Discovery firewall rules. The Action Center is a notification center in Windows that provides alerts and notifications for various system settings and security issues. While it can notify the user about the status of the Network Discovery firewall rules, it does not have the capability to directly enable or disable them.
9.
Active Directory is a technology created by ________ that provides a variety of network services, including:
Correct Answer
D. Â Role-based access control
Explanation
Active Directory is a technology created by Microsoft that provides a variety of network services. One of these services is role-based access control, which allows administrators to assign specific roles and permissions to users based on their job responsibilities and organizational needs. This ensures that users only have access to the resources and information that are necessary for their roles, enhancing security and efficiency within the network.
10.
How many group scopes are there in Active Directory?
Correct Answer
A. Three
Explanation
Active Directory has three group scopes: domain local, global, and universal. Each scope determines the extent to which a group can be used and managed within a domain or across multiple domains. Domain local groups are used to assign permissions within a single domain, global groups are used to organize users with similar roles across multiple domains, and universal groups are used to grant access to resources in any domain within a forest.
11.
Which of the following is a role that can be installed on a Windows Server?
Correct Answer
B. Active Directory Domain Services
Explanation
Active Directory Domain Services is a role that can be installed on a Windows Server. It is used for managing users, groups, and resources within a network environment. This role enables centralized authentication, authorization, and administration of network resources, enhancing security and simplifying management tasks.
12.
Which of the following command-line tools are used to join a computer to a domain?
Correct Answer
C. Netdom.exe
Explanation
Netdom.exe is used to join a computer to a domain. It is a command-line tool that is specifically designed for managing Active Directory domains and trusts. It allows administrators to join a computer to a domain, as well as perform other domain-related tasks such as managing trusts, querying domain information, and managing domain controllers. Netdom.exe is commonly used in Windows environments for domain administration and can be used to automate the process of joining computers to a domain.