1.
What Active Directory Administrative Tool is used to view and change information related to the various domains in an Active Directory environment?
Correct Answer
D. Active Directory Domains and Trusts
Explanation
Active Directory Domains and Trusts is the correct answer because it is the administrative tool specifically designed to manage and modify domain and trust relationships within an Active Directory environment. This tool allows administrators to view and change information related to domains, such as creating or deleting domains, managing trust relationships between domains, and modifying domain-level settings. The other options, such as Active Directory Administrative Center, Active Directory Sites and Services, and Active Directory Users and Computers, are also administrative tools but they are used for different purposes within the Active Directory environment.
2.
A system administrator is trying to deetermine which file system to use for a server that will become a Windows Server 2016 file server and domain controller. The company has the following requirements:
1. The file system must allow for file-level security from within Windows 2016 Server
2. The file system must make efficient use of space on large partitions
3. The domain controller Sysvol must be stored on the partition.
Which of the following file systems meets these requirements?
Correct Answer
D. NTFS
Explanation
NTFS is the correct answer because it meets all the given requirements. NTFS allows for file-level security from within Windows Server 2016, making it suitable for a file server and domain controller. It also efficiently uses space on large partitions, which is important for storing files. Additionally, NTFS supports the storage of the domain controller Sysvol on the partition, fulfilling the third requirement.
3.
You have one Active Directory forest in your organization that contains one domain named chancesare.com. You have two domain controllers configured with the DNS role installed. There are two Active Directory Integrated zones named chancesare.com and chancesareAD.com. One of your IT members (who is not an administrator) needs to be able to modify the chancesare.com DNS server, but you need to prevent this user from modifying the chancesare.com SOA record. How do you accomplish this?
Correct Answer
A. Modify the permissions of the chancesare.com zone from the DNS Manager snap-in
Explanation
To accomplish this, you would need to modify the permissions of the chancesare.com zone from the DNS Manager snap-in. By doing so, you can grant the IT member the necessary permissions to modify the DNS server for chancesare.com, while specifically preventing them from modifying the chancesare.com SOA record. This allows for granular control over the user's access and ensures that they cannot make changes to the specific record that you want to restrict.
4.
What is the maximum number of domains that a Window Server 2016 computer configured as a domain controller may participate in at one time?
Correct Answer
B. One
Explanation
A Windows Server 2016 computer configured as a domain controller can participate in only one domain at a time. This means that it can only be a part of a single domain and cannot simultaneously be a domain controller for multiple domains. This limitation ensures that the domain controller's resources and functionality are focused on serving a single domain efficiently.
5.
Windows Serever 2016 requires the use of which of the following protocol or service in order to support Active Directory?
Correct Answer
C. TCP/IP
Explanation
Windows Server 2016 requires the use of TCP/IP protocol in order to support Active Directory. TCP/IP is the standard communication protocol used in computer networks and is essential for the functioning of Active Directory, which is a directory service that stores information about network resources and enables centralized management of network resources in a Windows domain. DHCP and NETBEUI are not specifically required for supporting Active Directory, although they may be used in conjunction with TCP/IP for network configuration and communication. Therefore, the correct answer is TCP/IP.
6.
The ntdsutil commands are all case insensitive and mixed cases can be used in the table to make them easier to read
Correct Answer
A. True
Explanation
The statement is true. The ntdsutil commands are indeed case insensitive, meaning that the commands can be written in any combination of uppercase and lowercase letters. This allows users to use mixed cases in the table, making the commands easier to read and understand.
7.
You have a server named Server1. A Microsoft Azure Backup of Server1 is created automatically every day. You rename Server1 to Server2. Then you discover that backups are no longer being created in Azure. What should you do if you need to back up the server to Azure?
Correct Answer
B. On Server2, run the Start OBRegistration cmdlet
8.
For security reasons, you have decided that you must convert the system partition on your removable drive from the FAT32 file system to NTFS. Which of the following steps must you make in order to convert the file system?
Correct Answer(s)
A. Run the command CONVERT /FS :NTFS from the command prompt
D. Reboot the computer
Explanation
To convert the system partition on the removable drive from the FAT32 file system to NTFS, you need to run the command CONVERT /FS :NTFS from the command prompt. This command will initiate the conversion process and change the file system to NTFS. After running the command, you also need to reboot the computer for the changes to take effect.
9.
Your network contains a single Active Directory domain. The domain contains five Windows Server 2008 R2 domain controllers. You plan to install a new Windows Server 2016 domain controller. Which action would you need to perform?
Correct Answer
B. Run adprep.exe /forestprep at the command line
Explanation
To introduce a new Windows Server 2016 domain controller into an existing Active Directory domain, you would need to run adprep.exe /forestprep at the command line. This command prepares the forest for the introduction of a newer version of Windows Server by updating the schema and making necessary changes to support the new domain controller. Running this command ensures that the new domain controller can function properly and integrate seamlessly into the existing domain.
10.
You are promoting a Windows Server 2016 computer to an Active Directory domain controller for test purposes. The new domain controller will be added to an existing domain. While you are using the Active Directory Installation Wizard, you receive an error message that prevents the server from being promoted. Which of the following might be the cause of the problem?
Correct Answer
C. The TCP/IP configuration on the new server is incorrect
Explanation
The TCP/IP configuration on the new server being incorrect can cause an error message during the promotion of a Windows Server 2016 computer to an Active Directory domain controller. This is because the TCP/IP configuration is essential for the server to communicate with other devices on the network, including the existing domain controllers. If the configuration is incorrect or has conflicting settings, it can prevent the server from being promoted successfully.
11.
Windows Server 2016 requires the use of which of the following protocol or service in order to support Active Directory?
Correct Answer
B. DNS
Explanation
Windows Server 2016 requires the use of DNS (Domain Name System) in order to support Active Directory. DNS is responsible for translating domain names into IP addresses, allowing clients to locate and communicate with domain controllers. By using DNS, Active Directory can maintain a hierarchical structure of domains and provide services such as domain name resolution, authentication, and directory services. DHCP (Dynamic Host Configuration Protocol) is used for automatically assigning IP addresses to clients, while IPS/SPX (Internet Protocol Suite/Sequenced Packet Exchange) is an outdated protocol not used in modern Windows Server environments.
12.
You are the system administrator of a large organization that has recently implemented Windows Server 2016. You have a few remote sites that do not have very tight security. You have decided to implement read-only domain controllers (RODCs). What forest and function levels does the network need for you to do the install?
Correct Answer
D. All of the above
Explanation
The network needs to have all of the above forest and function levels in order to install read-only domain controllers (RODCs) in the remote sites. This is because RODCs require a minimum forest functional level of Windows Server 2008 R2 and a minimum domain functional level of Windows Server 2008. Since Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 all meet these requirements, all of the above options are correct.
13.
If only one or a few clients are unable to see a server on the network, the problem is most likely related to the client-side configuration. To fix this make sure that the client computers have the appropriate TCP/IP configuration (including DNS server settings and that they can see other computers on the network.
Correct Answer
A. True
Explanation
If only a few clients are unable to see a server on the network, it suggests that the server is functioning properly and other clients can access it. Therefore, the problem is likely with the configuration of the specific clients. To resolve this, it is recommended to check the TCP/IP configuration of the client computers, including the DNS server settings. Additionally, confirming that the clients can see other computers on the network can help identify any network connectivity issues. Therefore, the statement "True" accurately reflects the explanation provided.
14.
Your network contains a single Active Directory domain. The domain contains five Windows Server 2008 R2 domain controllers. You plan to install a new Windows Server 2016 domain controller. Which action would you need to perform?
Correct Answer
B. Run adprep.exe /domain prep at the command line
Explanation
To introduce a new Windows Server 2016 domain controller into an existing Active Directory domain, you would need to run "adprep.exe /domain prep" at the command line. This command prepares the domain for the introduction of the new domain controller by updating the schema and making necessary changes to the Active Directory infrastructure. It ensures that the domain is compatible with the new server version and allows for a smooth installation and integration of the new domain controller.
15.
You have a Windows Server 2016 server named Server1. You plan to use Windows Server Backup to back up all of the data on this server. You create a new volume and you need to ensure that the new volume can be used as a backup target. The backup target must support incremental backups. Solution: Assign a drive letter to the volume and format the volume by using ReFS. Does this meet the goal?
Correct Answer
B. No
Explanation
Assigning a drive letter to the volume and formatting it using ReFS does not meet the goal of ensuring that the new volume can be used as a backup target that supports incremental backups. Windows Server Backup does not support backing up to volumes formatted with ReFS. Therefore, this solution does not meet the goal.
16.
You are promoting a Windows Server 2016 computer to an Active Directory domain controller for test purposes. The new domain controller will be added to an existing domain. While you are using the Active Directory Installation Wizard, you receive an error message that prevents the server from being promoted. Which of the following might be the cause of the problem?
Correct Answer
A. The system does not contain an NTFS partition on whicch the Sysvol directory can be created
Explanation
The reason for the error message preventing the server from being promoted could be that the system does not have an NTFS partition on which the Sysvol directory can be created. The Sysvol directory is a critical component of Active Directory, and it needs to be on an NTFS partition for security and compatibility reasons. Without this partition, the server cannot be promoted to an Active Directory domain controller.
17.
You are the network administrator for a large company that creates widgets. Management asks you to implement a new Windows Server 2016 system. You need to implement federated identify management. Which of the following will help you do this?
Correct Answer
A. Active Directory Federation Services
Explanation
Active Directory Federation Services (AD FS) is the correct answer for implementing federated identity management in a Windows Server 2016 system. AD FS is a service provided by Microsoft that allows organizations to securely authenticate users across different systems and applications. It enables single sign-on capabilities and allows users to access resources in different domains or organizations using their existing credentials. AD FS helps establish trust relationships between organizations and enables the sharing of user identity information, making it an essential component for implementing federated identity management.
18.
You are the system administrator responsible for your company's infrastructure. You think you have an issue with name resolution, and you need to verify that you are using the correct hostname. You want to test DNS on the local system and need to see wheter the host name server-1 resolves to the IP address 10.1.1.1. Which of the following actions provides a solution to the problem?
Correct Answer
B. Add the mapping for the hostname server -1 to the IP address 10.1.1.1. in the local system's HOSTS file
Explanation
Adding the mapping for the hostname server-1 to the IP address 10.1.1.1 in the local system's HOSTS file provides a solution to the problem. The HOSTS file is a local file on the system that can be used to manually map hostnames to IP addresses. By adding the mapping for server-1 to 10.1.1.1 in the HOSTS file, the system will be able to resolve the hostname to the correct IP address without relying on DNS. This allows for testing the name resolution and verifying if the correct hostname is being used.
19.
If you want to change an existing partition from one file system to another, what command-line utility should you use?
Correct Answer
B. CONVERT
Explanation
To change an existing partition from one file system to another, the correct command-line utility to use is CONVERT. This utility allows for the conversion of a partition from one file system to another without losing any data. It is a useful tool for migrating from one file system to another, such as converting from FAT32 to NTFS or vice versa.
20.
The Windows Server 2016 platform supports the following file system:
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because the Windows Server 2016 platform supports all three file systems mentioned: FAT32, ReFS, and NTFS. This means that users have the flexibility to choose the file system that best suits their needs, whether it be for compatibility, resilience, or performance.
21.
Where are you most likely to see a Read-Only Domain Controller (RODC)?
Correct Answer
C. In a remote site
Explanation
A Read-Only Domain Controller (RODC) is typically deployed in a remote site. This is because remote sites often have limited physical security and unreliable network connections. By placing an RODC in a remote site, organizations can enhance security by limiting the exposure of sensitive information and credentials. The RODC stores a read-only copy of the Active Directory database, providing authentication and authorization services locally, without the risk of unauthorized modifications. This allows for better performance and reduces the dependency on the central domain controller, making it an ideal solution for remote locations.
22.
If you want to view the TCP/IP settings on a computer, What command line utility should you use?
Correct Answer
C. Ipconfig/all
Explanation
To view the TCP/IP settings on a computer, the correct command line utility to use is "ipconfig/all". This command displays detailed information about the TCP/IP configuration, including the IP address, subnet mask, default gateway, DNS servers, and other network settings. It is a commonly used utility for troubleshooting network connectivity issues and obtaining network configuration information.
23.
Network Discovery is turned on by default
Correct Answer
B. False
Explanation
Network Discovery is not turned on by default. By default, Network Discovery is turned off in most operating systems for security reasons. This means that devices on the network cannot automatically discover and connect to each other. Users have to manually enable Network Discovery if they want devices to be able to discover and communicate with each other on the network.
24.
Active Directory can be installed by using "Add/Remove Programs" in Control Panel
Correct Answer
B. False
Explanation
Active Directory cannot be installed using "Add/Remove Programs" in Control Panel. Active Directory is a Windows Server feature and can only be installed on a Windows Server operating system. It is typically installed through the Server Manager or by using PowerShell commands. "Add/Remove Programs" in Control Panel is used to uninstall or modify software applications installed on a computer, but it does not have the capability to install Active Directory.
25.
You are the administrator of an organization with a single Active Directory domain. A user who left the company returns after 90 days. The user tries to log on to their old computer and receives an error stating that authentication has failed. The user's account has been enabled. You need to ensure that the user is able to log on to the domain using that computer.
What do you do?
Correct Answer
A. Reset the computer account in Account Directory. Disjoin the computer from the domain, and then rejoin the computer to the domain
26.
You are the administrator of an organization with a single Active Directory domain. One of your senior executives tries to log on to a machine and receives the error. "This user account has expired. Ask your administrator to reactivate your account." You need to make sure that this doesn't happen again to this user.
What do you do?
Correct Answer
C. Modify the user's properties to set the Account Never Expires setting
Explanation
By modifying the user's properties to set the Account Never Expires setting, the administrator ensures that the user's account will not expire in the future. This will prevent the user from receiving the error message and needing to reactivate their account.
27.
You need to create a new user account using the command prompt. Which command would you use?
Correct Answer
D. Dsadd
Explanation
The correct command to create a new user account using the command prompt is "dsadd". This command is used in Windows operating systems to add objects to the Active Directory, including user accounts. The "dsmodify" command is used to modify existing objects, not create new ones. "dscreate" and "dsnew" are not valid commands.
28.
You are a domain administrator for a large domain. Recently, you have been asked to make changes to some of the permissions related to OUs within the domain. To restrict security for NJ OU further, you remove some permissions at that level. Later, a junior system administrator mentions that she is no longer able to make changes to objects within the Clifton OU (which is located within the NJ OU)
Assuming that no other changes have been made to Active Directory permissions, which of the following characteristics of OUs might have cause the change in permissions?
Correct Answer
A. Inheritance
Explanation
Inheritance is the process by which permissions assigned to a parent object are automatically passed down to its child objects. By removing some permissions at the NJ OU level, it is likely that the inheritance of permissions from the parent OU to the Clifton OU has been affected. As a result, the junior system administrator is no longer able to make changes to objects within the Clifton OU.
29.
You are a consultant hired to evaluate an organization's Active Directory domain. The domain contains more than 325,000 objects and hundreds of OUs. You begin examining the objects within the domain, but you find that the loading of the contents of specific OUs takes a long time. Furthermore, the list of objects can be large. You want to do the following:
1. Use the built-in Active Directory administrative tools and avoid the use of third party tools or utilities
2. Limit the list of objects within an OU to only the type of objects that you're examining (for example, only Computer objects)
3. Prevent any changes to the Active Directory domain or any of the objects within it
Correct Answer
B. Use the Delegation of Control Wizard to give yourself permissions over only a certain type of object
30.
You are the administrator of a small organization with four servers. You have one file server named FServerA that runs Windows Server 2016. You have a junior administrator who needs to do backups on this server. You need to ensure that the junior admin can use Windows Server Backup to create a complete backup of FServerA.
What should you configure to allow the junior admin to do the backup?
Correct Answer
A. The local groups by using Computer Management
Explanation
To allow the junior admin to do the backup, you should configure the local groups by using Computer Management. By adding the junior admin to the appropriate local group on the file server (FServerA), such as the Backup Operators group, you grant them the necessary permissions to perform backups using Windows Server Backup. Computer Management is a built-in Windows tool that allows you to manage local users and groups on a computer. By configuring the local groups, you can control the permissions and access rights for different users and groups on the server.
31.
You are the supervisor of a junior level system administrator that has a basic knowledge about working with Active Directory. You have asked him to make several security-related changes to OUs within the company's Active Directory domain. You instruct him to use the basic functionality provided in the Delegation of Control Wizard.
A) Reset passwords on user accounts
B) Manage Group Policy links
C) Modify the membership of a group
D) Create, delete, and manage groups
Correct Answer
C. A, B, C, D
Explanation
The correct answer is A, B, C, D. The Delegation of Control Wizard allows the junior level system administrator to make several security-related changes to OUs within the company's Active Directory domain. This includes resetting passwords on user accounts (A), managing Group Policy links (B), modifying the membership of a group (C), and creating, deleting, and managing groups (D). By using the Delegation of Control Wizard, the system administrator can efficiently and securely perform these tasks within the Active Directory domain.
32.
You are the primary system administrator for a large Active Directory domain. Recently, you have hired another system administrator upon whom you intend to offload some of your responsibilities. The system administrator will be responsible for handling help desk calls and to basic user account management. You want to allow the new employee to have permissions to reset passwords for all users within a specific OU. However, for security reasons, it's important that the user not be able to make permissions changes for objects within other OUs in the domain.
Which of the following is the best way to do this?
Correct Answer
D. Use the Delegation of Control Wizard to assign the necessary permissions on the OU that the new employee is to administer
Explanation
Using the Delegation of Control Wizard to assign the necessary permissions on the specific OU is the best way to allow the new employee to reset passwords for all users within that OU without giving them permissions to make changes in other OUs. This method allows for granular control over permissions and ensures that the new employee only has the necessary access to perform their assigned tasks. It also helps maintain security by limiting their permissions to a specific scope within the Active Directory domain.
33.
You are a system administrator that created a new Active Directory domain in an environment that already contains two trees. During the promotion of the domain controller, you chose to create a new Active Directory forest. You are a member of the Enterprise Administrators group and have full permissions over all domains. During the organization's migration to Active Directory, many updates were made to the information stored within the domains. Recently, users and other system administrators have complained about not being able to find specific Active Directory objects in one or more domains (although the objects exist in others)
To investigate the problem, you want to check for any objects that have not been properly replicated among domain controllers. If possible, you would like to restore these objects to their proper place within the relevant Active Directory domains.
Which of the following should you perform to be able to view the relevant information?
Correct Answer
D. Examine the contents of the LostAndFound folder using the Active Directory Users and Computers tool
Explanation
To be able to view the relevant information, you should examine the contents of the LostAndFound folder using the Active Directory Users and Computers tool. The LostAndFound folder is a special container in Active Directory that stores objects that have been deleted or moved but have not been properly replicated among domain controllers. By checking the contents of this folder, you can identify any objects that have not been replicated correctly and restore them to their proper place within the relevant Active Directory domains.
34.
William is a user who belongs to the Sales distribution global group. He is not able to access the laser printer that is shared on the network. The Sales global group has full access in the laser printer.
How do you fix the problem?
Correct Answer
A. Change the group type to a security group
Explanation
By changing the group type to a security group, it will grant the necessary permissions and access rights to the users in the Sales global group. This will ensure that William, as a member of the Sales group, will have the appropriate permissions to access the laser printer on the network.
35.
You need to deactivate the UGMC option on some of your domain controllers. At which level in Active Directory would you deactivate UGMC?
Correct Answer
B. Site
Explanation
To deactivate the UGMC (Universal Group Membership Caching) option on some domain controllers, you would do it at the Site level in Active Directory. The Site level is a logical grouping of domain controllers that are in close physical proximity to each other. By deactivating UGMC at the Site level, you ensure that the caching of universal group memberships is disabled for the domain controllers within that specific site, while still allowing it to be active for other domain controllers in different sites.
36.
You work for an organization with a single domain forest. Your company has one main locations and two branch locations. All locations are configured as Active Directory sites, and all sites are connected with the DEFAULtIPSITELINK object. Your connectionsare running slower than company policy allows. You want to decrease the replication latency between all domain controllers in the various sites.
What should you do?
Correct Answer
A. Decrease the replication interval for the DEFAULTIPSITELINK object
Explanation
By decreasing the replication interval for the DEFAULTIPSITELINK object, the replication process between all domain controllers in the various sites will occur more frequently, resulting in a decrease in replication latency. This will help to ensure that the data is replicated more quickly and efficiently across all sites, aligning with the goal of reducing replication latency.
37.
You need to enable three of your domain controllers as global catalog servers. Where would you configure the domain controllers in global catalogs?
Correct Answer
D. Server, NTDS settings
Explanation
To enable a domain controller as a global catalog server, you would configure it in the "Server, NTDS settings" option. The global catalog contains a partial replica of all objects in the forest, which allows for efficient searching and locating of objects in a multi-domain environment. By enabling a domain controller as a global catalog server, it can respond to global catalog queries and provide information about objects in other domains within the forest. This configuration can be done through the NTDS settings of the specific domain controller.
38.
You are responsible for managing Active Directory replication traffic for a medium-sized organization that has deployed a single Active Directory domain. Currently, the environment is configured with two sites and the default settings for replication. Each site consists of 15 domain controllers. Recently, network administrators have complained that Active Directory traffic is using a large amount of available network bandwidth between the two sites.
You have been asked to meet the following requirements:
1. Reduce the amount of network traffic between domain controllers in the two sites
2. Minimize the amount of change to the current site topology
3. Require no changes to the existing physical network infrastructure
You decide that it would be most efficient to configure specific domain controllers in each site that will receive the majority of replication traffic, from the other site. Which of the following solutions meet the requirements?
Correct Answer
D. Configure one server at each site to act as a preferred bridgehead server
Explanation
Configuring one server at each site to act as a preferred bridgehead server meets the requirements. This solution reduces network traffic by directing replication traffic to specific domain controllers, minimizing the impact on available network bandwidth. It also requires minimal changes to the current site topology and does not require any changes to the existing physical network infrastructure. This solution effectively addresses all the given requirements.
39.
Which of the following does not need to be created manually when you are setting up a replication scenario involving three domains and three sites?
Correct Answer
C. Connect objects
Explanation
In a replication scenario involving three domains and three sites, connect objects do not need to be created manually. Connect objects are automatically created when you set up site links between the sites. These connect objects represent the physical connections between the sites and facilitate the replication process. Therefore, there is no need to manually create connect objects when setting up this replication scenario.
40.
Which of the following services of Active Directory is responsible for maintaining the replication topology?
Correct Answer
B. KCC - Knowldedge Consistency Checker
Explanation
The Knowledge Consistency Checker (KCC) is responsible for maintaining the replication topology in Active Directory. The KCC is a built-in process that runs on domain controllers and automatically creates and manages the replication connections between domain controllers. It determines the most efficient replication paths and ensures that changes made on one domain controller are replicated to all other domain controllers in the network. The KCC also monitors the replication process and adjusts the topology as needed to ensure consistency and reliability in the Active Directory environment.
41.
A system administrator for an Active Directory environment that consists of three sites wants to configure site links to the transitive. Which of the following Active Directory objects are responsible for representing a transitive relationship between sites?
Correct Answer
D. Site link bridges
Explanation
Site link bridges are responsible for representing a transitive relationship between sites in an Active Directory environment. Site link bridges are used to connect site links and enable transitivity, allowing the replication of Active Directory information between sites. By configuring site link bridges, the system administrator can ensure that changes made in one site are replicated to other sites in a transitive manner, ensuring efficient and consistent replication across the Active Directory environment.
42.
You have configured your Active Directory environment with multiple sites and have placed the appropriate resources in each of the sites. You are now trying to choose a protocol for the transfer of replication information between two sites. The connection between the two sites has the following characteristics:
1. The link is generally unavailable during certain parts of the day because of an unreliable network provider
2. The replication transmission must be attempted whether the link is available or not. If the link was unavailable during a scheduled replication, the information should automatically be received after the link becomes available again.
3. Replication traffic must be able to travel over a standard Internet connection
Which of the following protocols meets these requirements?
Correct Answer
B. SMTP
Explanation
SMTP (Simple Mail Transfer Protocol) meets the requirements because it allows replication information to be transferred over a standard Internet connection. It also supports automatic retransmission of information if the link is unavailable during a scheduled replication. Additionally, SMTP is a reliable protocol that can handle intermittent network connectivity, making it suitable for an environment with an unreliable network provider.
43.
A system administrator suspects that there is an error in the replication configuration. How can the system administrator look for specific error messages related to replication?
Correct Answer
D. By going to Event Viewer > Directory Service Log
Explanation
The system administrator can look for specific error messages related to replication by going to the Event Viewer and selecting the Directory Service Log. The Directory Service Log contains detailed information about the Active Directory service, including replication events and any related error messages. By reviewing this log, the system administrator can identify any replication configuration errors and take appropriate actions to resolve them.
44.
You are responsible for managing Active Directory replication traffic for a medium sized organization. Currently, the environment is configured with a single site and the default settings for replication. The site contains more than 50 domain controllers, and the system administrators are often making changes to the Active Directory database. Recently, network administrators have complained that Active Directory traffic is consuming a large amount of network bandwidth between portions complained about slow network performance during certain hours of the day. You have been asked to alleviate the problem while meeting the following requirements:
1. Be able to control exactly when replication occurs
2. Be able to base Active Directory replication on the physical network infrastructure
3. Perform the changes without creating or removing any domain controllers
Which two of the following steps can you take to meet these requirements?
A) Create and define connection objects that specify the hours during which replication will occur
B) Create multiple site links
C) Create a site link bridge
D) Create new Active Directory sites that reflect the physical network topology
E) Configure one server at each of the new sites to act as a bridgehead server
Correct Answer
A. A, D
Explanation
To meet the requirements, the following steps can be taken:
A) Create and define connection objects that specify the hours during which replication will occur: This step allows the administrator to control exactly when replication occurs by specifying the hours during which replication will take place. This helps in reducing the network bandwidth consumption during peak hours.
D) Create new Active Directory sites that reflect the physical network topology: By creating new Active Directory sites that reflect the physical network topology, the administrator can base the Active Directory replication on the physical network infrastructure. This ensures that replication traffic flows efficiently across the network, reducing the impact on network performance.
These two steps help in addressing the network bandwidth consumption issue and meet the specified requirements without creating or removing any domain controllers.
45.
When you are setting up a network, you should always keep in mind that 90 percent of all hacks on a network is internal. Does this mean internal permissions and security (as well as external security) need to be as strong as possible while still allowing users to do their jobs?
Correct Answer
A. True
Explanation
When setting up a network, it is important to remember that 90 percent of all hacks occur internally. This means that internal permissions and security should be as strong as possible while still allowing users to perform their tasks. By ensuring strong internal security measures, such as user authentication, access controls, and monitoring systems, the risk of internal hacks can be minimized. This answer emphasizes the importance of balancing security with usability in order to protect the network from internal threats.
46.
By default, when moving OUs, it will never inherit the permissions of their new parent container?
Correct Answer
B. False
Explanation
When moving OUs (Organizational Units), they will inherit the permissions of their new parent container by default. This means that any permissions set on the parent container will be inherited by the OUs that are moved into it. Therefore, the correct answer is False.
47.
One of the advantages of Distributed File System Replication (DFSR) is that it is self-healing, and can automatically recover from USN journal ways, USN journal loss, or loss of the DFS Replication database.
Correct Answer
A. True
Explanation
DFSR is a technology in Windows Server that allows files to be replicated between multiple servers in a distributed file system. One of its advantages is its self-healing capability, which means that it can automatically recover from issues such as USN journal ways, USN journal loss, or loss of the DFS Replication database. This feature ensures that the file system remains functional and data integrity is maintained even in the event of failures or data corruption. Therefore, the given statement is true.
48.
Does intersite replication refer to the synchronization of Active Directory information between domain controllers that are located in the same site?
Correct Answer
A. True
Explanation
Intersite replication does not refer to the synchronization of Active Directory information between domain controllers that are located in the same site. Instead, it refers to the synchronization of Active Directory information between domain controllers that are located in different sites. Therefore, the correct answer is True.
49.
Microsoft highly recommend that you have at least __________ domain controllers in each domain of your Active Directory environment?
Correct Answer
B. Two
Explanation
Microsoft highly recommends that you have at least two domain controllers in each domain of your Active Directory environment. This is because having multiple domain controllers provides redundancy and fault tolerance. If one domain controller fails, the other can continue to provide authentication and directory services. Additionally, having multiple domain controllers allows for better load distribution and improved performance.