1.
What port is used by Active Directory to direct search requests to a global catalog server?
Correct Answer
C. 3268
Explanation
When a user initiates a search for an object in Active Directory, the request is automatically sent to TCP port 3268, which is used by Active Directory to direct these requests to a global catalog server. One of the SRV records used by Active Directory refers to the global catalog, or _gc, service, which listens on port 3268 to respond to these requests.
2.
You must install the File Services role to use the Distributed File System.
Correct Answer
A. True
Explanation
To use the Distributed File System (DFS), it is necessary to install the File Services role. DFS is a feature in Windows Server that allows users to access and manage files across a network. By installing the File Services role, the server gains the capability to provide DFS functionalities such as file replication, load balancing, and fault tolerance. Therefore, the statement "You must install the File Services role to use the Distributed File System" is true.
3.
What role service of the Print Services
role installs the Print Management snap-in for MMC, which provides
centralized printer management for an entire enterprise network?
Correct Answer
C. Print Server
Explanation
The Print Services role includes the Print Server role service that installs the Print Management snap-in for MMC, providing centralized printer management for an entire enterprise network.
4.
What feature makes it possible to
configure a user as the local administrator of a specific RODC without
making the user a Domain Admins with far-reaching authority over all
domain controllers in your entire domain and full access to your Active
Directory domain data?
Correct Answer
B. Admin Role Separation
Explanation
Read-Only Domain Controllers also offer a feature that has been a top request of Active Directory administrators since the early days of Windows 2000: Admin Role Separation. This means that it is now possible to configure a user as the local administrator of a specific RODC without making the user a Domain Admins with far-reaching authority over all domain controllers in your entire domain and full access to your Active Directory domain data.
5.
Unlike virtual private network (VPN) or
direct dial-up connections, a Terminal Services connection uses
relatively little network bandwidth because the applications are
running on the server computer.
Correct Answer
A. True
6.
What is the maximum basic volume size in Windows Server 2008?
Correct Answer
C. 2 TB
Explanation
The maximum basic volume size in Windows Server 2008 is 2 terabytes.
7.
What standardized, highly portable print
job format is the default format used by the Windows 2000, Windows XP,
and Windows Server 2003 print subsystems?
Correct Answer
C. EMF
Explanation
Enhanced Metafile (EMF) is a standardized, highly portable print job format that is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems. The printer driver converts the application data into an EMF file, and the printer sends it to the print server, which stores it in the spooler. The spooler then uses the printer driver on the print server to render the job into the final PCL format understood by the print device.
8.
What is a partial copy of all objects from other domains within the same forest that is held on a global catalog server?
Correct Answer
A. Partial attribute set
Explanation
The global catalog holds a subset of forest-wide Active Directory objects and acts as a central repository by holding a complete copy of all objects from the host server’s local domain with a partial copy of all objects from other domains within the same forest, called the partial attribute set (PAS). This partial copy of forest-wide data includes a subset of each object’s attributes. The attributes included in this subset are necessary to provide functionality such as logon, object searches, and universal group memberships.
9.
The device driver that converts the
print jobs generated by applications into a string of commands for a
specific print device is called a __________.
Correct Answer
D. None of the above
Explanation
A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features.
10.
A __________ is an alphanumeric sequence
of characters that you enter with a username to access a server,
workstation, or shared resource.
Correct Answer
B. Password
Explanation
A password is an alphanumeric sequence of characters that you enter with a username to access a server, workstation, or shared resource. The primary function of a password is to protect a user’s authentication information, thus ensuring that no one can impersonate a particular user and thereby gain access to resources that the user has been authorized to view or edit.
11.
__________ groups are nonsecurity-related groups created for the distribution of information to one or more persons.
Correct Answer
C. Distribution
Explanation
Distribution Groups are nonsecurity-related groups created for the distribution of information to one or more persons.
12.
What advanced technique allows you to
apply GPO settings to only one or more users or groups within a
container by selectively granting the “Apply Group Policy” permission
to one or more users or security groups?
Correct Answer
C. Security group filtering
Explanation
An advanced technique, called security group filtering, will allow you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups.
13.
The ISTG automatically assigns one
server in each site as the bridgehead server unless you override this
by establishing a list of __________ bridgehead servers.
Correct Answer
B. Preferred
Explanation
The ISTG automatically assigns one server in each site as the bridgehead server unless you override this by establishing a list of preferred bridgehead servers. The advantage of administratively assigning a preferred bridgehead server list is that you can determine which servers have the best processing power for handling replication traffic.
14.
NTFS permissions are located on what tab of a file or folder’s properties?
Correct Answer
D. Security
Explanation
Share permissions are typically found on a Share Permissions tab, and NTFS permissions are located on a Security tab. All Windows permission systems use the same interface, although the permissions themselves differ.
15.
What device driver converts the print
jobs generated by applications into an appropriate string of commands
for a specific print device?
Correct Answer
A. Printer driver
Explanation
A printer driver is a device driver that converts the print jobs generated by applications into an appropriate string of commands for a specific print device. Printer drivers are designed for a specific print device and provide applications with access to all of the print device’s features.
16.
What command-line tool used for
monitoring Active Directory provides functionality that includes
performing connectivty and replication tests?
Correct Answer
A. Dcdiag
Explanation
Dcdiag is a command-line tool used for monitoring Active Directory. When run from a command prompt, this tool can perform connectivity and replication tests, report errors that occur, report DNS registration problems, analyze the permissions required for replication, and analyze the state of domain controllers within the forest.
17.
Web servers receiving large amounts of
traffic will not need higher-end network adapters or multiple adapters
to connect to different subnets.
Correct Answer
B. False
18.
A __________ is defined as one or more IP subnets that are connected by fast links.
Correct Answer
C. Site
Explanation
A site is defined as one or more IP subnets that are connected by fast links. In most circumstances, all computers that are connected via a single LAN will constitute a single site. Within Active Directory, sites are used to optimize the replication of Active Directory information across small or large geographic areas.
19.
Which functional level only allows Windows Server 2003 and Windows 2008 domain controllers?
Correct Answer
B. Windows Server 2003
Explanation
The Windows Server 2003 functional level allows Windows Server 2003 and Windows 2008 domain controllers only. It does not allow the presence of Windows 2000 domain controllers.
20.
Windows Server 2008 supports the UNIX and Linux file server clients with Server Message Blocks (SMB).
Correct Answer
B. False
21.
__________ name refers to each user’s login name.
Correct Answer
C. SAM account
Explanation
The SAM account name refers to each user’s login name—the portion to the left of the ‘@’ within a User Principal Name.
22.
Replication groups use which topology to limit the replication traffic to specific pairs of members?
Correct Answer
C. Hub/spoke topology
Explanation
By default, replication groups use a full mesh topology, which means that every member in a group replicates with every other member. This is a satisfactory solution for relatively small DFS deployments, but on larger installations, the full mesh topology can generate a huge amount of network traffic. In such cases, you might want to opt for a hub/spoke topology that enables you to limit the replication traffic to specific pairs of members.
23.
What command-line tool can be used with a standard user account to reduce the risks associated with the Administrator account?
Correct Answer
A. Runas
Explanation
The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and use the Run as administrator option in the GUI or the runas command-line tool when it is necessary to perform an administrative task.
24.
Active Directory uses __________
relationships to allow access between multiple domains and/or forests,
either within a single forest or across multiple enterprise networks.
Correct Answer
A. Trust
Explanation
Active Directory uses trust relationships to allow access between multiple domains and/or forests, either within a single forest or across multiple enterprise networks. As the name implies, a trust relationship allows administrators from a particular domain to grant access to their domain’s resources to users in other domains.
25.
Which console includes several predefined quota templates that can be used to create your own quota template?
Correct Answer
B. File Server Resource Manager
Explanation
The File Server Resource Manager console includes several predefined quota templates that you can use to create your own quota template.
26.
What command-line tool can be used to
manually create a replication topology if site link bridging is
disabled if the network is not fully routed?
Correct Answer
C. Repadmin
Explanation
Repadmin is a command-line tool used to manually create a replication topology if site link bridging is disabled if the network is not fully routed.
27.
Which FSMO role has the authority to
manage the creation and deletion of domains, domain trees, and
application data partitions in the forest?
Correct Answer
C. Domain Naming Master
Explanation
The Domain Naming Master role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest. When any of these is created, the Domain Naming Master ensures that the name assigned is unique to the forest.
28.
Windows Server 2008 computers must run which protocol service to send email messages?
Correct Answer
C. Simple Mail Transfer Protocol (SMTP)
Explanation
A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol (SMTP) service to be able to send email messages.
29.
__________ is the highest available forest functional level
Correct Answer
C. Windows Server 2008
Explanation
The Windows Server 2008 functional level allows no backward compatibility. Only Windows Server 2008 domain controllers are supported.
30.
How many RID Masters can a domain have?
Correct Answer
A. 1
Explanation
Each domain can have only one RID Master.
31.
What directory object includes subcontainers that hold GPO policy information?
Correct Answer
C. Group Policy container
Explanation
The content of each nonlocal GPO is actually stored in two locations. One of these is the Group Policy container (GPC), an Active Directory object that stores the properties of the GPO.
32.
What dedicated workstation allows an
administrator or another authorized user to preconfigure certificates
and smart cards on behalf of a user or workstation?
Correct Answer
B. Smart card enrollment station
Explanation
Prior to deploying smart cards, you must set up at least one computer as a smart card enrollment station, which is a dedicated workstation that allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation.
33.
When deploying a server using a WDS installation, the client downloads a boot image that loads __________.
Correct Answer
C. Windows PE
Explanation
Instead of booting from a local drive, the computer in a PXE connects to a server on the network and downloads the boot files it needs to run. In the case of a WDS installation, the client downloads a boot image that loads Windows PE (Preinstallation Environment) 2.1, after which it installs the operating system using another image file.
34.
What processes can be used by Windows
Server 2008 DNS to clean up the DNS database after DNS records become
“stale” or out of date?
Correct Answer
B. Aging and scavenging
Explanation
Although not enabled by default, aging and scavenging are processes that can be used by Windows Server 2008 DNS to clean up the DNS database after DNS records become “stale” or out of date. Without this process, the DNS database would require manual maintenance to prevent server performance degradation and potential disk-space issues.
35.
What is the process of replicating DNS information from one DNS server to another?
Correct Answer
C. Zone transfer
Explanation
A zone transfer is the process of replicating DNS information from one DNS server to another.
36.
Password-cracking can be accomplished by
intelligent guessing on the part of the hacker or through the use of an
automated __________ attack
Correct Answer
B. Dictionary
Explanation
Password-cracking can be accomplished by intelligent guessing on the part of the hacker or through the use of an automated dictionary attack. Automated password-cracking tools will try every possible combination of characters until the correct sequence of characters is finally discovered.
37.
Network File System (NFS) places the bulk of the file-sharing process on the __________.
Correct Answer
D. Client
Explanation
In NFS, the bulk of the file-sharing process rests on the client. Compared with the Windows SMB file-sharing system, NFS servers are relatively simple and, in technical terms, dumb. NFS servers simply respond to file access requests from clients; they do not maintain any information about the client connections or the files that individual clients have open.
38.
What role provides developers with the
ability to store data for directory-enabled applications without
incurring the overhead of extending the Active Directory schema to
support their applications?
Correct Answer
D. AD LDS
Explanation
Windows Server 2008 includes a new Active Directory Lightweight Directory Services (AD LDS) role that provides developers with the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications.
39.
What lookup service maintains a list of
UNIX accounts by using their UID and GID values as well as their
equivalent Windows or Active Directory accounts?
Correct Answer
C. User Name Mapping
Explanation
The User Name Mapping service was the primary authentication mechanism in previous versions of Windows Services for NFS. It is essentially a lookup service that maintains a list of UNIX accounts by using their UID and GID values as well as their equivalent Windows or Active Directory accounts. The server component of User Name Mapping is not included in Windows Server 2008, but NFS Server still retains the client component that enables it to access an existing User Name Mapping server and perform account lookups.
40.
You cannot manually modify the group membership of or view the membership lists of __________ groups.
Correct Answer
C. Special identity
Explanation
You cannot manually modify the group membership of special identity groups, nor can you view their membership lists.
41.
A basic file server uses remotely attached storage, that is, a computer with hard drives stored inside it.
Correct Answer
B. False
42.
What is a mechanism that individual
users can employ to maintain access to their server files, even in the
event of a network service failure?
Correct Answer
D. Offline Files
Explanation
Offline Files, while technically not a form of fault tolerance, is a mechanism that individual users can employ to maintain access to their server files, even in the event of a network service failure. Windows workstations copy server-based folders that users designate for offline use to the local drive, and the users work with the copies, which remain accessible whether the computer is connected to the network or not. If the network connection fails or the user undocks a portable computer, access to the offline files continues uninterrupted. When the computer reconnects to the network, a synchronization procedure occurs that replicates the files between server and workstation in whichever direction is necessary.
43.
What role does Windows Server 2008 include that enables users to send faxes from and receive them to their desktops?
Correct Answer
C. Fax Server
Explanation
By installing the Fax Server role, you enable a Windows Server 2008 computer to send and receive faxes for clients. Clients send faxes using a standard printer interface, which connects to a fax server on the network as easily as connecting to a local fax modem.
44.
What component issues and manages certificates for individuals, computers, and organizations?
Correct Answer
D. Certification Authority
Explanation
The CA issues and manages certificates for individuals, computers, and organizations. Multiple CAs can be linked to form a public key infrastructure.
45.
Aging is the process of removing records
that were not refreshed or updated within specified time intervals,
which will occur naturally with machines that are removed from the
network.
Correct Answer
B. False
46.
Windows Server 2008 supports numerous physical interfaces except for which interface?
Correct Answer
C. VGA
Explanation
Windows Server 2008 supports numerous physical interfaces, including Universal Serial bus (USB), IEEE 1394 (FireWire), parallel (LPT), serial (COM), Infrared Data Access (IrDA), Bluetooth ports, and network printing services such as lpr, Internet Printing Protocol (IPP), and standard TCP/IP ports.
47.
What allows the Group Policy processing
order to circle back and reapply the computer policies after all user
policies and logon scripts run?
Correct Answer
C. Loopback Processing
Explanation
Loopback processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace.
48.
If the domains within a forest are
separated by slow WAN links and the tree-walking process takes an
exceedingly long time to allow user authentication across domains, you
can configure a __________ trust.
Correct Answer
C. Shortcut
Explanation
If the domains within a forest are separated by slow WAN links and this tree-walking process takes an exceedingly long time to allow user authentication across domains, you can configure a shortcut trust along a commonly used “trust path.”
49.
__________ groups are a collection of user accounts that are local to one specific workstation or member server.
Correct Answer
B. Local
Explanation
A local group is a collection of user accounts that are local to one specific workstation or member server.
50.
All default groups are __________ groups.
Correct Answer
D. Security
Explanation
All default groups are security groups. Active Directory does not include any default distribution groups.