1.
After promoting server 2012 to domain controller, where is the ntds folder located?
Correct Answer
C. In windows folder on c drive
Explanation
After promoting server 2012 to a domain controller, the ntds folder is located in the Windows folder on the C drive. This is because the ntds folder contains the Active Directory database and log files, which are essential components of the domain controller. Storing them in the Windows folder on the C drive ensures that they are easily accessible and properly integrated with the operating system.
2.
Which operation master roles (fsmo) must be located in the forest?
Correct Answer
C. Schema master , domain naming master
Explanation
The correct answer is schema master and domain naming master. These two operation master roles (FSMO) must be located in the forest. The schema master is responsible for managing and making changes to the Active Directory schema, which defines the structure and attributes of objects in the directory. The domain naming master is responsible for managing the addition and removal of domains in the forest. Both of these roles are critical for maintaining the integrity and functionality of the Active Directory forest.
3.
Which of the following microsoft operation systems (editions) include a license that allows you to create a unlimited number of virtual instances?
Correct Answer
D. Datacenter edition
Explanation
The Datacenter edition of Microsoft operating systems includes a license that allows users to create an unlimited number of virtual instances. This means that organizations using the Datacenter edition can run multiple virtual machines on a single physical server without having to purchase additional licenses. This edition is typically used by large enterprises or data centers that require a high level of virtualization and scalability.
4.
Why do we use reley agent for dhcp scenarios?
Correct Answer
C. Helps dhcp lease addresess to client out of the lan to another network
Explanation
The relay agent is used in DHCP scenarios to help lease addresses to clients outside of the local area network (LAN) and to another network. It acts as an intermediary between the DHCP server and the client, forwarding DHCP messages between them. This is necessary when the client is located in a different network segment or subnet than the DHCP server. The relay agent ensures that the client's DHCP request reaches the server and that the server's response is properly routed back to the client.
5.
The minimum requirments for installment of server 2012 are 1024 mb of ram
Correct Answer
B. False
Explanation
The minimum requirements for the installation of Server 2012 are not 1024 MB of RAM. Therefore, the statement "the minimum requirements for the installment of server 2012 are 1024 MB of RAM" is false.
6.
You have a child organizational unit created in a parent ou.the restrictions on the parant ou are identical for the child ou.what can be the reason for this?
Correct Answer
D. Inheritance mode is enabled on child ou
Explanation
The reason for the restrictions on the parent OU being identical for the child OU is that inheritance mode is enabled on the child OU. This means that any restrictions or settings applied to the parent OU will automatically be inherited by the child OU. Therefore, the child OU will have the same restrictions as the parent OU.
7.
A folder has been created and shared.it was modified on permissions pane to full control for everyone.on the same folder, ntfs permissions where modified to read only for everyone.what will be applied to the folder for any user ?
Correct Answer
A. Read only permissions
Explanation
The folder will have read-only permissions for any user. This is because NTFS permissions take precedence over shared permissions. Even though the shared permissions were modified to full control for everyone, the NTFS permissions were modified to read-only for everyone, causing the folder to have read-only permissions for all users. There will not be a conflict between the permissions as the NTFS permissions will be applied.
8.
Which is the primary method for transmiting ipv6 traffic over ipv4 network?
Correct Answer
C. Tunneling
Explanation
Tunneling is the primary method for transmitting IPv6 traffic over an IPv4 network. Tunneling allows IPv6 packets to be encapsulated within IPv4 packets, enabling them to traverse an IPv4 network. This is necessary because IPv4 and IPv6 are not directly compatible, and tunneling provides a solution for transmitting IPv6 traffic over an IPv4 infrastructure.
9.
Which of the following are not elements of dns
Correct Answer
C. Reservations
Explanation
The correct answer is "reservations". Reservations are not elements of DNS. DNS, which stands for Domain Name System, is responsible for translating domain names into IP addresses. Zones, root hints, and conditional forwarders are all components of DNS. Zones are used to define administrative boundaries for a portion of the DNS namespace. Root hints are a list of IP addresses for root DNS servers. Conditional forwarders are used to forward specific DNS queries to specific DNS servers. However, reservations are not a part of DNS and are typically associated with DHCP (Dynamic Host Configuration Protocol) to assign specific IP addresses to specific devices on a network.
10.
Computer 1 has a group policy object that restricts users from using internet services.you log on to computer 1 with a user account which does not have the gpo restriction applied.you open internet explorer - what will happen?
Correct Answer
C. You will not be able to browse the internet
Explanation
The group policy object on computer 1 restricts users from using internet services. Even though you log on with a user account that does not have the GPO restriction applied, the restriction will still be in effect. Therefore, you will not be able to browse the internet. However, if you log on with a different user account that has an administrator privilege, you may be able to bypass the GPO restriction and browse the internet.
11.
How many layers does the tcp/ip protocol suite have?
Correct Answer
B. 4
Explanation
The TCP/IP protocol suite consists of four layers: the Network Interface layer, the Internet layer, the Transport layer, and the Application layer. Each layer has its own specific functions and protocols to ensure the successful transmission of data over a network. Therefore, the correct answer is 4.
12.
Which of the following ip`s is routable on the internet?
Correct Answer
D. 8.8.8.8
Explanation
The IP address 8.8.8.8 is routable on the internet because it belongs to the public IP address range. Public IP addresses are assigned to devices that are directly connected to the internet and can be accessed from anywhere on the network. In contrast, the IP addresses 10.0.0.1, 172.16.11.8, and 19.168.32.2 are all private IP addresses. Private IP addresses are used within local networks and cannot be accessed directly from the internet.
13.
What are the ipv6 host records in dns?
Correct Answer
D. Aaaa
Explanation
The correct answer is "aaaa". In DNS, the AAAA record is used to map an IPv6 address to a domain name. It is similar to the A record used for IPv4 addresses but specifically designed for IPv6. The AAAA record allows clients to resolve and connect to hosts using IPv6 addresses.
14.
What isn`t a function of shadow copies ?
Correct Answer
C. Backup your database
Explanation
Shadow copies, also known as Volume Shadow Copies or Previous Versions, are a feature in Windows that allows users to access previous versions of files. They are primarily used to recover deleted items and provide access to recent versions of files. However, shadow copies are not designed to backup databases. While they can take a snapshot of the file system at a specific point in time, this is not the same as backing up a database. Therefore, the correct answer is that shadow copies do not function as a backup solution for databases.
15.
How does ipv6 apipa address begining appear on screen?
Correct Answer
B. Fe80
Explanation
The correct answer is "fe80". This is because fe80 is the prefix for link-local addresses in IPv6. Link-local addresses are used for communication within a single network segment and are automatically assigned to devices when they don't have a globally unique address. Therefore, when an IPv6 link-local address is displayed on the screen, it typically starts with fe80.
16.
If you have a volume smaller then 2 TB you should create a gpt disk.
Correct Answer
B. False
Explanation
If you have a volume smaller than 2 TB, you do not need to create a GPT disk. GPT (GUID Partition Table) is a partitioning scheme that allows for larger disk sizes and more partitions compared to the older MBR (Master Boot Record) partitioning scheme. However, it is not necessary to use GPT for volumes smaller than 2 TB. Therefore, the correct answer is False.
17.
What statemant about RODC is not correct?
Correct Answer
D. Rodc does not have to replicate AD database from main office so there are no issues with network bandwidth
Explanation
The correct answer is that "RODC does not have to replicate AD database from main office so there are no issues with network bandwidth." This statement is not correct because RODC does replicate the AD database from the main office, but it does so in a controlled and optimized manner to minimize network bandwidth usage. RODC receives a read-only copy of the AD database, which helps secure the active directory information on branch offices while reducing the risk of exposing sensitive information. RODC can be installed as a secondary DC and not as a primary in a forest.
18.
What is a csv file?
Correct Answer
B. An excel file formated to a csv extention - in the form for scripting for bulk users creation list
Explanation
A CSV file is a type of file that is formatted as a comma-separated values file. It is commonly used to store tabular data, such as spreadsheets or databases, in a plain text format. This format allows the data to be easily imported and exported between different software applications. In the given answer, it correctly states that a CSV file is an Excel file formatted with a CSV extension. This means that the file can be opened and edited in Excel, but it follows the specific CSV formatting rules, making it suitable for scripting and creating bulk user lists.