1.
By default, user account names are case sensitive
Correct Answer
B. False
Explanation
User account names are not case sensitive by default. This means that the system does not differentiate between uppercase and lowercase letters when it comes to user account names. For example, "johnsmith" and "JohnSmith" would be considered the same account name.
2.
The ability to force a user to be disconnected after logon hours expire is a group policy setting.
Correct Answer
A. True
Explanation
The statement is true because group policy settings can be used to control various aspects of user behavior and permissions within a Windows domain. One such setting is the ability to force a user to be disconnected after their logon hours expire. This can be useful for enforcing security measures and ensuring that users adhere to predetermined access restrictions. By enabling this setting, administrators can automatically disconnect users once their allotted logon hours have expired, preventing unauthorized access outside of specified timeframes.
3.
Members of the Backup Operators group can log on locally to and shut down domain controllers.
Correct Answer
A. True
Explanation
Members of the Backup Operators group have the necessary privileges to log on locally to domain controllers and perform tasks such as shutting them down. This group is specifically designed to allow users to perform backup and restore operations on the domain controller, which includes shutting it down if necessary. Therefore, the statement is true.
4.
In order to ensure no one uses public computer terminals after 5 pm, you’ve set the log on hours for the guest user accounts to deny log on after 5. However, you’ve noticed that users are still using the terminals after 5 pm, while other users are denied the ability to log in.Why are some users denied to log on, while other users are still using the terminals?
Correct Answer
B. The users were logged on prior to 5pm
5.
Select below a character that can be used in a user account name:
Correct Answer
A. !
Explanation
The exclamation mark (!) can be used in a user account name. It is a valid character that can be included in usernames for various systems and platforms.
6.
If the Unlock Account checkbox is selected under a user account’s Properties dialog box, what does this mean?
Correct Answer
C. The user has too many failed logon attempts and is locked out
Explanation
If the Unlock Account checkbox is selected under a user account's Properties dialog box, it means that the user has too many failed logon attempts and is locked out. This checkbox is used to unlock the account and allow the user to log in again after a certain period of time or after the administrator manually unlocks it.
7.
By default, a user’s profile is created....
Correct Answer
B. When the user first logs on
Explanation
When a user first logs on to a system, their profile is created by default. This means that all the necessary settings, preferences, and personalization options are set up for that specific user. This allows the user to have a personalized experience and access their specific files and applications. Creating the profile when the user first logs on ensures that the profile is created only for active users and reduces unnecessary storage usage for inactive users.
8.
Where are user profiles stored by default in Windows Server 2008?
Correct Answer
A. %SYSTEMDRIVE%\Users
Explanation
In Windows Server 2008, user profiles are stored by default in the directory %SYSTEMDRIVE%\Users. This directory is typically located on the C: drive, which is the system drive. The user profiles contain personal settings, documents, and other user-specific data for each user on the server. Storing the profiles in the %SYSTEMDRIVE%\Users directory allows for easy access and management of the user profiles.
9.
How do you change a profile into a mandatory profile?
Correct Answer
C. Rename Ntuser.dat to Ntuser.man
Explanation
To change a profile into a mandatory profile, you need to rename the Ntuser.dat file to Ntuser.man. This file is responsible for storing the user's profile settings and preferences. By renaming it to Ntuser.man, the system recognizes it as a mandatory profile, which means that any changes made by the user will not be saved after logging off. This is useful in situations where you want to enforce a standard profile for multiple users, preventing them from making permanent changes to their profiles.
10.
You have received a call from an employee about permissions on a shared folder, having found he can no longer access the resource. After checking the folder, you find that the group the employee is in is part of the resource’s DACL, but seems to have no effect on the group’s permissions. The group’s permission entry is the only entry in the DACL. What is wrong?
Correct Answer
B. The group has been converted from a security group to a distribution group
Explanation
When a security group is converted to a distribution group, it loses its security-related permissions. This means that even though the group is still listed in the DACL of the shared folder, it no longer has any effect on the group's permissions. Therefore, the employee who is part of this group cannot access the shared folder.
11.
Which statement is false?
Correct Answer
C. Global groups can be members of any global group in the forest
Explanation
The statement "Global groups can be members of any global group in the forest" is false. Global groups can only be members of domain local groups, not other global groups.
12.
What is Microsoft’s best practices recommendation for the structure of group scope nesting?
Correct Answer
A. AGDLP
Explanation
Microsoft's best practices recommendation for the structure of group scope nesting is AGDLP. This acronym stands for Account, Global, Domain Local, and Permission. This structure is based on the principle of granting permissions to groups rather than individual users. The Account groups are used to manage user accounts, the Global groups are used to manage permissions across domains, the Domain Local groups are used to manage permissions within a specific domain, and the Permission groups are used to assign specific permissions to resources. This nesting structure ensures better organization, easier management, and more efficient permission assignment within an Active Directory environment.
13.
Where are local groups stored?
Correct Answer
D. In the local SAM database
Explanation
Local groups are stored in the local SAM (Security Accounts Manager) database. The SAM database is a part of the Windows operating system and is responsible for storing local user and group account information on the local computer. It is used for authentication and authorization purposes, allowing users to access local resources and granting permissions to local groups. Therefore, the correct answer is "In the local SAM database."
14.
Which group matches the following description?This universal group is found only on DCs in the forest root domain. Members have full control over forestwide operations. This group is a member of the Administrators group on all DCs.
Correct Answer
A. Enterprise Admins
Explanation
The group that matches the given description is Enterprise Admins. This group is found only on domain controllers (DCs) in the forest root domain and its members have full control over forestwide operations. Additionally, Enterprise Admins is a member of the Administrators group on all DCs.
15.
At about what interval does a computer change its computer account password?
Correct Answer
C. 30 days
Explanation
A computer typically changes its computer account password at a 30-day interval. This is a security measure to ensure that passwords are regularly updated and reduce the risk of unauthorized access to the system. By changing passwords regularly, the computer enhances its security and makes it more difficult for hackers or unauthorized users to gain access to sensitive information or resources.
16.
Which command line tool removes, or deletes, objects from Active Directory?
Correct Answer
D. DSRM
Explanation
DSRM is the command line tool that is used to remove or delete objects from Active Directory. It stands for "Directory Services Restore Mode" and allows administrators to delete objects such as users, groups, computers, and organizational units from the Active Directory database. This tool helps in managing and maintaining the Active Directory environment by providing a way to remove unnecessary or outdated objects.
17.
Which of the below utilities uses comma-separated values to bulk import or export Active Directory data?
Correct Answer
C. CSVDE
Explanation
CSVDE (Comma-Separated Values Data Exchange) is the correct answer because it is a utility that is used to bulk import or export Active Directory data. It allows data to be stored in a CSV file format, where each value is separated by a comma. This format is commonly used for transferring and manipulating data between different systems. LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory information, but it does not specifically use comma-separated values for bulk import or export. LDFIDE is not a valid utility or protocol.
18.
A ____________________ is a group created in the local SAM database on a member server or workstation or a stand-alone computer.
Correct Answer
Local Group
Explanation
A local group refers to a group that is created within the local Security Accounts Manager (SAM) database on a member server, workstation, or a stand-alone computer. This type of group is specific to the local machine and is used for managing user access and permissions on that particular system. Local groups are not domain-based and do not have any impact or visibility on other machines or the entire network.
19.
The ____________________ group is a built-in default group and has no default rights or permissions.
Correct Answer
Guests
Explanation
The "Guests" group is a built-in default group in a system or network that has no default rights or permissions. This means that users who are part of the "Guests" group do not have any special access or privileges by default. They are typically restricted from performing certain actions or accessing sensitive information, making it a limited and restricted group within the system or network.