Active Directory Domain Services! Trivia Questions Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By LadyV123
L
LadyV123
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,617
Questions: 21 | Attempts: 4,629

SettingsSettingsSettings
Active Directory Domain Services! Trivia Questions Quiz - Quiz

As a systems administrator, how much do you know about active directory domain services? An Active Directory domain is a collection of objects within a Microsoft Active Directory network. Do you think that it is enough to tackle the trivia questions below? Give it a try and be sure to take the quiz more than once and note which topics are problematic for you!


Questions and Answers
  • 1. 

    You need to see an entry in the log that claims that a database program recorded a file error. You would look in the ____________ log.

    • A.

      Application

    • B.

      System

    • C.

      Captains

    • D.

      Tree

    Correct Answer
    A. Application
    Explanation
    In order to find an entry in the log that claims a file error in a database program, one would look in the application log. The application log is specifically designed to record events and errors related to the application software, making it the most appropriate place to search for information regarding file errors in a database program.

    Rate this question:

  • 2. 

    You want to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this?

    • A.

      Block all

    • B.

      Block policy inheritence option

    • C.

      Block work

    • D.

      Unblock GPO

    Correct Answer
    B. Block policy inheritence option
    Explanation
    The "block policy inheritance option" can be used to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. This option allows administrators to prevent any GPOs from higher-level OUs from being applied to the objects within the specific OU. By blocking policy inheritance, the administrators can have more control over the Group Policy settings and ensure that only the desired GPOs are applied to the objects within the OU.

    Rate this question:

  • 3. 

    You need to create 250 users and 7 new OUs. What tool is used to achieve this functionality?

    • A.

      AD add new users

    • B.

      AD Sites and Services

    • C.

      Ctrl + alt + del

    • D.

      AD Users and computers MMC

    Correct Answer
    D. AD Users and computers MMC
    Explanation
    AD Users and computers MMC is the correct tool to achieve the functionality of creating 250 users and 7 new OUs. AD Users and computers MMC is a Microsoft Management Console (MMC) snap-in that allows administrators to manage and control Active Directory objects, including users and organizational units (OUs). With this tool, administrators can easily create new users and OUs, making it the appropriate choice for this task.

    Rate this question:

  • 4. 

    Your company currently uses one security password policy for the entire domain but they would like to change that.  What does Windows Server 2008 offer so that you can do this?

    • A.

      Honed password policy

    • B.

      Fine grained password policy

    • C.

      Wood grained password policy

    • D.

      Complex password policy

    Correct Answer
    B. Fine grained password policy
    Explanation
    Windows Server 2008 offers the option to implement a fine-grained password policy. This allows the company to have different password policies for different groups of users within the domain. With this feature, the company can have more flexibility in setting password requirements based on user roles or security needs. This is beneficial as it allows for more granular control over password policies and enhances security measures.

    Rate this question:

  • 5. 

    What is a set of Active Directory domains that share a contiguous namespace called?

    • A.

      A branch

    • B.

      A forest

    • C.

      A leaf

    • D.

      A tree

    Correct Answer
    D. A tree
    Explanation
    A set of Active Directory domains that share a contiguous namespace is called a tree. In Active Directory, a tree is a hierarchical structure that consists of a root domain and one or more child domains. The domains within a tree are connected through trust relationships and share a common namespace. This allows for centralized management and authentication across the domains within the tree.

    Rate this question:

  • 6. 

    Which command allows you to install Active Directory?

    • A.

      Ad.exe

    • B.

      Dcupgrade

    • C.

      Dcpromo

    • D.

      Dcelevate

    Correct Answer
    C. Dcpromo
    Explanation
    The correct answer is "dcpromo". This command is used to promote a server to a domain controller and install Active Directory. It allows you to configure and manage the Active Directory services on a Windows Server.

    Rate this question:

  • 7. 

    At what level of the DNS hierarchy does .com reside?

    • A.

      Top

    • B.

      Bottom

    • C.

      Middle

    • D.

      Root

    Correct Answer
    A. Top
    Explanation
    The correct answer is "top". The .com domain resides at the highest level of the DNS hierarchy, known as the top-level domain (TLD). TLDs are the last segment of a domain name and represent the highest level in the DNS hierarchy. Examples of other TLDs include .net, .org, and .gov.

    Rate this question:

  • 8. 

    You need to remove the DNS Resolver cache, which of the following options would you use with IPCONFIG command?

    • A.

      /flushdns

    • B.

      /cleardns

    • C.

      /dnscache

    • D.

      /forcedns

    Correct Answer
    A. /flushdns
    Explanation
    The correct option to remove the DNS Resolver cache using the IPCONFIG command is "/flushdns". This command is used to clear the DNS cache on a Windows computer. It refreshes the information stored in the cache and forces the computer to retrieve the latest DNS records from the DNS server. This can be useful in troubleshooting DNS-related issues or when changes have been made to DNS settings.

    Rate this question:

  • 9. 

    A __________ is a collection of computers and resources that share a common security database.

    • A.

      Group

    • B.

      Troop

    • C.

      Flock

    • D.

      Domain

    Correct Answer
    D. Domain
    Explanation
    A domain is a collection of computers and resources that share a common security database. In a domain, all computers are connected to a central server, known as a domain controller, which manages user accounts, security policies, and access to resources. This allows for centralized management and control of security settings and permissions across the network.

    Rate this question:

  • 10. 

    Which of the following is a single granular piece of information stored within Active Directory?

    • A.

      Attribute

    • B.

      Piece

    • C.

      Atom

    • D.

      Portion

    Correct Answer
    A. Attribute
    Explanation
    Active Directory is a directory service used in Windows operating systems to store and organize information about network resources. In this context, an attribute refers to a single granular piece of information that is stored within Active Directory. It can represent a specific characteristic or property of an object, such as a user's name, email address, or phone number. Therefore, the correct answer is attribute.

    Rate this question:

  • 11. 

    When you install the first domain in a new tree, this is referred to by what term?

    • A.

      Secondary domain

    • B.

      Top level domain

    • C.

      Root domain

    • D.

      The domain

    Correct Answer
    C. Root domain
    Explanation
    When you install the first domain in a new tree, it is referred to as the root domain. The root domain is the highest level in the domain hierarchy and serves as the starting point for the entire domain structure. It is the first domain created in a new tree and all other domains and subdomains are organized beneath it. The root domain has full control and authority over the entire domain tree.

    Rate this question:

  • 12. 

    What of the following is NOT an example of an Active Directory class?

    • A.

      User

    • B.

      First name

    • C.

      Computer

    • D.

      Group

    Correct Answer
    B. First name
    Explanation
    The first name is not an example of an Active Directory class because it is a property or attribute of a user object within the Active Directory, rather than being a separate class itself. Active Directory classes typically represent different types of objects or entities within the directory, such as users, groups, or computers.

    Rate this question:

  • 13. 

    Which DNS record type is used for mail?

    • A.

      Px

    • B.

      Dx

    • C.

      Mx

    • D.

      Criminal

    Correct Answer
    C. Mx
    Explanation
    The DNS record type used for mail is the MX (Mail Exchanger) record. This record specifies the mail server responsible for accepting incoming email messages on behalf of a domain. It helps in routing emails to the correct mail server for delivery.

    Rate this question:

  • 14. 

    What is the name of the text file that can be populated with IP address to computer name mappings for local name revolution?

    • A.

      Ghost

    • B.

      Lmhost

    • C.

      Mmc

    • D.

      Host

    Correct Answer
    D. Host
    Explanation
    The correct answer is "host." In local name resolution, the "host" file is used to map IP addresses to computer names. This file can be manually populated with these mappings, allowing for easier identification and communication between devices on a local network.

    Rate this question:

  • 15. 

    You need to turn your Fat32 partition into an NTFS partition.  Which command line utility would you use?

    • A.

      Convert

    • B.

      Revert

    • C.

      Change

    • D.

      Alter

    Correct Answer
    A. Convert
    Explanation
    To turn a Fat32 partition into an NTFS partition, the appropriate command line utility to use is "convert". This utility allows for the conversion of file systems on a partition without losing any data. By using the "convert" command, the file system of the partition can be changed from Fat32 to NTFS, enabling compatibility with larger file sizes and increased security features provided by NTFS.

    Rate this question:

  • 16. 

    What exam result are you aiming for.........

    • A.

      Pass

    • B.

      Merit

    • C.

      Distinction

    • D.

      Fail

    Correct Answer
    C. Distinction
    Explanation
    you may think you are at this grade but you do need to revise............ and read your answerz carefully
    ho ho ho

    Rate this question:

  • 17. 

    Which of the following commands is used to identify the IP address?

    • A.

      Ipbanana

    • B.

      Ping

    • C.

      Chkip

    • D.

      Ipconfig

    Correct Answer
    D. Ipconfig
    Explanation
    The command "ipconfig" is used to identify the IP address.

    Rate this question:

  • 18. 

    Which type of trust is automatically created between the domains in a domain tree?

    • A.

      Transitive 1 way trust

    • B.

      Non set

    • C.

      Transitive 2 way trust

    • D.

      Mutual trust

    Correct Answer
    C. Transitive 2 way trust
    Explanation
    In a domain tree, a transitive 2 way trust is automatically created between the domains. This means that trust is established between all domains within the domain tree, allowing users in one domain to access resources in another domain, and vice versa. The trust is transitive, meaning that if Domain A trusts Domain B, and Domain B trusts Domain C, then Domain A also trusts Domain C. Additionally, the trust is two-way, allowing authentication and access to flow in both directions between the domains.

    Rate this question:

  • 19. 

    What type of domain controller can you install if you are worried about physical security?

    • A.

      Active Directory Domain

    • B.

      ACDC

    • C.

      Read Only DC

    • D.

      Secure DC

    Correct Answer
    C. Read Only DC
    Explanation
    A Read Only DC (RODC) is a type of domain controller that can be installed if physical security is a concern. RODCs are designed to be deployed in locations where there is a higher risk of physical security breaches, such as branch offices or remote locations. Unlike a traditional domain controller, an RODC does not store a full copy of the Active Directory database. Instead, it stores a read-only copy, which means that any changes made to the database must be replicated from a writeable domain controller. This helps to protect against unauthorized changes or data theft in case the RODC is compromised.

    Rate this question:

  • 20. 

    You need to provide a solution for deploying Microsoft Office. How can this be done?

    • A.

      Use a GPO to deploy software

    • B.

      Download it

    • C.

      Use a pendrive

    • D.

      Use the cloud

    Correct Answer
    A. Use a GPO to deploy software
    Explanation
    Using a Group Policy Object (GPO) to deploy software is a common and efficient method for deploying Microsoft Office. GPO allows administrators to centrally manage and distribute software installations across multiple computers or users in an Active Directory domain. By configuring the GPO settings, the software can be automatically installed on the targeted computers without the need for manual intervention. This method ensures consistency and ease of deployment, making it a preferred choice for deploying Microsoft Office in an enterprise environment.

    Rate this question:

  • 21. 

    You try to create a Universal group but the option is grayed out.  What do you need to do to create a Universal group?

    • A.

      Change the Function level to Windows 2008 Interim mode.

    • B.

      Buy another CAL

    • C.

      Change the functional level to 2008 mode

    • D.

      Google it

    Correct Answer
    C. Change the functional level to 2008 mode
    Explanation
    To create a Universal group, the functional level of the domain needs to be set to at least Windows Server 2008. By changing the functional level to 2008 mode, the option to create a Universal group will no longer be grayed out, allowing the creation of Universal groups.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 09, 2012
    Quiz Created by
    LadyV123
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.