1.
You need to see an entry in the log that claims that a database program recorded a file error. You would look in the ____________ log.
Correct Answer
A. Application
Explanation
In order to find an entry in the log that claims a file error in a database program, one would look in the application log. The application log is specifically designed to record events and errors related to the application software, making it the most appropriate place to search for information regarding file errors in a database program.
2.
You want to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this?
Correct Answer
B. Block policy inheritence option
Explanation
The "block policy inheritance option" can be used to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. This option allows administrators to prevent any GPOs from higher-level OUs from being applied to the objects within the specific OU. By blocking policy inheritance, the administrators can have more control over the Group Policy settings and ensure that only the desired GPOs are applied to the objects within the OU.
3.
You need to create 250 users and 7 new OUs. What tool is used to achieve this functionality?
Correct Answer
D. AD Users and computers MMC
Explanation
AD Users and computers MMC is the correct tool to achieve the functionality of creating 250 users and 7 new OUs. AD Users and computers MMC is a Microsoft Management Console (MMC) snap-in that allows administrators to manage and control Active Directory objects, including users and organizational units (OUs). With this tool, administrators can easily create new users and OUs, making it the appropriate choice for this task.
4.
Your company currently uses one security password policy for the entire domain but they would like to change that. What does Windows Server 2008 offer so that you can do this?
Correct Answer
B. Fine grained password policy
Explanation
Windows Server 2008 offers the option to implement a fine-grained password policy. This allows the company to have different password policies for different groups of users within the domain. With this feature, the company can have more flexibility in setting password requirements based on user roles or security needs. This is beneficial as it allows for more granular control over password policies and enhances security measures.
5.
What is a set of Active Directory domains that share a contiguous namespace called?
Correct Answer
D. A tree
Explanation
A set of Active Directory domains that share a contiguous namespace is called a tree. In Active Directory, a tree is a hierarchical structure that consists of a root domain and one or more child domains. The domains within a tree are connected through trust relationships and share a common namespace. This allows for centralized management and authentication across the domains within the tree.
6.
Which command allows you to install Active Directory?
Correct Answer
C. Dcpromo
Explanation
The correct answer is "dcpromo". This command is used to promote a server to a domain controller and install Active Directory. It allows you to configure and manage the Active Directory services on a Windows Server.
7.
At what level of the DNS hierarchy does .com reside?
Correct Answer
A. Top
Explanation
The correct answer is "top". The .com domain resides at the highest level of the DNS hierarchy, known as the top-level domain (TLD). TLDs are the last segment of a domain name and represent the highest level in the DNS hierarchy. Examples of other TLDs include .net, .org, and .gov.
8.
You need to remove the DNS Resolver cache, which of the following options would you use with IPCONFIG command?
Correct Answer
A. /flushdns
Explanation
The correct option to remove the DNS Resolver cache using the IPCONFIG command is "/flushdns". This command is used to clear the DNS cache on a Windows computer. It refreshes the information stored in the cache and forces the computer to retrieve the latest DNS records from the DNS server. This can be useful in troubleshooting DNS-related issues or when changes have been made to DNS settings.
9.
A __________ is a collection of computers and resources that share a common security database.
Correct Answer
D. Domain
Explanation
A domain is a collection of computers and resources that share a common security database. In a domain, all computers are connected to a central server, known as a domain controller, which manages user accounts, security policies, and access to resources. This allows for centralized management and control of security settings and permissions across the network.
10.
Which of the following is a single granular piece of information stored within Active Directory?
Correct Answer
A. Attribute
Explanation
Active Directory is a directory service used in Windows operating systems to store and organize information about network resources. In this context, an attribute refers to a single granular piece of information that is stored within Active Directory. It can represent a specific characteristic or property of an object, such as a user's name, email address, or phone number. Therefore, the correct answer is attribute.
11.
When you install the first domain in a new tree, this is referred to by what term?
Correct Answer
C. Root domain
Explanation
When you install the first domain in a new tree, it is referred to as the root domain. The root domain is the highest level in the domain hierarchy and serves as the starting point for the entire domain structure. It is the first domain created in a new tree and all other domains and subdomains are organized beneath it. The root domain has full control and authority over the entire domain tree.
12.
What of the following is NOT an example of an Active Directory class?
Correct Answer
B. First name
Explanation
The first name is not an example of an Active Directory class because it is a property or attribute of a user object within the Active Directory, rather than being a separate class itself. Active Directory classes typically represent different types of objects or entities within the directory, such as users, groups, or computers.
13.
Which DNS record type is used for mail?
Correct Answer
C. Mx
Explanation
The DNS record type used for mail is the MX (Mail Exchanger) record. This record specifies the mail server responsible for accepting incoming email messages on behalf of a domain. It helps in routing emails to the correct mail server for delivery.
14.
What is the name of the text file that can be populated with IP address to computer name mappings for local name revolution?
Correct Answer
D. Host
Explanation
The correct answer is "host." In local name resolution, the "host" file is used to map IP addresses to computer names. This file can be manually populated with these mappings, allowing for easier identification and communication between devices on a local network.
15.
You need to turn your Fat32 partition into an NTFS partition. Which command line utility would you use?
Correct Answer
A. Convert
Explanation
To turn a Fat32 partition into an NTFS partition, the appropriate command line utility to use is "convert". This utility allows for the conversion of file systems on a partition without losing any data. By using the "convert" command, the file system of the partition can be changed from Fat32 to NTFS, enabling compatibility with larger file sizes and increased security features provided by NTFS.
16.
What exam result are you aiming for.........
Correct Answer
C. Distinction
Explanation
you may think you are at this grade but you do need to revise............ and read your answerz carefully
ho ho ho
17.
Which of the following commands is used to identify the IP address?
Correct Answer
D. Ipconfig
Explanation
The command "ipconfig" is used to identify the IP address.
18.
Which type of trust is automatically created between the domains in a domain tree?
Correct Answer
C. Transitive 2 way trust
Explanation
In a domain tree, a transitive 2 way trust is automatically created between the domains. This means that trust is established between all domains within the domain tree, allowing users in one domain to access resources in another domain, and vice versa. The trust is transitive, meaning that if Domain A trusts Domain B, and Domain B trusts Domain C, then Domain A also trusts Domain C. Additionally, the trust is two-way, allowing authentication and access to flow in both directions between the domains.
19.
What type of domain controller can you install if you are worried about physical security?
Correct Answer
C. Read Only DC
Explanation
A Read Only DC (RODC) is a type of domain controller that can be installed if physical security is a concern. RODCs are designed to be deployed in locations where there is a higher risk of physical security breaches, such as branch offices or remote locations. Unlike a traditional domain controller, an RODC does not store a full copy of the Active Directory database. Instead, it stores a read-only copy, which means that any changes made to the database must be replicated from a writeable domain controller. This helps to protect against unauthorized changes or data theft in case the RODC is compromised.
20.
You need to provide a solution for deploying Microsoft Office. How can this be done?
Correct Answer
A. Use a GPO to deploy software
Explanation
Using a Group Policy Object (GPO) to deploy software is a common and efficient method for deploying Microsoft Office. GPO allows administrators to centrally manage and distribute software installations across multiple computers or users in an Active Directory domain. By configuring the GPO settings, the software can be automatically installed on the targeted computers without the need for manual intervention. This method ensures consistency and ease of deployment, making it a preferred choice for deploying Microsoft Office in an enterprise environment.
21.
You try to create a Universal group but the option is grayed out. What do you need to do to create a Universal group?
Correct Answer
C. Change the functional level to 2008 mode
Explanation
To create a Universal group, the functional level of the domain needs to be set to at least Windows Server 2008. By changing the functional level to 2008 mode, the option to create a Universal group will no longer be grayed out, allowing the creation of Universal groups.