1.
Which of the next operation master roles are forest wide roles? (choose all relevant)
Correct Answer(s)
B. Schema master
D. Domain naming
Explanation
The forest-wide operation master roles are responsible for performing specific tasks at the forest level in Active Directory. The schema master role is responsible for managing the Active Directory schema, which defines the structure and attributes of objects in the directory. The domain naming master role is responsible for managing the addition and removal of domains in the forest. Therefore, both the schema master and domain naming master roles are forest-wide roles. The PDC emulator and RID master roles, on the other hand, are domain-specific roles and are not considered forest-wide.
2.
Which operation master role has the sid values located in it?
Correct Answer
D. Rid master
Explanation
The RID master operation master role is responsible for allocating and managing the relative identifier (RID) pool, which is used to create unique security identifiers (SIDs) for objects in a Windows domain. The RID values are stored and managed by the RID master. This ensures that each object in the domain has a unique SID, allowing for proper authentication and authorization within the network.
3.
Using the `gpupdate /force` command forces replica of gpo policies to all the domain.
Correct Answer
B. False
Explanation
The given statement is incorrect. The `gpupdate /force` command does not force the replica of GPO policies to all the domains. Instead, it forces an immediate update of the Group Policy settings on the local computer or the remote computer. This command ensures that any changes made to Group Policy are applied immediately without waiting for the regular update interval.
4.
If you want to apply a gpo user policy in a way that it affects every user loggin on a specific computer - what setting should you choose to enable this configuration?
Correct Answer
C. Loop back processing mode
Explanation
Loopback processing mode should be chosen to enable the configuration of applying a GPO user policy that affects every user logging on a specific computer. Loopback processing mode allows the computer to apply user policies based on the location of the computer, rather than the user. This means that when a user logs on to the specific computer, the user policies defined for that computer will be applied to them, regardless of their own user policies.
5.
How is it possible to point a query to a specific dns server ?
Correct Answer
A. Apply a conditional forwarding
Explanation
To point a query to a specific DNS server, one can apply a conditional forwarding. Conditional forwarding allows the DNS server to forward queries for specific domain names to another DNS server. This is useful when there is a need to resolve names from a specific domain using a different DNS server than the one configured as the primary DNS server. By setting up conditional forwarding, the DNS server can route queries for the specified domain to the designated DNS server, ensuring accurate and efficient resolution of the queries.
6.
A query is sent from a user throw a internet browser for a website. the dns server recieving the query - answers back with the ip address in a way that it fetched it by it`s self. what kind of query was applied?
Correct Answer
C. Recursive
Explanation
The correct answer is recursive. In a recursive query, the DNS server not only provides the requested information to the user, but it also fetches the information from another DNS server if it doesn't have it in its own cache. In this case, the DNS server received the query from the user and answered back with the IP address by fetching it from another DNS server.
7.
In group policy, how often does a refresh occur by default?
Correct Answer
C. 90-120 minutes
Explanation
By default, in group policy, a refresh occurs every 90-120 minutes. This means that the group policy settings are applied to the computers or users in the group every 90-120 minutes. This interval allows for regular updates and ensures that any changes made to the group policy are propagated to the relevant systems within a reasonable timeframe.
8.
You want to change the period in which dns refreshes the records it manages - so that unused records will be deleted in a shorter time. what value should you change?
Correct Answer
D. Modify TTL
Explanation
To change the period in which DNS refreshes the records it manages and deletes unused records in a shorter time, you should modify the TTL (Time to Live) value. TTL determines the amount of time that a DNS record can be cached by other DNS servers or clients. By reducing the TTL value, the DNS records will expire more quickly, causing unused records to be deleted sooner. Therefore, modifying the TTL value is the correct option to achieve the desired outcome.
9.
What tool helps us specifying multipul password policies for diffrent users or groups?
Correct Answer
D. Fine graind password policy
Explanation
The correct answer is "fine-grained password policy." This tool allows us to specify multiple password policies for different users or groups. It provides more flexibility and control over password requirements, allowing organizations to enforce different password policies based on user roles or security levels. With fine-grained password policies, administrators can set specific password complexity, length, and expiration requirements for different sets of users or groups, ensuring better security and compliance with organizational password policies.
10.
I work for a company as a system admin and there are multipul domain controllers on the network. i have accidentally deleted an important object from AD. the object has been recoverd but the problem is that the other DC`s have replicated the deletion and do not replicate the recovered object.what solution would you propose?
Correct Answer
D. Perform an authritative restore
Explanation
Performing an authoritative restore is the most appropriate solution in this situation. When an object is deleted from Active Directory (AD), the deletion is replicated to other domain controllers (DCs). However, by performing an authoritative restore, the recovered object can be marked as authoritative, ensuring that it is replicated to all other DCs and takes precedence over any conflicting data. This will effectively restore the object across the network and resolve the issue caused by the accidental deletion.
11.
In what feature can you set a quota to a folder?
Correct Answer
C. Fsrm
Explanation
In the context of file systems, the correct answer is fsrm. FSRM stands for File Server Resource Manager, which is a feature in Windows Server that allows administrators to set quotas to folders. This feature enables them to control and manage the amount of disk space that users or groups can consume on a file server. By setting quotas, administrators can prevent users from exceeding their allocated storage space and ensure fair resource distribution.
12.
Which type of quota is used to send notifications only when the quota is exceede?
Correct Answer
D. Soft screening
Explanation
Soft screening is the correct answer because it refers to a type of quota that allows notifications to be sent only when the quota is exceeded. Soft screening is a method of monitoring and controlling the usage of a resource, such as data or storage, by setting a limit or threshold. When the quota is surpassed, notifications or warnings are triggered to inform the user or administrator about the exceeded limit. This helps in managing and optimizing resource allocation and preventing potential issues or over-usage.
13.
Which encryption algoritm uses a single key to encrypt and decrypt data?
Correct Answer
C. Symmetric
Explanation
Symmetric encryption algorithm uses a single key to both encrypt and decrypt data. This means that the same key is used for both the sender and the receiver to ensure the confidentiality and integrity of the data. Asymmetric encryption, on the other hand, uses a pair of keys (public and private) where the public key is used to encrypt the data and the private key is used to decrypt it. TPM (Trusted Platform Module) is a hardware chip used for secure storage of cryptographic keys and other sensitive data.
14.
Vpn enforcmant does effect local connected computer
Correct Answer
B. False
Explanation
The correct answer is False because VPN enforcement does not affect local connected computers. VPN enforcement only applies to devices that are attempting to connect to a network remotely through a VPN. It does not have any impact on the devices that are already connected to the local network.
15.
In nap, what is the perpose of the SHA?
Correct Answer
D. Providing a feedback on status of system protection from the client
Explanation
The purpose of the SHA in NAP is to provide feedback on the status of system protection from the client. This means that the SHA is responsible for informing the client about the level of protection their system has and whether it is compliant with the network's security requirements. This feedback allows the client to take necessary actions to ensure their system is adequately protected before accessing the network.
16.
______ is a private version of microsft update service which windows computers automatically download updates
Correct Answer
wsus
Explanation
WSUS stands for Windows Server Update Services. It is a private version of Microsoft Update Service that allows Windows computers to automatically download updates. WSUS provides a centralized management solution for distributing updates within a local network, allowing administrators to control and monitor the update process. By using WSUS, organizations can ensure that their Windows computers are regularly updated with the latest security patches and software updates, enhancing system stability and protecting against potential vulnerabilities.
17.
What is the use of creating computer groups in wsus?
Correct Answer
C. Targeting specific groups of computers for testing & pilot installation of updates
Explanation
Creating computer groups in WSUS allows for targeting specific groups of computers for testing and pilot installation of updates. This means that updates can be deployed to a smaller subset of computers first to ensure they work correctly and do not cause any issues before being rolled out to the entire network. This helps in reducing the potential impact of any problematic updates and allows for a controlled testing environment.
18.
What is the name of the windows installation dvd boot image file?
Correct Answer
D. Boot.wim
Explanation
The correct answer is "boot.wim." Boot.wim is the name of the Windows installation DVD boot image file. It is a file that contains the necessary files and resources needed to start the Windows installation process. This file is commonly found in the "sources" folder of the installation DVD and is used by the Windows Setup program to load the initial operating system environment during the installation process.
19.
What function does the system preparation utility (sysprep.exe) perform on a system?
Correct Answer
D. It removes a sysytem`s name and sid
Explanation
The correct answer is that the System Preparation Utility (sysprep.exe) removes a system's name and SID. This utility is used to prepare a Windows operating system for cloning or imaging by removing unique identifiers such as the computer name and Security Identifier (SID). This ensures that when the cloned or imaged system is deployed, it does not conflict with other systems on the network and can be properly joined to a domain.
20.
Encryption is a the process of converting data into a readable format
Correct Answer
B. False
Explanation
The given correct answer is False. Encryption is not the process of converting data into a readable format, but rather the process of converting data into an unreadable or encrypted format to ensure its security and confidentiality.
21.
Which two filters can be used to control who or what recieves a group policy?
Correct Answer(s)
A. Security group filter
D. Wmi filter
Explanation
The correct answer is security group filter and WMI filter. These two filters can be used to control who or what receives a group policy. A security group filter allows the group policy to be applied only to specific security groups, ensuring that only members of those groups receive the policy. On the other hand, a WMI filter allows the group policy to be applied based on specific conditions defined using Windows Management Instrumentation (WMI), such as operating system version, hardware configuration, or installed software. By using these filters, administrators can have more control over the application of group policies in their network environment.
22.
Who can initiate a DNS query?
Correct Answer
C. Dns servers and clients
Explanation
DNS queries can be initiated by both DNS servers and clients. DNS servers are responsible for resolving domain names into IP addresses and can initiate queries to other DNS servers to obtain the necessary information. Clients, on the other hand, can also initiate DNS queries when they need to resolve a domain name into an IP address for communication purposes. Therefore, both DNS servers and clients have the capability to initiate a DNS query.
23.
What is secpol.msc used for?
Correct Answer
C. Configure local security policy account settings.
Explanation
Secpol.msc is used to configure the local security policy account settings. It allows users to manage various security settings on their local machine, such as password policies, account lockout policies, user rights assignments, and audit policies. This tool is primarily used by system administrators to enforce security measures and ensure the protection of the local system.
24.
When we use the administrative tamplets on gpo, what can we configure?
Correct Answer
A. The registry
Explanation
When we use the administrative templates on GPO, we can configure settings related to the registry. This means that we can modify and manage registry keys and values on the computers in the network. The administrative templates provide a way to centrally manage and enforce these registry settings across multiple computers, making it easier to maintain consistent configurations and policies.
25.
What are radius clients?
Correct Answer
C. Network access devices that offer connectivity for the user
Explanation
Radius clients are network access devices that offer connectivity for the user. These devices act as intermediaries between the user and the radius server. They receive the connection requests from the user and forward them to the radius server for authentication and authorization. Once the radius server approves the connection, the client device grants access to the network resources. These clients can be routers, switches, wireless access points, or any other device that provides network access to the user.
26.
In a network that has 60 nodes (network attached devices), a network administartor has a task to upgrade to the new windows 10 edition. what server 2012 role should he use for the task?
Correct Answer
D. Wds
Explanation
The network administrator should use the WDS (Windows Deployment Services) role for the task of upgrading to the new Windows 10 edition. WDS is a server role in Windows Server 2012 that allows for the deployment of Windows operating systems over the network. It enables network-based installations, which would be useful in upgrading multiple devices in a network with 60 nodes.
27.
In a network that has 60 nodes (network attached devices), a network administartor has a task to upgrade to the new windows 10 edition. after deciding what role should be used for this task, what wizard will be most affective?
Correct Answer
D. Wds - multicast transmissions
Explanation
The most effective wizard for upgrading to the new Windows 10 edition in a network with 60 nodes would be WDS - Multicast Transmissions. Multicast transmissions allow for efficient and simultaneous distribution of data to multiple devices. This is particularly useful when upgrading a large number of devices as it reduces network congestion and ensures faster and smoother deployment of the new Windows 10 edition.