Net Admin quiz 31-60

A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.
Security Policy
Group Policy
Administration Policy
Domain Policy
SID filtering should be disabled by an automated process
True
False
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.
DN
DC
OU
CN
A(n) ____________________ name mimics a NetBIOS name.
Single-label
The ____ option allows a server to get a copy of Active Directory from media (such as CD, DVD, or USB drive) instead of replicating the data over a WAN link.
IDE
ADM
DMA
IFM
A ____ trust is granted between several domains without creating explicit trust relationships between the different domains.
Transitive
Foreign
One-way
Non-transitive
The physical locations of an enterprise include one or more ____________________.
Subnets
Sunets
In a ____, users in each domain can be granted access to resources in both domains.
Foreign trust
Restricted trust
One-way trust
Two-way trust
You can use the ____ command to check the NIC settings.
Dcdiag /all
Netdc /all
Netsh ipmi /all
IPConfig /all
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
True
False
The DC hosting the ____ master role manages the addition and removal of domains, and the addition and removal of application directory partitions.
Domain naming
Infrastructure
RID
Schema
If you want users or groups to be able to access a resource using SID history, you must enable SID filtering.
True
False
A(n) ____ is new in Windows Server 2008, and can be used to resolve single-label names.
Standard stub zone
Standard secondary zone
Active Directory Integrated zone
GlobalNames zone
Because users see OUs, the OUs must follow a structure understood by the users.
True
False
A ____ trust creates an explicit trust relationship between two domains and is not transferred to any other domains
One-way
Non-transitive
Foreign
Transitive
The ____ property of the _ldap record identifies the server as a lightweight directory access protocol (LDAP) server, which will respond to LDAP queries.
_kpasswd
_ldap
_kerberos
_gc
A(n) ____________________ installation of Windows Server 2008 is a limited installation that includes the command prompt but does not include the Windows graphical user interface (GUI).
Server Core
 
An Active Directory domain is hosted on a server called a ____.
Domain master
Member server
Domain controller
Role master
The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.
Domain-wide
Tree-wide
Schema-wide
Forest-wide
DNS is the only type of name resolution in use.
True
False
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.
GPO order of hiding
GPO order of encapsulation
GPO order of inheritance
GPO order of precedence
On proxy servers, ____ is used to conserve bandwidth usage.
Nesting
Caching
Parsing
Forward lookup
The ____ manages time synchronization and password changes in the domain
RID master
PC master
PDC emulator
Infrastructure master
Domain controllers work as ____ with loose convergence.
Overlapping masters
Multi-masters
Single masters
Backup masters
One benefit of a secondary DNS server is the ability to provide ___________________ balancing for clients in the network.
Load
Boad
____ introduced Active Directory partitions
Windows 2000
Windows 2008 R2
Windows NT
Windows Server 2003
Trusts within a forest are ____ trusts.
Non-transitive
Foreign
Transitive
One-way
Active Directory applications use ____ queries to query domain controllers, and these queries add to the load of a domain controller.
Lightweight Directory Access Protocol
Domain controller access
Server access protocol
Remote Procedure Call
Replication between domain controllers within the same site occurs within ____ seconds for the original change.
3
7
15
30
When selective authentication is implemented on a forest trust, you need to grant the ____ permission on each server or computer where access is granted.
Act as Part of the Operating System
Allowed to Authenticate
Replace Token
Run as Service
{"name":"Net Admin quiz 31-60", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization., SID filtering should be disabled by an automated process, The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker