Reference no: EM131035231
Question 1. The Windows Server2003/2008 edition best suited to a particular environment depends upon the performance, scalability, and reliability requirements of an organization, along with the intended purpose of a particular system.
True
False
Question 2. The functional level of a domain can be raised in Active Directory Users and Computers by right-clicking the domain and clicking Raise Domain Functional Level.
True
False
Question 3. Checking the Block Policy inheritance option under the Group Policy tab for container properties means that all higher-level policies will be blocked for other containers.
True
False
Question 4. Windows Server2003/2008 includes two main utilities that allow you to view the effective Group Policy settings that have been applied to a particular user or computer.
True
False
Question 5. A domain is a logical group of computers characterized by centralized authentication and administration.
True
False
Question 6. The accidental deletion of user data files is a far more common occurrence than a full server failure.
True
False
Question 7. A domain controller should always run on a dedicated server.
True
False
Question 8. The Read shared folder permission allows the abilities to add and delete files in a folder as well as read and edit the contents of existing files.
True
False
Question 9. By default, any user can view the contents of the application and system log.
True
False
Question 10. On Pentium computers, page size is 4 KB.
True
False
Question 11. The DSRM command is used only when deleting a single object from memory.
True
False
Question 12. When basic disks are used, the operating system boots from the primary partitions.
True
False
Question 13. Roaming user profiles cannot be configured as mandatory profiles.
True
False
Question 14. Local print devices are connected directly to the network on which the workstation resides.
True
False
Question 15. The "Use custom share and folder permissions" option for shared folders allows both share and NTFS permissions to be defined manually.
True
False
Question 16. Enforcing even very tight GPO restrictions will not interfere with user productivity.
True
False
Question 17. A differential backup reduces the overall size of backup jobs to the same degree as an incremental backup.
True
False
Question 18. Active Directory Users and Computers allows you to configure the properties of a single user object at a time.
True
False
Question 19. The read-only file attribute is available regardless of the file system in use.
True
False
Question 20. Windows Server2003/2008 allows an administrator to further secure files by encrypting their contents.
True
False
Question 21. The incremental backup type is very similar to a normal backup.
True
False
Question 22. The first steps in a general strategy for implementing groups in an environment is to create user accounts and organize them into domain local groups.
True
False
Question 23. Windows Server2003/2008 supports three types of file and folder permissions.
True
False
Question 24. The Add Printer Wizard allows you to specify whether the printer should be shared to provide network access.
True
False
Question 25. The DSMOVE command allows you to move objects between domains.
True
False
Question 26. A domain local group can be assigned rights and permissions to any resource within the same domain only.
True
False
Question 27. The "Show hidden files and folders" option displayed under the View tab of Windows Explorer is selected by default.
True
False
Question 28. The Log On To button in the Account tab of the properties of a user account allows an administrator to configure the days and hours when this user is allowed to log on to the network.
True
False
Question 29. Microsoft's digital signature on a device driver ensures that the driver has been verified to work with Windows Server2003/2008.
True
False
Question 30. All server activities rely on disk storage.
True
False
Question 31. Windows Server2003/2008 supports the ability to import dynamic disks from all of the following operating systems EXCEPT
Windows XP.
Windows 98.
Windows 2000.
Windows Server2003/2008.
Question 32. To prevent any of the higher-level settings from being applied to a particular child container, you check the ____ check box on the Group Policy tab for the container properties.
No Child settings
Block Child settings
Block Policy inheritance
Set High-Level Only
Question 33. ____ reduces the amount of disk space that folders and files take up, thus allowing more data to be stored on the volume.
Partitioning
Reduction
Encryption
Compression
Question 34. When a GPO is created, its content is stored in ____ different locations on the server.
2
4
8
16
Question 35. The Windows Server2003/2008 file system FAT32 supports partitions up to ____ in size.
2 GB
16 GB
2 TB
16 TB
Question 36. Under the Kerberos v5 authentication protocol, when a user tries to access a network resource, it presents a TGT to the KDC and requests a(n) ____ for the server on which the resource resides.
challenge
ticket-granting ticket
access ticket
service ticket
Question 37. After a GPO has been created, it needs to be ____ to control specific user or computer settings that should be applied.
initialized
edited
encrypted
fixed
Question 38. Which of the following commands may be used to manipulate the system attribute of a folder?
DIR
CIPHER
ATTRIB
COMPACT
Question 39. IPP can provide users with a method to easily gain access to remote printers using the standard ____ protocol.
WSH
HTTP
IIS
IPPA
Question 40. Windows Server2003/2008 supports ____ different driver signing options.
1
2
3
4
Question 41. Which of the following tools is used to monitor shared folders on a Windows Server2003/2008 network?
Share a Folder Wizard
Computer Management
Windows Explorer
Folder Monitor
Question 42. Which of the following tools could be used to view the location and settings of your server's computer account?
Active Directory Users and Computers
System Properties
Configure Your Server
Event Viewer
Question 43. After a Regenerating operation completes, the status message returns to
Healthy.
Online.
Ready.
Running.
Question 44. By default, all policy settings for groups are inherited from ____.
super users
parent containers
child groups
policy banks
Question 45. Which of the following Kerberos policy items determines the amount of time, in days, that a user's TGT may be renewed?
maximum lifetime for service ticket
maximum lifetime for user ticket renewal
maximum lifetime for user ticket
enforce user logon restrictions
Question 46. A(n) ____ is a logical container used to organize objects within a domain.
forest
tree
organizational unit
attribute
Question 47. Which of the following account lockout policy items defines the number of failed logon attempts that results in the user account being locked?
reset account lockout counter after
account lockout complexity
account lockout threshold
account lockout duration
Question 48. To enable the auditing of failure account logon events, you must access the ____ setting to check the Failure check box.
Audit object access
Audit process tracking
Audit account management
Audit account logon events
Question 49. In order to change the scope of a group, the domain functional level must be at least at the ____ level.
Windows 2000 mixed
Windows 2000 native
Windows Server2003/2008
Windows NT 4.0
Question 50. What is the name of the hidden administrative share that provides an administrator with access to the root of the C drive on a computer?
C$
Admin$
Manage$
Cdrive$
Question 51. The easiest method of determining the groups that a user belongs to is via the ____ tab in the properties of their user account.
General
Advanced
Member Of
Profile
Question 52. To find the IRQ line used by a particular device, you look on the ____ tab of the properties of a device in Device Manager.
Resources
General
Advanced
Interrupts
Question 53. In tuning the size of a paging file, what are the two parameters that need to be set?
recommended size and default size
minimum size and additional size
recommended size and expansion amount
initial size and maximum size
Question 54. A Windows Server2003/2008 system configured as part of a network workgroup would be properly referred to by which of the following?
domain controller
standalone server
member server
configurable server
Question 55. Typing ____ at the command line will allow you to view the complete list of switches and options available with the DSMOD USER command.
DSMOD USER HELP
DSMOD HELP USER
DSMOD ?
DSMOD USER /?
Question 56. Which of the following consists of object class and attribute definitions?
Domain Name Service (DNS)
Microsoft Management Console
organizational unit
Active Directory schema
Question 57. You can refresh Group Policy settings manually by running ____ from the command prompt.
UPDATEPOL.EXE
REFRESHPOL.EXE
GPUPDATE.EXE
POLICYUP.EXE
Question 58. One of the most common troubleshooting tasks for any network administrator is ensuring the ____ of the shared network printers.
encryption properties
continued availability
security strength
paper quality
Question 59. Which of the following is an advantage of using an OU structure?
the ability to delegate administrative control to specific users
the ability to replicate Active Directory schemas
the ability to automatically schedule backups
the ability to add snap-ins to a console
Question 60. Which of the following built-in containers holds built-in groups that are created automatically when Active Directory is installed?
Users
Groups
Admins
Guests
Question 61. Match each term with the correct statement below.
Potential Matches:
1 : users unable to log on locally
2 : domain controller issues
3 : logon hour restriction issues
4 : client time setting issues
5 : UPN logon issues
6 : account disabled issues
7 : account lockout issues
8 : workstation restrictions
9 : remote access logon issues
10 : down-level client issues
Question 62. Match each term with the correct statement below.
Potential Matches:
1 : user mode
2 : install mode
3 : Read permission
4 : Software Update Services
5 : Set options
6 : Attribute-level permissions
7 : Object-level permissions
8 : Delegation of Control Wizard
9 : Full Control permission
10 : Monitor server
Question 63. Match each term with the correct statement below.
Potential Matches:
1 : Network Functions
2 : Virtual Memory
3 : Time sharing
4 : Process
5 : Address space, registers and process table
6 : Spooler
7 : Multitasking
8 : Process Manager, Device Manager, File Manager, and Memory Manager
9 : Level1 and/or Level2 child processes
10 : Process manager