CPT 255 DR B’s Practice Final
Flashcard maker : Lily Taylor
When you create Active Directory sites, which of the following is not a primary reason to conserve bandwidth?
reduce encryption traffic
Which type of trust can be used to form a relationship with a UNIX Kerberos network?
Which tool is used to migrate objects within or between forests?
Which of the following statements best describes the most likely placement of a Read-Only Domain Controller (RODC)?
An RODC is most likely to be placed in a remote site.
Which of the following should be defined in order to conserve bandwidth between sites within a single domain?
A bridgehead server
Which firewall configuration is a single-point firewall that connects the internal network and the Internet?
Although the changes themselves are relatively simple, why is changing the AD Schema so important? (Choose two answers.)
The changes could corrupt the database.
The changes affect all objects for that object type.
The changes affect all objects for that object type.
Which feature or role must be installed in order to extend the Active Directory schema with UNIX attributes?
Identity Management for UNIX
Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects zone status events from DNS servers?
Every 30 minutes
Which utility is used to manage Active Directory from the command line?
Which forest model would is based on the resources that the users and groups will access?
Resource forest model.
Which type of connectivity does DirectAccess establish between workstation and server?
Which replication model uses the central office as the main site that updates all remote sites?
A hub and spoke topology
Which VPN tunneling protocol uses IPSec with 3DES for data confidentiality?
Before you perform any upgrade procedure, you should perform which of the following steps?
You should backup the entire system.
Which form of authentication is used by SSTP?
Which of the following is a distributed file system protocol used to access files over the network that was originally created for UNIX and Linux file server clients?
Which of the following terms best describes the special resource record that Windows Server 2012 R2 DHCP will create to track which machine originally requested a specific name in DNS?
Dynamic Host Configuration Identifier
Which of the following terms best describes the high-availability technology that establishes multiple sessions or connections to the Fibre Channel storage array by using redundant path components such as switches, adapters, and cables?
Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects IP address space usage data from DHCP servers?
Every 2 hours
What is the purpose of DNS Cache Locking?
It prevents an attacker from replacing records in the resolver cache while the Time to Live (TTL) is still in force.
Which type of Active Directory domain controller is recommended to minimize security risks for remediation servers?
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?
When a user changes his or her password, to which domain controller is the password change notification sent?
The PDC Emulator
In Window Server 2012 R2 IPAM, what is the second-highest-level entity within the IP address space?
IP address range
Which of the following terms best describes an area of an AD DS network in which all domain controllers are well connected with fast and reliable network links?
Regarding DNSSEC, which of the following terms describes the new records created once a zone is signed?
DNSSEC resource records
Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides basic NFS sharing with authentication and permissions with the least administrative effort. Which of the following should be selected?
Your company has started to develop several products for the military. Because of the security necessary for these products, you need to keep your environment isolated. Which of the following actions should you perform?
Create a separate forest
When a file is accessed using NFS, which attributes are used by the NFS server to determine if the user has the required permissions to access the file?
UID and GID
IPv6 addresses are written using which of the following number systems?
You are ready to use the lite touch deployment for Windows Server 2012 R2 and WDS. You have approximately 200 servers running Windows Server 2008 R2 and 100 servers running Windows Server 2012. You need to look at all servers and determine which servers can be upgraded to Windows Server 2012 R2. How should you analyze your computers?
Run the Microsoft Assessment and Planning (MAP) Toolkit
Which of the following terms best defines a chain of site links by which domain controllers from different sites can communicate?
Which of the following DNS zones are replicated to all domain controllers within the forest?
forestDNS zones application partition
How can you go about obtaining Windows PE 4.0 for usage in your organization?
Download the Windows 8 Assessment and Deployment Kit
The ISTG automatically assigns one server in each site as the bridgehead server unless you override this by establishing a list of __________ bridgehead servers.
For users to receive GPO settings, they must have which two permissions to the GPO
Allow Read & Allow Apply Group Policy
Which feature allows you to deploy additional virtual machines to a tier when the load of the tier increases?
Which database engine is used for the DHCP database in Windows Server 2012 R2?
Which of the following is a disadvantage of a centralized DHCP infrastructure?
increased burden on the servers
By default, which database is used with IPAM?
Windows Internal Database
You want to deploy IPAM in an Active Directory Forest. Which topology should you use when you want a single IPAM server for the entire forest?
When enabling NAP for DHCP scopes, how should you roll out the service?
for individual DHCP scopes
When configuring DHCP failover partners, the time synchronization between the partners is critical. What is the maximum allowable time skew between DHCP failover partners?
Which migration path is a two-phase process in which you first upgrade an existing forest and domain and then organize the AD objects as needed?
Which of the following is the minimum domain functional level needed to support domain renaming?
Windows Server 2003
Which command-line tool allows you to create and display an RSoP query from the command line?
In Hyper-V, which of the following terms best describes the process used to convert a physical computer to virtual server?
Which type of key is needed with Active Directory-Based Activation?
When deploying a computer, which images deploy the quickest?
You have a reference computer on which you just installed Windows and all of the necessary applications. You then configured Windows. You are now ready to capture the system. Which of the following statements describes the next step you should take?
You need to run sysprep.
If you don’t want a GPO to apply, which Group Policy permission is applied to a user or group?
Deny Apply Group Policy
Which storage space resiliency type can be used to protect up to a single drive failure and requires a minimum of three drives?
Which of the following is the underlying network protocol used by iSCSI storage network?
Network Access Protection (NAP) is Microsoft’s software for controlling network access of computers based on which of the following?
a computer’s overall health
Members of which IPAM security group have the ability to view information in IPAM and can perform server management tasks?
IPAM MSM Administrators
By default, the DHCP Server service in Windows Server 2012 R2 uses dynamic allocation, leasing IP addresses to clients for how many days?
The Run the Remote Access Setup Wizard divides the installation into four separate installations that give you a great deal of control over settings and configurations. Which of the following is the correct description for the installation of Application Servers?
Configure your end-to-end authentication and security for the DirectAccess components. It also provides secure connections to individual servers.
Which of the following terms best describes the period necessary for a change to replicate to all domain controllers?
The latency period
Which site link object is used when all sites are connecting using WAN links running at the same speed and with the same available bandwidth?
Which of the following is not a business requirement that you should consider when designing an Active Directory infrastructure?
Regarding DNSSEC, against which of the following will DNS clients verify digital signatures returned alongside a requested resource record?
Which of the following is used to allow storage providers to develop multipath solutions for their devices or optimize connectivity with the storage arrays?
Which PowerShell cmdlet creates the IPAM provisioning GPOs?
What is the most basic requirement for a DirectAccess implementation?
The DirectAccess server must be part of an Active Directory domain.
An install image contains the operating system that WDS will install on the client computer. Which file from the Windows Server 2012 R2 installation DVD is used to install the operating system?
Which of the following can be used to simplify the deploying of VMs using VMM service templates by breaking the service templates into smaller, more manageable pieces?
Which of the following terms best describes the amount of time that it takes for all domain controllers in the environment to contain the most up-to-date information?
Which of the following tasks can be performed when you right-click on a DHCP-issued IP address in the IP Address Inventory section of the IPAM console? (Choose all that apply.)
Delete DHCP reservation
Delete DNS host record
Create DHCP reservation
Delete DNS host record
Create DHCP reservation
Which of the following networks represents the multicast network space, as defined in a default classful network?
18.104.22.168 to 22.214.171.124
Which value represents the default size of the DNS socket pool?
By using the Active Directory-integrated zone, DNS follows which of the following types of models?
A multi-master model
Which protocol transmits a Neighbor Solicitation message to determine whether any other computer on the link is using the same IPv6 address?
IPv6 Neighbor Discovery
Which of the following components must a NAP client have enabled in order to use NAP? (Choose all that apply.)
Which of the following is used to maximize the consistency of permissions on privileged users and groups?
IPv4 addresses use an address space that is _____ bits long; IPv6 addresses use an address space that is _____ bits long.
Which of the following represents the physical connection between remote sites?
Which of the following terms best describes the primary advantage to enabling round-robin DNS?
Which of the following criteria can be used to create conditions in a DHCP policy? (Choose all that apply.)
Which of the following terms describes the first domain in the forest?
Forest root domain
After a DNS zone has been secured with DNSSEC, what additional data will be returned to a client as a result of a query?
Digital signatures for the returned records will be returned.
Which of the following can be used to add SPNs to an account?
Which of the following can be imported into IPAM using the IPAM console?
All of the above
During the process of calculating intra-site replication partners, which value best represents the maximum number of hops that the Knowledge Consistency Checker will allow between domain controllers?
To create an NFS shared folder on a cluster, you must install which of the following items on each cluster node?
All of the above
In addition to meeting operating system requirements, a DirectAccess client must be a member of which of the following?
an AD domain
Which of the following allows you to create an active-active failover cluster where all file shares are online at the same time?
How many global catalogs are recommended for every organization?
at least two
Which of the following categories will you not find in the Monitor and Manage section of the IPAM console?
DNS Zone Records
Which type of trust can be used to optimize the authentication process to resources in l forests with many domains?
Which feature introduced in Windows Server 2012 R2 allows you to use SSD and standard hard drive storage with the same storage pool while storing more frequently access data on the SSD media?
How many Primary Domain Controller Emulators are required in a domain?
Which of the following strategies can be deployed in an effort to avoid placing a domain controller at every site?
Ensure that you have large bandwidth between the site and the central office.
Before designing your forests and domains, you must collect information for the following except the ___________?
version of Microsoft Office
Which component is needed for the Zero-Touch, High-Volume Deployment strategy?
System Center 2012 R2 Configuration Manager
Where should the schema master be placed?
The forest root
Which of the following programs can be used to manage your sites?
Active Directory Sites and Services
Group Policy __________ is used to simulate the effect of a policy on the user environment.
Unlike traditional VPN connections, DirectAccess connections are established automatically and provide which kind of connectivity?
always on and seamless
Which DNS record contains the serial number for the zone?