Microsoft Server 70-411 (testbank) – Flashcards

Unlock all answers in this set

Unlock answers
question
What is the default authentication protocol for non-domain computers? a. NTLM b. PAP c. CHAP d. Kerberos
answer
NTLM
question
What does the acronym NTLM stand for? a. NT Link Messenger b. NT Link Manager c. NT LAN Manager d. NT LAN Messenger
answer
NT LAN Manager
question
NTLM uses a challenge-response mechanism for authentication without doing what? a. revealing the client's operating system to the server b. revealing the protocol to the server c. sending a password to the server d. sending an encrypt/decrypt message to the server
answer
sending a password to the server
question
What type of protocol is Kerberos? a. a secure network authentication protocol b. a simple Microsoft-only protocol c. a uni-directional authentication protocol d. a certificate-based authentication protocol
answer
a secure network authentication protocol
question
Kerberos security and authentication are based on what type of technology? a. secure transmission b. secret key c. challenge-response d. legacy code
answer
secret key
question
What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly? a. 1 minute b. 5 minutes c. 15 minutes d. 45 minutes
answer
5 minutes
question
Which three components make up a service principal name (SPN)? a. service name, IP address, and port number b. service name, URL, and host name c. service name, host name, and IP address d. service class, host name, and port number
answer
service class, host name, and port number
question
What happens if a client submits a service ticket request for an VPN that does not exist in the identity store? a. An event is written to the Kerberos server's event log. b. The client receives an access denied error. c. The Kerberos server receives an access denied error. d. The Kerberos ticket for that service is destroyed.
answer
The client receives an access denied error.
question
Which tool can you use to add SPNs to an account? a. Notepad b. LDAP c. Microsoft Word d. ADSI Edit
answer
ADSI Edit
question
Identify another utility that you can use to add SPNs to an account. a. dnscmd b. spnedit c. setspn d. netsh
answer
setspn
question
What type of account is an account under which an operating system, process, or service runs? a. user b. system c. service d. network
answer
service
question
By default which service accounts will the Windows PowerShell cmdlets manage? a. standalone MSAs b. standard local service accounts c. Group MSAs d. domain user accounts designated as service accounts
answer
Group MSAs
question
Which of the following is the format for a virtual account used with Windows Server 2008 R2, and Windows Server 2012, and Windows Server 2012 R2? a. domainnameservicename b. computernameservicename c. NT Serviceservicename d. NT Serviceservicename$
answer
NT Serviceservicename
question
The domain controllers are the computers that store and run the _______________. a. user database b. services database c. Managed Service Accounts database d. Active Directory database
answer
Active Directory database
question
How many PDC Emulators are required, if needed, in a domain? a. one b. two c. three d. four
answer
one
question
You do not place the infrastructure master on a global catalog server unless what situation exists? a. You have a single domain. b. You have Windows NT 4.0 systems to support. c. You have multiple schemas. d. Your AD DS is Windows 2008 or higher.
answer
You have a single domain.
question
When you add attributes to an Active Directory object, what part of the domain database are you actually changing? a. FSMO b. schema c. directory structure d. organizational units
answer
schema
question
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly? a. Schema Master b. Forest c. RODC d. Operations Master
answer
Operations Master
question
How many global catalogs are recommended for every organization? a. at least one b. at least two c. at least three d. no fewer than four
answer
at least two
question
Where are you most likely to see a Read-Only Domain Controller (RODC)? a. in a small network instead of in an enterprise b. in an enterprise network c. in a remote site d. in the place of a standard domain controller
answer
in a remote site
question
Beginning with which server version can you safely deploy domain controllers in a virtual machine? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2008 R2 d. Windows Server 2012
answer
Windows Server 2012
question
What utility must you run on a cloned system to ensure that the clone receives its own SID? a. adprep /renew b. sysprep c. dcpromo d. ntconfig
answer
sysprep
question
Which type of system must you connect to and use to make changes to Active Directory? a. RODC b. Forest Master c. writable domain controller d. domain tree
answer
writable domain controller
question
Which version of Windows Server introduced incremental universal group membership replication? a. Windows Server 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows Server 2012
answer
Windows Server 2003
question
What are the three types of groups in a domain? a. domain trust groups, domain schema groups, and universal groups b. domain local groups, global groups, and universal groups c. global groups, domain trust groups, and schema groups d. universal groups, global catalog groups, and schema groups
answer
domain local groups, global groups, and universal groups
question
What function does the CSVDE tool perform? a. It decrypts and encrypts Active Directory information. b. It exports/imports Active Directory information. c. It exports/imports data from Event Viewer. d. It extracts Event Viewer information into CSV files.
answer
It exports/imports Active Directory information.
question
If a single domain controller's AD database becomes corrupt, which type of restore should you perform on it? a. authoritative b. nonauthoritative c. explicit d. full
answer
nonauthoritative
question
To perform an authoritative restore, into what mode must you reboot the domain controller? a. Repair b. Safe c. Command line with networking d. DSRM
answer
DSRM
question
What is a GUID? a. a unique identifier for a snapshot b. a special file permission c. an Active Directory object ID d. a group-user ID in Active Directory
answer
a unique identifier for a snapshot
question
What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory containers and obects? a. the Active Directory Lost and Found folder b. the Active Directory Recycle Bin c. the Active Directory Undelete utility d. Active Directory Snapshots
answer
the Active Directory Recycle Bin
question
By default, how often does Active Directory "garbage collection" occur? a. every 45 minutes b. every 2 hours c. every 8 hours d. every 12 hours
answer
every 12 hours
question
After you undelete a user account with the LDP utillity, what action do you need to perform? a. Remove the old identifier. b. Re-establish user to domain trust. c. Reset the user's password. d. Restore the user-owned objects from a backup.
answer
Reset the user's password.
question
In interactive mode, what aspect of AD can you check with the 'ntdsutil integrity' command? a. low-level database corruption b. fragmentation levels c. accuracy of entries d. completeness of entries
answer
low-level database corruption
question
What is the proper procedure for removing a domain controller from Active Directory? a. Shut down the domain controller and manually remove it from AD. b. Use dcdemo to demote the domain controller. c. Uninstall Active Directory Domain Services. d. Enter the DSRM and delete Active Directory.
answer
Uninstall Active Directory Domain Services.
question
Which of the following ntdsutil commands cleans up metadata? a. metadata defrag b. metadata restore c. metadata cleanup d. metadata repair
answer
metadata cleanup
question
To perform an authoritative restore of an obect or subtree, what bit of information do you need to know about the object? a. its formal name b. its exact location c. its OU and proper name d. its distinguished name
answer
its distinguished name
question
When you do an authoritative restore process, a back-links file is created. What is a back-links file? a. a reference to an attribute within another object b. a reference to metadata c. a pointer to the obect's OU d. a reference to a distinguished name location
answer
a reference to an attribute within another object
question
Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature? a. The DSRM console b. The ntdsutil command-line utility c. Active Directory Maintenance Mode d. Restartable Active Directory Domain Services
answer
The ntdsutil command-line utility
question
Which utility do you use to defragment Active Directory? a. CSVDE b. LDIFDE c. ntdsutil d. defrag
answer
ntdsutil
question
What are examples of password policies? Select all that apply. a. history b. length c. complexity d. age
answer
age
question
Why primarily are account lockout policies put into place? a. privacy b. security c. policy d. regulations
answer
security
question
What is the default setting for password history? a. 6 b. 10 c. 16 d. 24
answer
24
question
What is the default minimum password length in characters? a. 5 b. 7 c. 8 d. 10
answer
7
question
By default, who has read/write capability to the Default Domain Policy? a. local administrators b. power users c. domain users d. domain administrators
answer
domain administrators
question
How should you assign Password Settings objects (PSOs) to users? a. Assign the PSOs directly to individual users. b. Assign the PSOs to a new group and add the users to the new group. c. Assign the PSOs to a global security group and add users to the group. d. Assign the PSOs to various Active Directory groups as needed.
answer
Assign the PSOs to a global security group and add users to the group.
question
What is the primary advantage of using Group Policies in a domain environment? a. ease of enforcement b. user compliance c. centralized management d. ease of creation
answer
centralized management
question
What is the secpol.msc utility used for? a. editing group policies b. editing local security policies c. editing global security policies d. editing domain-level policies
answer
editing local security policies
question
What does the minimum password age setting control? a. how many seconds a user must wait before a password reset b. how many minutes a user must wait before a password reset c. how many hours a user must wait before a password reset d. how many days a user must wait before a password reset
answer
how many days a user must wait before a password reset
question
Why should administrator passwords change more often than user passwords? a. because administrator passwords are usually simpler than user passwords b. because administrator accounts carry more security sensitivity than users do c. because administrators are paranoid about security d. because administrator accounts are watched by management in large companies
answer
because administrator accounts carry more security sensitivity than users do
question
What is the range of password history settings? a. 0 to 9 b. 0 to 15 c. 0 to 24 d. 0 to 63
answer
0 to 24
question
What is an easy method of creating a strong password? a. Use your username and add numbers and special characters. b. Use your favorite football team's name with numbers and special characters. c. Ask a friend for some ideas for good passwords and then add your own number and characters. d. Start with a sentence and then add numbers and special characters.
answer
Start with a sentence and then add numbers and special characters.
question
By default, which of the following represents the maximum amount of time by which a computer's internal clock can be inaccurate yet still be able to use Kerberos authentication? a. 30 seconds b. 1 minute c. 5 minutes d. 8 minutes
answer
5 minutes
question
Which feature affects all users in the domain, including domain controllers? a. Global Group Policy b. Default Domain Policy c. Default Group Policy d. Default Global Domain Policy
answer
Default Domain Policy
question
In which order are Group Policy objects (GPOs) processed? a. Local group policy, Site, Domain, User b. OU, Domain, Site, Local group policy c. Local security policy, Site, Domain, OU d. Local group policy, Site, Domain, OU
answer
Local group policy, Site, Domain, OU
question
What is the default timeout value for GPOs to process on system startup? a. 60 seconds b. 120 seconds c. 300 seconds d. 600 seconds
answer
600 seconds
question
GPOs are processed on computer startup and after logon. Why is the user never aware of the processing? a. Processing is hidden from the user. b. The user is too busy to be aware of the processing. c. The processing occurs when the system is not being used. d. The user is aware of only startup delays.
answer
Processing is hidden from the user.
question
What is the first step in the GPO processing order? a. The user initiates interactive logon. b. The computer obtains a list of GPOs from the domain controller. c. The computer establishes a secure link to the domain controller. d. The GPOs are applied to the computer and to the user.
answer
The computer establishes a secure link to the domain controller.
question
The downward flow of group policies is known as what feature of GPOs? a. cumulative processing b. inherent processing c. inheritance d. control
answer
inheritance
question
If a site, domain, or OU has multiple GPOs, how are the group policies processed? a. by precedence b. by importance c. by administrative control d. by GPO controller policy
answer
by precedence
question
By default, which GPO permissions are all authenticated users given? a. Apply Group b. Allow Group c. Apply Global d. Allow Global
answer
Apply Group
question
At what point are WMI filters evaluated? a. when the filter is created b. when the policy is applied c. when the filter is applied d. when the policy is processed
answer
when the policy is processed
question
To use WMI filters, you must have one domain controller running which version of Windows Server or higher? a. NT 4.0 b. 2000 c. 2003 d. There is no such requirement to use WMI filters.
answer
2003
question
How many WMI filters can be configured for a GPO? a. one b. two c. four d. eight
answer
one
question
What kind of group policies should you enable for student computers? a. generic b. loopback c. extensive d. compliant
answer
loopback
question
You are administrator of a corporation with clients running Windows 8 or Windows 8.1. Your domain controllers are running Windows Server 2012 R2. You have made a change to a GPO and you want the GPO settings to be applied immediately. What can you do? a. At the domain controller, execute the Gpupdate /force command. b. Copy the GPO to all domain controllers using Active Directory Sites and Services. c. On the domain controller, execute the Windows PowerShell Invoke-GPUupdate cmdlet. d. Enable the Group Policy Caching feature using a GPO.
answer
On the domain controller, execute the Windows PowerShell Invoke-GPUupdate cmdlet.
question
Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings? a. GPO Turbo Mode b. GPO Enhanced Mode c. Group Policy Update d. Group Policy Caching
answer
Group Policy Caching
question
What is an ADMX file? a. an ADM file translator b. the ADM format for newer operating systems c. a template buffer d. the protocol that deploys ADM files across networks
answer
the ADM format for newer operating systems
question
What is the Central Store? a. an App Store from which you can deploy GPOs b. a public share that allows users to place GPO requests into a queue c. a repository for Administrative Templates d. an online App Store for Administrative Templates
answer
a repository for Administrative Templates
question
What is the name of the software component used for installation, maintenance, and removal of software on Windows? a. Control Panel b. Add/Remove Programs applet c. Windows Installer d. Application Installer
answer
Windows Installer
question
What is the filename extension for the files in which installation information is stored? a. .txt b. .xml c. .ini d. .msi
answer
.msi
question
What are MST files used for? a. They deploy customized software installation files b. They are template files for software packages c. They are custom patch files d. They specialize in software installation test files
answer
They deploy customized software installation files
question
Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it? a. Convert it to a ZIP file b. Convert it to an MSI file c. Convert it to an MSP file d. Convert it to an MST file
answer
Convert it to an MSI file
question
Where is the default location for ADMX files? a. C:WindowsSYSVOLADMX b. C:WindowsSystem32XMLADMX c. C:WindowsInf d. C:WindowsPolicyDefinitions
answer
C:WindowsPolicyDefinitions
question
What language are ADMX files based on? a. HTML b. XML c. SGML d. Java
answer
XML
question
Unlike ADM files, ADMX files are not stored where? a. in the Central Store b. on the domain controller c. in the SYSVOL folder d. in individual GPOs
answer
in individual GPOs
question
Where is the Central Store located? a. in the SYSVOL directory b. Microsoft Online c. TechNet d. on a domain controller public share
answer
in the SYSVOL directory
question
Which domain users are automatically granted permissions to perform Group Policy Management tasks? a. local administrators b. power users c. domain administrators d. domain users
answer
domain administrators
question
If you don't want a GPO to apply, which group policy permission do you apply to user or group? a. Disallow Read b. Disallow Write c. Disallow Modify d. Disallow Apply
answer
Disallow Apply
question
When you're about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the change? a. that you're about to reset policies to their defaults b. that all User Rights Assignments will be replaced c. that all security for the domain will be overwritten d. that you're about to restore all security to the default
answer
that all User Rights Assignments will be replaced
question
Which utility do you use to create GPO preferences? a. Group Policy Management Editor b. Group Policy Preference Editor c. Group Policy Editor d. Group Policy Wizard
answer
Group Policy Management Editor
question
For GPP editing states, which key do you use to toggle Enable Current? a. F4 b. F5 c. F6 d. F7
answer
F6
question
How do you stop processing a preference if an error occurs? a. Select the Stop processing items option on the Common tab. b. Select the Remove this item option on the Common tab. c. Select the Stop on any error option in the GPP Wizard. d. Select the Stop on all errors option in the GPP Wizard.
answer
Select the Stop processing items option on the Common tab.
question
Which Windows extension allows you to copy registry settings and apply them to other computers, create, replace or delete registry settings? a. Applications b. Environment c. Files d. Registry
answer
Registry
question
Which Windows extension allows you to add, replace or delete sections or properties in configuration settings or setup information files? a. .ini files b. files c. folders d. environment
answer
.ini files
question
To support GPPs on older Windows versions (Server and Workstation), you have to install what component from Microsoft? a. GPP Registry Tweaks b. GPP Service Pack 1 c. A special GPP hotfix d. GPP Client-Side Extensions
answer
GPP Client-Side Extensions
question
Which component allows you to create multiple Registry preference items based on registry settings that you select? a. the Registry Scope b. the Registry Extension c. the Registry Configurator d. the Registry Wizard
answer
the Registry Wizard
question
Which term describes changing the scope of individual preference items so that the preference items apply only to selected users or computers? a. individual targeting b. user-specific targeting c. item-level targeting d. focused targeting
answer
item-level targeting
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New