Ch 5-8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

5-4. Which of the following best describes a GUID? a. A GUID is a unique identifier for a snapshot. b. A GUID is a special file permission. c. A GUID is an Active Directory object ID. d. A GUID is a group-user ID in Active Directory.

a. A GUID is a unique identifier for a snapshot.

5-12. When you perform an authoritative restore, a back-links file is created. Which of the following best describes a back-links file? a. A back-links file is a reference to an attribute within another object b. A back-links file is a reference to metadata c. A back-links file is a pointer to the object's OU d. A back-links file is a reference to a distinguished name location

a. A back-links file is a reference to an attribute within another object

5-41. Which of the following scenarios best represents an urgent replication-inducing event? a. A change in the domain account lockout policies b. The creation of a new user account in the domain c. The changing of a user account password d. Replication performed to correct a replication conflict

a. A change in the domain account lockout policies

6-38 When configuring site link costs in Active Directory, which of the listed WAN links might be considered the most "costly"? a. A demand-dial analog link b. A 3 MBps ADSL link c. A 50 MBps cable modem link d. A 100 MBps MPLS link

a. A demand-dial analog link

6-2. Which data is found on a Global Catalog server? (*Choose two answers*) a. A full copy of all Active Directory objects in the directory for its host domain b. A partial copy of all Active Directory objects in the directory for its host domain c. A full copy of all objects for all other domains in the forest d. A partial copy of all objects for all other domains in the forest

a. A full copy of all Active Directory objects in the directory for its host domain d. A partial copy of all objects for all other domains in the forest

6-14. Which console is used to configure additional UPN suffixes for your domain? a. Active Directory Domains and Trusts b. Active Directory Sites and Services c. Active Directory Configuration d. Active Directory Manager

a. Active Directory Domains and Trusts

6-11. Which of the following desirable features first became available with the Windows Server 2008 R2 forest functional level? a. Active Directory recycle bin b. Domain rename c. Cross-forest trusts d. KCC algorithm improvements

a. Active Directory recycle bin

7-18. A user must already have which two group policy permissions for new permissions to be applied to their accounts for GPO delegation? (*Choose Two*) a. Allow Read b. Allow Write c. Allow Apply d. Allow Modify

a. Allow Read c. Allow Apply

6-29. Which Active Directory component is automatically configured to replicate changes made during Intrasite replication to a domain controller in another site? a. Bridgehead servers b. Knowledge Consistency Checker c. Site links d. Intersite Topology Generator

a. Bridgehead servers

6-34 Which of the following scenarios represents the best reason for creating a forest trust between two Active Directory forests? a. Company A has purchased Company B b. Company A wants to use an application developed by Company B c. Company B wants to access data on a Company A web server d. Company B wants to send email to recipients in Company A

a. Company A has purchased Company B

6-33 The creation of a trust between external forests or domains depends on both sides of the trust (domains or forests, as applicable) being able to resolve the forest or domain names on each side of the trust. Which DNS configuration is most commonly used in the real world? a. Configure conditional forwarders b. Configure a shared DNS server c. Configure secondary zones d. None of the above

a. Configure conditional forwarders

6-22. Your organization is arranged in a Hub-and-Spoke topology with the main office as the hub and all branch offices as spokes. Which two methods can be used to allow the branch offices (remote sites) to replicate directly with each other, not requiring replication via the main office? (*Choose two answers*) a. Enable the "Bridge All Site Links" option, with no further actions taken b. Create Site Link Bridges between the remote sites c. Disable the "Bridge All Site Links" option, with no further actions taken d. Create Site Link Bridges between the main office and the remote sites

a. Enable the "Bridge All Site Links" option, with no further actions taken b. Create Site Link Bridges between the remote sites

7-6. Which of the following is the Microsoft Management Console (MMC) snap-in used to create GPOs and manage their deployment to AD DS objects? a. Group Policy Management console b. Active Directory Administrative Center c. Server Manager d. Disk Management

a. Group Policy Management console

5-38. Why is it necessary to back up the Windows system state? a. It's needed to perform a full system restore. b. It's a precautionary move against failure. c. It's standard practice to do so. d. In some commercial third-party software backup programs, it's mandatory.

a. It's needed to perform a full system restore.

7-1. Which of the following is the proper term for associating a Group Policy to a set of AD DS objects? a. Linking b. Connecting c. Implementing d. Granting

a. Linking

6-7. Which of the following desirable features first became available with the Windows Server 2008 domain functional level? a. SYSVOL replication using DFSR instead of NTFRS b. Automatic SPN management c. Authentication mechanism assurance d. UserPassword attribute

a. SYSVOL replication using DFSR instead of NTFRS

5-35. Which SYSVOL replication migration state is performed entirely using FRS? a. Start (State 0) b. Prepared (State 1) c. Redirected (State 2) d. Eliminated (State 3)

a. Start (State 0)

5-29. Which of the following requirements must be met in order to configure the Filtered Attribute Set? (*Choose all that apply*) a. The Schema Master must be on a domain controller running Windows Server 2008 or higher b. The Schema Master must be on a domain controller running Windows Server 2012 R2 or higher c. You must perform the change directly on the Schema Master d. You must perform the change at the command line using the netdom command

a. The Schema Master must be on a domain controller running Windows Server 2008 or higher c. You must perform the change directly on the Schema Master

6-3. In an organization that has three Active Directory forests with a total of six Active Directory domains, how many schemas will exist in the organization? a. Three b. Six c. Nine d. Eighteen

a. Three

5-27. Why must an RODC be able to connect to at least one Windows Server 2008 or higher domain controller? (*Choose all that apply*) a. To replicate the domain partition b. To replicate the global catalog partition c. So that the Password Replication Policy (PRP) applied to the RODC can be configured and enforced d. So that the SYSVOL folder can be replicated using Distributed File System Replication (DFSR)

a. To replicate the domain partition c. So that the Password Replication Policy (PRP) applied to the RODC can be configured and enforced

5-43. Which of the following represents the best reason why you might want to prepopulate passwords on an RODC? a. To speed up the initial login for the user at that site b. To speed up every login for the user at that site c. To reduce replication traffic to that site d. To prevent security principals from needing to be added to the "Allowed RODC Password Replication Group" security group

a. To speed up the initial login for the user at that site

6-8. Which domain functional level is no longer supported by Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 domain controllers? a. Windows 2000 native b. Windows Server 2003 c. Windows Server 2008 d. Windows Server 2008 R2

a. Windows 2000 native

6-10. Your forest functional level is currently set to Windows Server 2008. Which operating systems can domain controllers run on? (*Choose all that apply*) a. Windows Server 2008 b. Windows Server 2008 R2 c. Windows Server 2012 R2 d. Windows Server 2003 e. Windows Server 2016

a. Windows Server 2008 b. Windows Server 2008 R2 c. Windows Server 2012 R2 d. Windows Server 2003 e. Windows Server 2016

5-39. An Active Directory snapshot is which kind of backup? a. a shadow copy b. a simple file copy c. a compressed (zipped) copy d. a file copy plus metadata

a. a shadow copy

5-17. Which file is used to track the point up to which transactions in the log file have been committed? a. edb.chk b. temp.edb c. ntds.nit d. edb.log

a. edb.chk

7-15. Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? (*Select all that apply*) a. if they've become corrupted b. to refresh policy settings c. as a regular part of domain maintenance and housekeeping d. if someone deleted one or more of the policies

a. if they've become corrupted d. if someone deleted one or more of the policies

7-8. Which of the following is the process whereby, after you link a GPO to a site with multiple domains, the Group Policy settings are applied to all the domains and the child objects beneath them? a. inheritance b. linking c. downward application d. relevance

a. inheritance

5-8. In interactive mode, which aspect of AD can be checked with the ntdsutil integrity command? a. low-level database corruption b. fragmentation levels c. accuracy of entries d. completeness of entries

a. low-level database corruption

7-13. Which capability allows you to create specific GPO settings for one or more local users configured on a workstation? a. multiple local GPOs b. local GPO c. starter GPO d. domain GPO

a. multiple local GPOs

6-24. Which of the following is the least possible replication interval that can be configured for site links? a. 5 minutes b. 15 minutes c. 10 minutes d. 30 minutes

b. 15 minutes

7-5. Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based administrative template (ADM) files. What did Microsoft replace ADM files with, which is used in Windows Server 2012 and later? a. ADMX files (HTTP-based file format) b. ADMX files (XML-based file format) c. ADMX files (XLS-based file format) d. ADMX files (INF-based file format)

b. ADMX files (XML-based file format)

6-17. Which management console is used to manage Active Directory Sites? a. Active Directory Topology Manager b. Active Directory Sites and Services c. Active Directory Domains and Trusts d. Active Directory Sites and Subnets

b. Active Directory Sites and Services

7-20. Which of the following is a collection of files stored in the SYSVOL (%SystemRoot%\SYSVOL\<Domain>\Policies\<GPOGUID>) of each domain controller? a. Group Policy Container (GPC) b. Group Policy Template (GPT) c. migration table d. delegation

b. Group Policy Template (GPT)

5-1. Which function is performed by the CSVDE tool? a. It decrypts and encrypts Active Directory information. b. It exports/imports Active Directory Domain Services objects. c. It exports/imports data from Event Viewer. d. It extracts Event Viewer information into CSV files.

b. It exports/imports Active Directory Domain Services objects.

5-24. Which of the following best describes how the KCC creates a replication topology for each partition of the Active Directory database? a. It will create one replication topology for the domain partition, and a second replication topology for the remaining partitions b. It will create a separate replication topology for each partition c. It will create one replication topology for the schema partition and a second replication topology for the remaining partitions d. It will create one replication topology for the configuration partition and a second replication topology for the remaining partitions

b. It will create a separate replication topology for each partition

6-31. Which of the following is the Active Directory component that dynamically creates connection objects between domain controllers used for replication? a. Bridgehead servers b. Knowledge Consistency Checker c. Site links d. Intersite Topology Generator

b. Knowledge Consistency Checker

6-18. Which PowerShell cmdlet is the correct one to use to create a new Active Directory site? a. New-ADSite b. New-ADReplicationSite c. New-ADSiteLocation d. Add-ADReplicationSite

b. New-ADReplicationSite

5-36. In which SYSVOL replication migration state is DFSR replication performed in the background? a. Start (State 0) b. Prepared (State 1) c. Redirected (State 2) d. Eliminated (State 3)

b. Prepared (State 1)

6-9. You want to use the new features of Key Distribution Center (KDC) support for claims, compound authentication, and Kerberos armoring in your domain. Which of the following must first be done? (*Choose two answers*) a. Raise the domain functional level to Windows Server 2008 R2 b. Raise the domain functional level to Windows Server 2012 c. Install at least one Windows Server 2012 domain controller d. Retire all Windows 2000 Server member servers

b. Raise the domain functional level to Windows Server 2012 c. Install at least one Windows Server 2012 domain controller

6-4. Which default security group is created to allow designated users to manage the Active Directory schema of the forest? a. Enterprise Admins b. Schema Admins c. Forest Schema Admins d. Organization Schema Admins

b. Schema Admins

6-5. What are the requirements to perform an in-place upgrade of a domain controller to Windows Server 2016? (*Choose all that apply*) a. The domain controller must be running Windows Server 2003 R2, or higher. b. The domain controller must be running Windows Server 2008 or higher c. The forest functional level will need to be at Windows Server 2003 or higher d. The forest functional level will need to be at Windows Server 2008 or higher

b. The domain controller must be running Windows Server 2008 or higher d. The forest functional level will need to be at Windows Server 2008 or higher

5-21. What is the maximum number of hops for replication traffic that the KCC allows before creating shortcut connections? a. Two b. Three c. Four d. Five

b. Three

6-15. Your organization has six offices spread over three cities in North America. At a minimum, how many Active Directory sites should you plan to have? a. One b. Three c. Six d. Eighteen

b. Three

5-30. Which of the following is the minimum domain functional level necessary to migrate from FRS to DFSR SYSVOL replication? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2008 R2 d. Windows Server 2012 e. Windows Server 2012 R2 f. Windows Server 2016

b. Windows Server 2008

7-9. What versions of Windows began support of multiple local GPOs? a. Windows Server 2008 R2 and Windows 8 b. Windows Server 2008 R2 and Windows Vista c. Windows Server 2008 and Windows 7 d. Windows Server 2003 and Windows XP

b. Windows Server 2008 R2 and Windows Vista

5-42. To most effectively configure and use a Filtered Attribute Set, your minimum domain and forest functional levels should be which of the following? a. Windows Server 2003 or higher in the domain, Windows Server 2008 or higher in the forest b. Windows Server 2008 or higher in both the domain and the forest c. Windows Server 2012 or Windows Server 2012 R2 in the domain, Windows Server 2008 or higher in the forest d. Windows Server 2008 or higher in the domain, Windows Server 2003 or higher in the forest

b. Windows Server 2008 or higher in both the domain and the forest

5-13. Before you can use the Active Directory Recycle Bin, which of the following actions must be performed? (*Choose two answers*) a. You have to remove the System Recycle Bin. b. You have to enable the AD Recycle Bin. c. You have to set the AD forest to Windows Server 2003 or higher. d. You have to set the AD forest to Windows Server 2008 R2 or higher.

b. You have to enable the AD Recycle Bin. d. You have to set the AD forest to Windows Server 2008 R2 or higher.

7-14. Which kind of GPO stores its settings on the local computer in the %systemroot%/System32/GroupPolicy folder? a. multiple local GPOs b. local GPO c. starter GPO d. domain GPO

b. local GPO

5-2. When a single domain controller's AD database becomes corrupt, which type of restore should be performed on it? a. authoritative b. non-authoritative c. explicit d. full

b. non-authoritative

5-19. Which file is used as a scratch pad to store information about in-progress large transactions and to hold pages pulled out of ntds.dit during maintenance operations? a. edb.chk b. temp.edb c. ntds.nit d. edb.log

b. temp.edb

7-16. When you're about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, which final warning is issued before you accept the change? a. that you're about to reset policies to their defaults b. that all User Rights Assignments will be replaced c. that all security for the domain will be overwritten d. that you're about to restore all security to the default

b. that all User Rights Assignments will be replaced

5-5. Which utility allows you to recover Active Directory containers and objects? a. the Active Directory Lost and Found folder b. the Active Directory Recycle Bin c. the Active Directory Undelete utility d. Active Directory Snapshots

b. the Active Directory Recycle Bin

7-3. Where is the path to the default GPT structure for a domain? a. %systemroot%\SYSVOL\sysvol\<domain name>\Policies\. b. %systemroot%\SYSVOL\sysvol\<domain name>\Policies\{GUID} c. %systemroot%\SYSVOL\sysvol\<domain name>\Policies d. %systemroot%\SYSVOL\sysvol\<domain name>

c. %systemroot%\SYSVOL\sysvol\<domain name>\Policies

6-23. Which of the following is the default cost value for all site links in Active Directory? a. 1 b. 10 c. 100 d. 1000

c. 100

5-37. Why is it important to back up the Active Directory database? a. Backup of all data is a good idea. b. Backup is a standard practice in large companies. c. Backup is needed in case of corruption, deletion, or other failure. d. Backup is an insurance policy for data and should be performed regularly.

c. Backup is needed in case of corruption, deletion, or other failure.

6-1. Which of the following items would not be considered a logical component of Active Directory? a. Domains b. Organizational Units c. Domain Controllers d. Trust relationships

c. Domain Controllers

6-36 4. Active Directory sites are a logical component of Active Directory that are intended to represent which physical item of an organization? a. Departments b. Business units c. Geographic locations d. Language regions

c. Geographic locations

6-6. Which of the following desirable features first became available with the Windows Server 2003 domain functional level? a. SYSVOL replication using DFSR instead of NTFRS b. Automatic SPN management c. LastLogonTimestamp attribute d. Fine-grained password policies

c. LastLogonTimestamp attribute

5-28. Which of the following best describes what you are effectively doing when you mark an attribute as "Confidential" in the schema? a. Enforcing attribute-level encryption on the data b. Disabling access to read or write that attribute other than to members of the Schema Admins groups c. Marking that attribute to not be replicated to an RODC d. Marking that attribute as requiring replication to an RODC

c. Marking that attribute to not be replicated to an RODC

5-33. Which SYSVOL replication migration state is first used when DFSR replication is used as the primary replication mechanism? a. Start (State 0) b. Prepared (State 1) c. Redirected (State 2) d. Eliminated (State 3)

c. Redirected (State 2)

6-28. Which undesirable side effect may result from disabling the "Bridge All Site Links" option? a. You will need to manually create site link bridges between spoke sites b. Sites will only replicate among themselves directly if you configure this to occur c. Replication time and traffic between spokes will increase by going through the hub location d. Replication will not occur other than to the hub site

c. Replication time and traffic between spokes will increase by going through the hub location

5-7. After you recover a user account with the LDP utility, which action must be performed? a. Remove the old identifier. b. Re-establish user to domain trust. c. Reset the user's password. d. Restore the user-owned objects from a backup.

c. Reset the user's password.

6-32. Which of the following is the Active Directory component used to resolve the problem of costly bandwidth and timing restrictions of physical connections? a. Bridgehead server b. Knowledge Consistency Checker c. Site link d. Intersite Topology Generator

c. Site link

6-19. __________ define the logical replication path between sites to perform _________ replication, allowing for faster and optimized replication between sites based on configured costs and frequencies. a. Site links, Intrasite b. Replication links, Intersite c. Site links, Intersite d. Connection objects, Intrasite

c. Site links, Intersite

6-37 Which of the following represents the best reason why you need to take care when creating site links within your organization? a. So you can create connection objects between domain controllers b. So you can map the logical layout of site links to the physical layout of WAN links. c. So you can optimize replication traffic between sites by using the highest quality, or lowest cost, routes d. So you can ensure all domain controllers within all sites always stay consistent within 5 minutes

c. So you can optimize replication traffic between sites by using the highest quality, or lowest cost, routes

5-31. From which domain controller should the DFSR SYSVOL migration process be performed? a. Any writable domain controller in the domain b. Any global catalog server in the domain c. The PDC Emulator of the domain d. The Infrastructure Master of the domain

c. The PDC Emulator of the domain

5-26. Which of the following best describes what occurs when a domain controller cannot contact the PDC emulator after processing a user account password change? a. The change is urgently replicated b. The change is rolled back c. The change is non-urgently replicated d. The account is locked out

c. The change is non-urgently replicated

6-16. What will happen to a client that needs to authenticate against Active Directory but has no site defined for its subnet? a. The client will not be able to authenticate b. The client will be able to authenticate as long as it can contact a global catalog server c. The client will authenticate to a domain controller in another site, over the WAN link d. The client will use cached credentials until the site configuration is corrected

c. The client will authenticate to a domain controller in another site, over the WAN link

5-40. Which of the following statements best describes why snapshots can't be modified? a. They are encrypted. b. They are compressed and zipped. c. They are read-only. d. They are binary files.

c. They are read-only.

5-9. Which of the following is the proper procedure for removing a domain controller from Active Directory? a. Shut down the domain controller and manually remove it from AD. b. Use dcdemo to demote the domain controller. c. Uninstall Active Directory Domain Services. d. Enter the DSRM and delete Active Directory.

c. Uninstall Active Directory Domain Services.

6-12. You are the administrator of a multi-domain Active Directory forest. All of your domain controllers are running Windows Server 2012 R2 and your domain and forest functional levels are set to Windows Server 2012. What is the first step you must perform to introduce new servers running Windows Server 2016 as domain controllers? a. Raise the domain functional level to Windows Server 2008 R2 b. Raise the forest functional level to Windows Server 2008 R2 c. Upgrade the forest schema d. Power off the PDC emulator

c. Upgrade the forest schema

7-7. Can an administrator launch the Group Policy Management console from a workstation? a. No, the Group Policy Management console cannot be launched from a workstation b. Yes, if the administrator previously installed the Group Policy Management feature c. Yes, if the workstation is running the Remote Server Administration Tools package d. Yes, with no

c. Yes, if the workstation is running the Remote Server Administration Tools package

7-17. Which user accounts are automatically granted permissions to perform Group Policy Management tasks? a. local administrators b. power users c. domain administrators d. domain users

c. domain administrators

7-10. Local GPOs do not support ______. a. Scripts, including logon, logoff, startup, and shutdown commands b. Windows Deployment Services (WDS) c. folder redirection or Group Policy software installation d. Registry-based policies, such as user desktop settings and environment variables

c. folder redirection or Group Policy software installation

5-10. Which of the following ntdsutil commands cleans up metadata? a. metadata defrag b. metadata restore c. metadata cleanup d. metadata repair

c. metadata cleanup

5-16. Which of the following is the name of the physical database file in which all directory data is stored? a. edb.chk b. temp.edb c. ntds.nit d. edb.log

c. ntds.nit

5-15. Which of the following utilities is used to defragment Active Directory? a. CSVDE b. LDIFDE c. ntdsutil d. defrag

c. ntdsutil

7-2. The three types of Group Policy Objects (GPOs) include local, domain and _____. a. OU b. universal c. starter d. nonlocal

c. starter

7-12. Which kind of GPO serves as a template for the creation of domain GPOs based on a standard collection of settings? a. multiple local GPOs b. local GPO c. starter GPO d. domain GPO

c. starter GPO

7-4. Configuring a Central Store of ADMX files help solve the problem of ________ a. excessive REQ_QWORD registry entries on every workstation b. replication time for copying policies c. Windows 7 workstations not able to receive policies d. "SYSVOL bloat"

d. "SYSVOL bloat"

6-26. When examining the netlogon.log file, which of the following will indicate whether you have a problem with your Active Directory sites or subnets configuration? a. A NO_CLIENT_SUBNET entry b. A NO_CLIENT_DC entry c. A NO_CLIENT_LINK entry d. A NO_CLIENT_SITE entry

d. A NO_CLIENT_SITE entry

5-3. To perform an authoritative restore, into what mode must you reboot the domain controller? a. Repair b. Safe c. Command line with networking d. DSRM

d. DSRM

7-19. If you don't want a GPO to apply, which group policy permission should be assigned to a user or group? a. Disallow Read b. Disallow Write c. Disallow Modify d. Disallow Apply

d. Disallow Apply

6-20. It is possible to configure Intersite replication using SMTP transport. When this transport protocol is selected, which partition of the Active Directory database is not replicated? a. Schema b. Configuration c. Global Catalog d. Domain

d. Domain

5-34. Which SYSVOL replication migration state is performed entirely using DFSR? a. Start (State 0) b. Prepared (State 1) c. Redirected (State 2) d. Eliminated (State 3)

d. Eliminated (State 3)

6-27. By default, how often does Intersite replication occur in Active Directory? a. Every 30 minutes b. Every 60 minutes c. Every 120 minutes d. Every 180 minutes

d. Every 180 minutes

6-30. Which of the following is the domain controller that is used to monitor and make connections with domain controllers in other sites to domain controllers in its site? a. Bridgehead servers b. Knowledge Consistency Checker c. Site links d. Intersite Topology Generator

d. Intersite Topology Generator

5-25. Which of the following repadmin commands would generate updates outward to replication partners and trigger replication across the enterprise as a whole? a. REPADMIN /SyncAll /AjQ b. REPADMIN /SyncAll /PQ c. REPADMIN /SyncAll /APd d. REPADMIN /SyncAll /APed

d. REPADMIN /SyncAll /APed

6-35 To enable foreign security principals to access the shared folder with the UNC path of \\SERVER1\DocsShare, which permission(s) will you need to configure on the ACL of SERVER1 for the foreign security principals? a. Full Control b. Allowed to Authenticate c. Read d. Read and Allowed to Authenticate

d. Read and Allowed to Authenticate

5-20. Regarding Intersite and Intrasite replication, which of the following statements is false? a. Replication data between sites is compressed. b. Intrasite replication utilizes Remote Call Procedure over Internet Protocol (RPC over IP) connectivity. c. Intrasite replication topology is generated by the Knowledge Consistency Checker (KCC). d. Replication data within a site is compressed and encrypted.

d. Replication data within a site is compressed and encrypted.

5-14. Which of the following features was introduced in Windows Server 2012 in an effort to expedite tasks such as AD defragmentation? a. The DSRM console b. The ntdsutil command-line utility c. Active Directory Maintenance Mode d. Restartable Active Directory Domain Services

d. Restartable Active Directory Domain Services

5-22. When a user changes his or her password, to which domain controller is the password change notification sent? a. The Domain Naming master b. The Schema master c. A Global Catalog d. The PDC Emulator

d. The PDC Emulator

5-32. Which of the following best describes the result when SYSVOL or NETLOGON shares are open (being viewed) anywhere during the DFSR SYSVOL migration? a. The migration will fail silently and you will need to look at the netlogon.log file for error information b. The migration will fail, and you will be notified of the failure on screen c. The migration will succeed, but the domain controllers will require a reboot after the migration is done d. The migration will succeed, but the folders in the file system that correspond to the opened share locations will not be deleted

d. The migration will succeed, but the folders in the file system that correspond to the opened share locations will not be deleted

6-25. Which of the following is defined by the replication schedule? a. How often replication occurs b. Which site links are the preferred paths c. When specific directory partitions are replicated d. When replication is allowed to occur

d. When replication is allowed to occur

6-21. Why is it generally not recommended to configure bridgehead servers manually? a. You might pick a server that is not a domain controller b. You might overload the server if its performance is below other domain controllers c. You could pick a server in the wrong site d. You could disrupt the flow of replication traffic between sites

d. You could disrupt the flow of replication traffic between sites

7-11. Which nonlocal GPO has its properties stored in the Active Directory object Group Policy Container (GPC), as well as a Group Policy template located in the SYSVOL share? a. multiple local GPOs b. local GPO c. starter GPO d. domain GPO

d. domain GPO

5-18. Which of the following is the name of the file into which directory transactions are written before being committed to the database file? a. edb.chk b. temp.edb c. ntds.nit d. edb.log

d. edb.log

5-6. By default, how often does Active Directory "garbage collection" occur? a. every 45 minutes b. every 2 hours c. every 8 hours d. every 12 hours

d. every 12 hours

5-11. To perform an authoritative restore of an object or subtree, which of the following must be known about the object? a. its formal name b. its exact location c. its OU and proper name d. its distinguished name

d. its distinguished name

6-13. Which of the following accurately represents a User Principal Name? a. MYCO\jdoe b. jdoe@myco c. jdoe.myco.corp d. [email protected]

d. [email protected]


Kaugnay na mga set ng pag-aaral

Louisiana Life and Health Insurance

View Set

HazMat Awareness and Operations Study Guide

View Set

Fahmy 2017 English - =Christian book - = THE SECOND EPISTLE OF ST PETER

View Set

Biology- Exam 3 Ch. 34: Deutorostomes

View Set

Midterm Review (Old Test Questions)

View Set