Final Exam prep test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect? A. 50 seconds B. 30 minutes C. 1 hour D. As soon as the client downloads them

D. As soon as the client downloads them

Which of the following is not a common way to configure DNS for a forest trust? A. Conditional forwarders B. Stub zone C. secondary zone D. Caching DNS

D. Caching DNS

Which of the following Windows Server 2008 editions supports the hot-add processor feature? A. Windows Web Server 2008 B. Standard Edition C. Enterprise Edition D. Datacenter Edition

D. Datacenter Edition

Which of these is not a new GPO in Windows Vista and Server 2008? A. Local Administrators GPO B. Local Non-Administrators GPO C. User-Specific GPO D. Local Computers GPO

D. Local Computers GPO

The _____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network. A. General B. Type C. Notes D. Location and Comment

D. Location and Comment

Windows Internet Name Service (WINS) is a legacy name service used to resolve ... A. Domain names to IP address B. Bootp names C. MAC addresses to IP addresses D. NetBIOS names

D. NetBIOS names

___are used in Microsoft operating systems to provide a consistent working environment for one or more users. A. Environments B. Settings C.Templates D.Profiles

D. Profiles

One of your administrators is unfamiliar with using the command line, but needs to be able to manage a Windows Server 2008 Core install. While attemtping to used an MMC snap-in to manage Server Core, he finds that he is unable to do so. He notes that some snap-ins, such as Shared Folders and Services worked perfectly remotely, while MMCs such as Event Viewer do not. What is most likely the issue? A. The administrator has permissions to access only specific MMC consoles from his remote machine B. the other MMCs that the Administrator is trying to access are not available on Server Core C. A group policy setting is preventing him from viewing higher management level MMCs D. Server Core's firewall needs to be reconfigured for the Administrator to access certain MMCs

D. Server Core's firewall needs to be reconfigured for the Administrator to access certain MMCs

Which of the following is NOT a reason why some devices can't be placed on the network map? A. They lack the Link Layer Topology Discovery (LLTD) protocol B. Network discovery is turned off C. Firewall settings on the computer or network are preventing Windows from detecting the computer D. The device is a domain member

D. The device is a domain member

If a software package is assigned to a group of targeted computers via the Computer Configuration node, what happens? A. Next time a user logs in to one of the targeted computers, they are prompted to install the package B. The package is advertised in Add/Remove programs as an installation option C. The package is placed on the computers but is not installed until a member of the Administrators group installs it D. The package installation is mandatory and begins the next time the computer starts

D. The package installation is mandatory and begins the next time the computer starts

If correct time zone information is not used and your servers' clocks run at different times, what is most likely to have issuses on your network? A. Windows Update B. IP address assignment C. program performance D. User authentication

D. User authentication

Which of the following Windows Server 2008 editions has no upgrade path? A. Standard Edition B. Enterprise Edition C. Datacenter Edition D. Web Server Edition

D. Web Server Edition

A network interface is composed of two parts: A. device driver software and network media B. network interface and network medium C. device driver software and network interface D. network interface and client software

C. device driver software and network interface

In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform _____, so that one server does not experience more load than others. A. distribution B. replication C. load balancing D. redundancy

C. load balancing

A _____ is a TCP/IP-based concept (container) within Active Directory that is linked to IP subnets. A. forest B. domain C. site D. tree

C. site

When examining a Workgroup Model, a Windows Server 2008 server that participates in a workgroup is referred to as a _____. A. domain controller B. member server C. stand-alone server D. stand-alone member server

C. stand-alone server

What is the IPv6 equivalent of IPv4's loop back address of 127.0.0.1? A. 127.0.0.1 B. fe80:0:0:0:0:0:0:1 C. 0:0:0:0:0:0:fe80 D. ::1

D. ::1

One of the below IP address / subnet mask pairs is invalid; find the invalid answer. A. 10.0.239.254/255.0.255.0 B. 172.31.1.200/255.255.0.0 C. 192.168.2.190/255.255.255.128 D. 10.200.139.1/255.255.255.248

A. 10.0.239.254/255.0.255.0

A(n) ______ is a list of privleges given to an account or security group granting access to an object, such as a shared folder or shared printer. A. ACL B. ACE C. attribute list D. GPO

A. ACL

One of your partner organizations currently has to provide logon credentials to access criticial applications on your extranet's web site. While this has worked in the past, a recent metting has brought to light the need for singole sign-on capabilities for the website. After researching the issue, you discover that one of Windows Server 2008's new Active Directory roles can help solve the problem. Which of the following answers allows you to create a trust relationshiop between your extranet and your partner organization? A. Active Directory Federation Services (AD FS) B. Active Directory Lightweight Directory Services (AD LDS) C. Active Directory Rights Management Services (AD RMS) D. Active Directory Advanced Integration Services (AD AI

A. Active Directory Federation Services (AD FS)

Under what MMC would you create new connection objects? A. Active Directory Sites and Services B. Active Directory Users and Computers C. Active Directory Network and Connection Objects D. Active Directory Domains and Trusts

A. Active Directory Sites and Services

What does the "Client for Microsoft Networks" item in a network adapter's connection properties provide? A. Allows the machine to connect to Windows Shared resources by using Server Message Block (SMB) B. Network connectivity. Without it, the adapter is no longer able to communicate with DNS servers running Windows C. Provides an FTP client

A. Allows the machine to connect to Windows Shared resources by using Server Message Block (SMB)

What must be done to allow a user to be able to access a file encrypted with EFS over a network connection? A. Certificate autoenrollment must be configured B. the user must be given the correct permissions C. the users SID must be exported to the remote machine D. this can not be accomplished

A. Certificate autoenrollment must be configured

When configuring GPO's, which node contains the majority of account policies? A. Computer Configuration node, Windows Settings folder, Security Settings node B. Computer Configuration node, Administrative Templates folder, Windows Component node C. The User Configuration node, Administrative Templates folder D. The User Configuration node, Windows Settings folder, Security Settings node

A. Computer Configuration node, Windows Settings folder, Security Settings node

You are in charge of a domain that contains several office rooms and one large computer commons area. In order to secure accounts in the domain, you want to apply separate account policies for the computers in the commons area, while maintaining the policies that are used in the office rooms. Currently, all computers are in the Computers folder. What is the most efficent way to accomplish this task? A. Create a new OU called "CommonsArea" and move the commons area computer accounts into it. Create a new GPO and configure the desired account policies. Link the new GPO to the CommonsArea OU B. Create a new domain on a new domain controller to service the commons area C. The policy settings must be assigned manually on the local computer GPO's in the commons area D. Create a new GPO and specify the computer accounts of the computers in the commons area then apply the desired account policies. Finally, link the new GPO to the domain.

A. Create a new OU called "CommonsArea" and move the commons area computer accounts into it. Create a new GPO and configure the desired account policies. Link the new GPO to the CommonsArea OU

An encrypted folder or file uses the Microsoft _____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file. A. Encrypting File System B. Advanced Encryption Standard C. Data Encryption Standard D. Block Encryption System

A. Encrypting File System

You are troubleshooting a network issue a user is having. After having changed his network adapter to static addressing, he can no longer reach the internet. However, the machine resolves Internet names to IP addresses. Observe the adapter's configuration below, and determine the problem. IP Address: 172.31.20.103 Subnet: 255.255.255.0 DNS Server: 172.31.20.251 Gateway Address: 172.31.19.254 A. Gateway is outside of the user's subnet B. change subnet mask to 255.255.255.128 C. the gateway no longer has a route to your ISP, so it does not deliver packets D. DNS is providing incorrect or old resolution information, and the IP addresses given are no longer accurate.

A. Gateway is outside of the user's subnet

Which of the following tools is the basic application responsible for loading more useful management related snap-ins? A. Microsoft Management Console B. Disk Management C. Internet Information Services Manager D. Hyper V Manager

A. Microsoft Management Console

The main purpose of Active Directory is to _. A. Provide authentication and authorization to users and computers. B. Provide File and Print services C. Give administrators the ability to control access to restricted hardware D. allow users to organize their files systems into a cohesive and high performance directory structure

A. Provide authentication and authorization to users and computers.

The _____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share. A. Sharing B. General C. Advanced D. Location

A. Sharing

The Network Devices Enrollment Services (NDES) allows network devices such as routers and switches, to obtain certificates by using a special Cisco proprietary protocol known as .... A. Simple Certificate Enrollment Protocol (SCEP) B. Special Device Certification Protocol (SDCP) C. Secured Network Device Protocol (SNMP) D. Special Certificate Enrollment Protocol (SCEP)

A. Simple Certificate Enrollment Protocol (SCEP)

If multiple servers are specified in the forwarders tab of a server's Properties, what happens if a query is made and none of the forwarders provide a response? A. a normal recursive lookup process is initiated, starting with a root server B. the query fails and the DNS server sends a failure reply to the client C. the query is then passed to conditional forwarders D. the query is cached until it can be resolved

A. a normal recursive lookup process is initiated, starting with a root server

When a computer learns another computer's MAC address, it keeps the address in its ... A. arp cache B. arp file C. arp query D. bit bucket

A. arp cache

The forest _____ refers to the Active Directory functions supported forest-wide. A. functional level B. operational level C. functional master D. operational master

A. functional level

The ______ stores information about every object within a forest. A. global catalog B. global master C. schema master D. master catalog

A. global catalog

When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page. A. hold mismatched documents B. control mismatched documents C. prevent mismatched documents D. suppress mismatched documents

A. hold mismatched documents

When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have _____ enabled, the printer might print tens or hundreds of pages with a single control code on each page. A. hold mismatched documents B. control mismatched documents C. prevent mismatched documents D. suppress mismatched documents

A. hold mismatched documents

What type of information does a resource record of type A contain? A. host B. name server C. state of authority D. IPv6 host

A. host

One of your interns has been asked to modify the permissions on a directory locaed on a Server Core server. Your intern asks what command is used to do this. Which command do you tell him to use? A. icacls B. dtsutil C. dsacls D. winrs

A. icacls

The computer or print server device offering the printer share is the _____. A. network print server B. network print manager C. network print client D. network print provider

A. network print server

A _____ is typically used to enable one or two way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers. A. realm trust B. transitive trust C. shortcut trust D. linear trust

A. realm trust

File Server Resource Manager (FSRM) provides ____. A. storage reports, configuration of disk quotas, and use of filters for files users can store on the server B. an interface for viewing status and monitoring and configuring shared folders and serve volumes C. high availability, reliable, shared storage D. a method to perform complete server backups form a simplified and centralized interface

A. storage reports, configuration of disk quotas, and use of filters for files users can store on the server

What command can you type to perform a system state backup? A. wbadmin start systemstatebackup B. wbadmin start sysstatebackup C. wbadmin begin systemstatebackup D. wbadmin start statebackup

A. wbadmin start systemstatebackup

Under what circumstances are the built-in user accounts no longer local user accounts? A. When accessing a network resource in a workgroup environment B. After installing Active Directory C. This is impossible, built-in user accounts cannot be converted D. When using dsadd on the built-in accounts

B. After installing Active Directory

What IP address class does the address 128.0.31.50 belong to? A. A B. B C. C D. Loopback

B. B

The _____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place. A. Encrypted File System B. Distributed File System C. Dispersed File System D. Extended File System

B. Distributed File System

When configuring folder and file permissions, use the _____ button on the folder properties Security tab to change which groups and users have permissions to a folder. A. General B. Edit C. Modify D. Tools

B. Edit

What version of Internet Inforamation Services (IIS) is included with Windows Server 2008? A. IIS 6.0 B. IIS 7.0 C. IIS 6.9.1 D. IIS 7.5

B. IIS 7.0

When using HTTPS, after the web client finds that CA is trusted and the signature on a certficate is verified, the web client sends additional parameters to the server that are encrypted with the server's .... A. Private key B. Public key C. Secret key D. Ciphertext

B. Public key

You are constructing a server for a small office complex that will run for approximately 12 hours everyday. Because of a limited budget, you have decided to use a disk subsystem that is inexpensive and offers excellent performance. Pick the technology that best fits this description. A. SCSI B. SATA C. PATA D. SAS

B. SATA

Which of the following best describes a directory service? A. Similar to a list of information in a text file B. Similar to a database program but with the capability to manage objects in it C. A program for managing the user interface on a server D. A program for managing folders, files, and permissions on a distributed server

B. Similar to a database program but with the capability to manage objects in it

Which of the following server roles is not available within a Windows Server 2008 Core Installation? A. File Services B. Terminal Services C. Hyper V D. Web Server (IIS)

B. Terminal Services

You work at Example.com, and are in charge of a fairly large forest and multidomain structure consisting of Windows Server 2003 domain controllers running at the Windows Server 2003 functional level. One of your interns finished installing the forest's first Windows Server 2008 server, and has placed it in a branch office to act as a RODC. The intern has already run the adprep /forestprep command. A. The forest functional level must be Windows Server 2008 or higher B. There must be at least one writeable DC running Windows Server 2008 C. adprep /domainprep must be run in each of the domains in the forest D. RODCs can't be installed in multidomain structures

B. There must be at least one writeable DC running Windows Server 2008

Select below a vaild requirement for the installation of Hyper-V: A. Windows Server 2008 Datacenter must be installed to use Hyper-V B. Your CPU must support virtualization extensions C. You require a Hyper-V license key D. You must have at least 128MB of RAM installed

B. Your CPU must support virtualization extensions

What can be done to solve the issue of server sprawl? A. Add new servers B. consolidate the servers with virtualization C. install potentially conflicting applications on seperate servers D. reducing server uptime

B. consolidate the servers with virtualization

The _____ tab enables you to specify printer settings that are specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options. A. advanced B. device settings C. printer preferences D. output settings

B. device settings

At what interval does the Knowledge Consistency Checker recalculate the replication topology by defalut? A. Every 15 seconds B. every 15 minutes C. once in a period of 15 hours D. once in a period of 15 days

B. every 15 minutes

Which of the following is not considered an urgent replication event (one that triggers change notifications immediately, without waiting the normal 15 seconds) A. account lockouts B. full name change under user properties C. changes to the account lockout policy D. changes to the domain password policy

B. full name change under user properties

If you make changes to an existing GPO that is already linked in Active Directory, how fast do the policy settings take effect? A. 50 seconds B. 30 minutes C. 1 hour D. As soon as the client downloads t

D. As soon as the client downloads them

A _____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain. A. domain security group B. global security group C. universal security group D. domain local group

B. global security group

What is the Microsoft recommendation for placement of global catalog servers? A. Install a global catalog server in a site once it is larger than 50 accounts and the number of DCs is greater than 2 B. install a global catalog server in a site once it is larger than 500 accounts and the number of DCs is greater than 2 C. Install a global catalog server in a site once it is larger than 1,000 accounts and the number of DCs is greater than 4 D. install a global catalog server in a site once it is larger than 5,000 accounts and the number of DCs is greater than 8

B. install a global catalog server in a site once it is larger than 500 accounts and the number of DCs is greater than 2

DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addressed and vice versa, through a process called ______. A. address resolution B. name resolution C. domain resolution D. host resolution

B. name resolution

Which of the following is a GUI tool that enables you to view the replication topology graphically and monitor replication performance and status? A. repadmin B. replmon C. dcdiag D. repstat

B. replmon

What is the default location of the ADMX files? A. %systemroot%\Policies B. %systemroot%\Policies\ADMX C. %systemroot%\PolicyDefinitions D. %systemroot%\PolicyDefinitions\ADMX

C. %systemroot%\PolicyDefinitions

Windows Server 2008 Enterprise is capable of being configured with failover clustering for up to how many nodes? A. 4 nodes B. 8 nodes C. 16 nodes D. 30 nodes

C. 16 nodes

Setting up and testing AD FS with the simplest design requires at least how many computers? A. 2 B. 3 C. 4 D. 8

C. 4

Under Password policies, what is the default maximum password age? A. 30 days B. 2 months C. 42 days D. 100 days

C. 42 days

A forest is _____. A. a grouping of information that describes a network resource, such as a shared printer, or an organizing structure, such as a domain or OU B. The core structural unit of Active Directory, contains OUs and represents administrative security, and policy boundries C. A collection of one or more Active Directory trees D. A database that stores information about a computer network and includes features for retrieving and managing that information

C. A collection of one or more Active Directory trees

The Intersite Topology Generator (ISTG) is responsible for assigning one of these for each directory partition in the site: A. A KCC leader B. Subnet C. Bridgehead server D. Domain controller

C. Bridgehead server

The acronym CIDR stands for what? A. Classless Internet Domain Routing B. Classes Intranet Domain Routing C. Classless InterDomain Routing D. Classful InterDomain Routing

C. Classless InterDomain Routing

A _____ is a different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs. A. Restricted Domain Controller B. Limited Access Domain Controller C. Read-Only Domain Controller D. Replication-Limited Domain Controller

C. Read-Only Domain Controller

Which of the following defines the types of information stored in an Active Directory object? A. Attribute value B. Schema classes C. Schema attributes D. GPO's

C. Schema attributes

Terminal Services Gateway (TS Gateway) adds to the TS web access functionality by allowing a secure, encrypted connection using ____. A. Virtual Private Network (VPN) B. Secure Socket Tunneling Protocol (SSTP) C. Secure HTTP (HTTPS) D. Network Address Translation (NAT)

C. Secure HTTP (HTTPS)

A new employee, Alice, has been hired to work at a branch office configured with RODC. This RODC connects to a DC over a WAN link back at the head office. Just as Alice is about to log onto her machine for the first time, she finds that she is unable to authenticate despite using the correct user name and pasword given to her. Other users in the branch office can log in fine, but Alice cannot. What is most likely the issue? A. Alice's user and password information hasn't been replicated to the RODC yet, and therefore her credentials cant be verified by the RODC server B. Alice has been added at the head office domain, but not the branch office domain C. The WAN link failed before Alice could log on, preventing her from making use of credential caching D. The RODC has different account password information than the information stored at the head office causing a conflict

C. The WAN link failed before Alice could log on, preventing her from making use of credential caching

Which of the following statements is true regarding RODC replication? A. The connection between an RODC and a writeable DC is a two-way connection because changes can originate on an RODC B. two RODCs cannot replicate with one another under any circumstances C. The domain directory partition can be replicated only to an RODC from a Windows Server 2008 DC D. When upgrading a domain from Windows Server 2003, the first Windows Server 2008 DC can be an RODC

C. The domain directory partition can be replicated only to an RODC from a Windows Server 2008 DC

If multiple default gateways are assigned to a computer (such as a multihomed server), what determines which default gateway will be used? A. a random process B. the default gateway with the highest address is the one used C. the metric D. the gateway on the smaller subnet will be used

C. the metric

What option under the General tab in the Properties dialog box of a forest trust is only availble for use betweeon two Windows Server 2008 domains? A. direction of trust B. transitivity of trust C. the other domain supports Kerberos AES Encryption D. Validate

C. the other domain supports Kerberos AES Encryption

A _____ contains one or more domains that are in a common relationship. A. forest B. root C. tree D. branch

C. tree

You have created a subnetted network and left 4 bits for host IDs. How many hosts can you have per subnet? A. 16 B. 30 C. 32 D. 14

D. 14

GPC replication between domain controllers in the same site occurs at about what interval after a change has been made by default? A. 20 seconds B. 50 seconds C. 30 seconds D. 15 seconds

D. 15 seconds

Last Friday, your organization deployed a brand new Server Core installation of Windows Server 2008. To simplify adminstrative tasks and to prevent downtime your organization makes use of monitoring software that continually tests connectivity. This monitoring software then sends text messages to a specific group of administrators if it should detect that a server is unreachable for any reason. On Monday, when the Server Core's IP address was placed into the monitoring software, the group of administrators received a text almost immediately telling them that the Server Core machine was unreachable. The administrator on-call says that on Friday, he was able to ping the Server Core box to a well known internet address, as well as several servers on the local network. On Monday, he attempts to ping the Server Core installation from his workstation for the first time and does not receive a response. Assuming that the Server Core installation is using default settings, what is most likely the issue? A. Over the weekend, Windows Update ran and downloaded a driver update for the ethernet card without disabling the original driver, causing it to malfunction. Using the command waus.exe /purge /recent should fix the issue B. the Server Core machine has the TCP/IP protocol enabled on the outgoing protocol list for the configured network interface, but not for the incoming list. It must be added in the interface's Properties dialog box C. The network cable is installed for the server has failed over the weekend, and should be replaced to restore normal network connectivity. D. Windows Server 2008's firewall is blocking ICMP Echo Request packets by default. To fix the issue, you must type netsh firewall set icmpsetting 8

D. Windows Server 2008's firewall is blocking ICMP Echo Request packets by default. To fix the issue, you must type netsh firewall set icmpsetting 8

Your intern would like to know which of the following situations would be ideal for a Server Core installation: A. You're installing the first server in a network B. You're upgrading from Windows Server 2003 C. You want to run Windows Web Server 2003 D. You want to install an RODC in a branch office

D. You want to install an RODC in a branch office

Accessing folders and files can be tracked by setting up _____, which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity. A. archiving B. logging C. tracking D. auditing

D. auditing

This command is used to display and modify the boot configuration data store. A. edit boot.ini B. edit bcd C. bcmod D. bcedit

D. bcedit

A ______ is one in which every child object contains the name of the parent object. A. disjointed namespace B. logical namespace C. contained namespace D. contiguous namespace

D. contiguous namespace

What does round robin do? A. Allows an administrator to configure multiple routes that user must make "rounds" through in order to reach a service, improving security B. causes network performance issues by continuously rotating the IP addresses associated with services C. creates invalid DNS records by disabling DNS timestamp scavenging D. creates a load sharing/ balancing mechanism for servers that have identical services, such as two servers that hose the same website.

D. creates a load sharing/ balancing mechanism for servers that have identical services, such as two servers that hose the same website.

If your creating a shortcut trust between domains in different forests, this must exist first: A. Realm trust B. External trust C. Another shortcut trust D. forest trust

D. forest trust

What would you use to prevent GPOs linked to parent containers from affecting child containers? A. GPO filtering B. Enforcing inheritance C. loopback policy processing D. inheritance blocking

D. inheritance blocking

What is a major drawback to enabling the auditing of object access? A. decreased security B. too much information is logged C. not ideal for highly secure environment D. involves considerable overhead

D. involves considerable overhead

For several hours now, your IT staff has been trying to troubleshoot an issue on AppSrv1. AppSrv1 uses an application that requires it to access SQL database on a server named DBSrv1 but recent changes in the network topology have outdated previous DNS entries. Initially, the problem is believed related to the DNS database, but after using nslookup, you find that the DNS entry is correct. AppSrv1 can reach the DBSrv1 server manually by IP address, but when using a name, it resolves to the wrong machine. What is most likely the issue? A. AppSrv1 has a static route entry to DBSrv1 B. nslookup was pulling from the correct DNS server, but the computer is configured with the wrong DNS server C. A conditional forward zone has not been set up properly D. someone added a static entry for DBSrv1 in the hosts text file which is now outdated.

D. someone added a static entry for DBSrv1 in the hosts text file which is now outdated.

In the Windows environment, a _____ is a group of DLLs, information files, and programs that processes print jobs for printing. A. driver B. renderer C. queue manager D. spooler

D. spooler

Which is not a benefit of using virtual machines? A. virtual machines consolidate resources B. virtualization isolates critical applications for testing and troubleshooting purposes C. virtual machines can be used to provide access to multiple OSs in an educational environment D. virtual machines have reduced hardware and software requirements

D. virtual machines have reduced hardware and software requirements

Increased network usage has inspired your staff to install a new DNS server. After much consideration, you have decided to also make the new server a domain controller as well. One of your interns is curious as to what benefit this would provide to DNS over simply making the DNS server a member server. A. The server can do zone transfer for stub zones B. The AD-integrated domain DNS zones will be created automatically C. Active Directory integrated secondary zones would be possible D. resource consolidation

The AD-integrated domain DNS zones will be created automatically

http://www.proprofs.com/quiz-school/story.php?title=windows-server-2008-active-directory-configuration

none


Kaugnay na mga set ng pag-aaral

Khan Academy The Internet Study List

View Set

Agriculture and Rural Land-Use Patterns and Processes

View Set

Techno Marketing Final Test- YouTube

View Set

Foundations of Employee Motivation - Chapter 11 (EXAM #2)

View Set