out even question
A transform file utilizes what file name extension?
.mst
The gpupdate command in conjunction with which option below causes synchronousation
/sync
Which type of cryptography provides the most security?
Asymmetric cryptography
An administrator has discovered that several critical parts of Active Directory have been deleted. What boot mode can be used to preform restoration?
DSRM
Select below the FSMO role that is a forest-wide FSMO role:
Domain naming master
How often are computer and user policies applied after a user has logged into a computer
Every 90 minutes
25. What defines which objects are affected by settings in a GPO?
GPO scope
In order to force a computer to immediately download and apply all group policies, what command should be run?
Gpupdate /force
What tool can be used to determine what policy settings would apply to a computer or user account if it were moved to a different container?
Group Policy Modeling
What enables you to target specific users or computers based on criteria?
Item-Level targeting
What is a down-level user logon name used for?
Logging into older windows OSs
Within the NTDS folder, which file stores the main Active Directory database?
Ntds.dit
What is the name of a domain controller on which changes can't be written?
Read Only Domain Controller
Which of the following uses permissions to restrict objects from accessing a GPO?
Security filtering
What can you do if you notice that a DC failed to register its service records?
Stop and start the Netlogon service
After a template account has been create, what can be done to ensure that the template account does not pose a security risk?
The account should be disabled
3. The AD recycle bin is disabled by default and can be enabled in the ADAC
Ture
What type of application can be installed automatically when the user logs on to a computer in the domain
assigned
A slow link, by default, is a network connection that's less than which of the following?
500 kbps
44. In a new partnership with XYZ Company, ABC company wants to share documents securely using Web-based applications, All communications must be secure, and document usage must be controlled. Both companies run Windows Server 2016 domains but must remain in separate forests. What can you implement to facilitate this partnership?
AD Federation Services and AD Rites Management Services
What option under the folder redirection settings redirects everyone's folder to the same location?
Basic
You have a forest with three trees and twelve domains. Users are complaining that accesss to resources in other domains is slow. ...
Create a shortcut trust
What policy is a GPO linked to the Domain Controllers OU and specifies the default policy settings for all domain controllers?
Default Domain Controller Policy
Select the term used to describe the process, within the context of AD that allows a person... Delegation of control
Delegation of control
Which of the following stores information about a computer network and offers features for retrieving and managing that information?
Directory Service
Select the specific tab within the Group Policy Management Console that will allow you to view which policies affect a domain or OU and where the policies are inherited from. Group Policy Inheritance
Group Policy Inheritance
What specific tool allows you to create GPOs, view a GPO's settings, link and unlink GPOs within containers, and manage the inheritance settings of GPOs?
Group Policy Management Console
Which of the following is responsible for assigning a bridgehead service to handle replication for each directory partition?
Inter-site topology Generator
By default, replication between DCs when no changes have occurred is scheduled to happen how often?
Once per hour
33. The RID master FSMO role is ideally placed on the same server as what other role?
PDC emulator
An administrator has received a call indicating that some users are having difficulty logging on after a password change. Which FSMO role should be investigated?
PDC emulator
What AD object enables administrator to configure password settings for users or groups that are different from those defined in a GPO linked to the domain?
Password setting object
Timestamps within Kerberos are used to help guard against what type of attack?
Replay attack
Before you configure a forest trust, what should you configure to ensure you can contact the forest root of both forests from both forests?
STUB zones
Which of the following choices is not one of the three user account types defined in Windows Server 2016?
Service user account
Select the RODC installation type where the domain administrator creates the RODC computer account in active Directory, and then a regular user can install at a later time
Staged installation
How is a computer's designated site determined, such that the computer is given a domain controller to request services from within the same site?
Through subnets added to the site
Select the operations master role responsible for ensuring that changes made to object names in one domain are updated in reference to the object in other domains
infrastructure name
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only on the computer where the account resides
security account manager
The Knowledge Consistency Checker (KCC) runs on every DC to determine the replication topology
true
How can an administrator enable or disable accounts using the command line
use the DSMOD command
Which option below is not one of the three main methods for cleaning up metadata?
wbsadmin.exe
Which of the following is the international standard that defines a PKI and certification formats?
x.509
Your company has purchased another company that also uses Windows Server 2016
create a two-way forest trust