nos 230 test 4
What is used to identify all objects in a domain? a. PDC b. SID c. DIR d. RID
SID
0 points QUESTION 6 What feature should you enable to prevent the sIDHistory attribute from being used to falsely gain administrative privileges in a trusting forest? a. Selective authentication b. SID filtering c. Trust transitivity d. Fine-grained password policies
SID filtering
If the slow link detection policy is set at 0, what does this indicate?
Slow link detection is disabled
0 points QUESTION 16 What is created automatically by the KCC and allows the configuration of replication between sites? a. Site link bridge b. Connection object c. Bridgehead server d. Site link
Connection object
You have a forest with three trees and twelve domains. Users are complaining that access to resources in other domains is slow. You suspect the delay is caused by authentication referrals. What can you do to mitigate the problem? a. Create a forest trust b. Create an external trust c. Create a transitive trust d. Create a shortcut trust
Create a shortcut trust
0 points QUESTION 24 Once Active Directory has been installed, a default site link is created. What is the name of this site link? a. FIRSTSITE b. DEFAULTIPSITELINK c. ADSITEHOLDER d. IPSITECONTAINER
DEFAULTIPSITELINK
Which server role below cannot be installed on a domain controller that will be cloned? a. DNS b. RADIUS c. WSUS d. DHCP
DHCP
QUESTION 1 What Active Directory replication method is more efficient and reliable? a. AD File System Replication b. File Replication Service c. Distributed File System Replication d. SYSVOL Replication
Distributed File System Replication
Select the GPO permission that provides the ability to change existing settings, import settings, and enable or disable a GPO, but is not granted to any user by default. a. Edit Settings b. Link GPOs c. Read d. Create GPOs
Edit Settings
0 points QUESTION 18 The option to turn off background processing is not available for which type of policy below? a. Disk quota b. Application preference c. Folder redirection d. Scripts processing
Folder redirection
Select the term used to describe forcing inheritance of settings on all child objects in the GPO's scope, even if a GPO with conflicting settings is linked to a container at a deeper level. a. scope enforcement b. object enforcement c. GPO enforcement d. forced inheritance
GPO enforcement
What defines which objects are affected by settings in a GPO? a. Group Policy Permissions b. Group Policy Inheritance c. Group Policy Management d. GPO scope
GPO scope
Select the specific tab within the Group Policy Management Console that will allow you to view which policies affect a domain or OU and where the policies are inherited from. a. Group Policy Details b. Group Policy Inheritance c. Group Policy Delegation d. Group Policy Management
Group Policy Inheritance
0 points QUESTION 7 What tool can be used to determine what policy settings would apply to a computer or user account if it were moved to a different container? a. Resultant Move of Policy b. Group Policy Testing c. Group Policy Projection d. Group Policy Modeling
Group Policy Modeling
0 points QUESTION 17 Select the command that is used to import settings from a backed-up GPO to an existing GPO. a. Import-GPO b. Restore-GPO c. Open-GPO d. Select-GPO
Import-GPO
0 points QUESTION 14 What DC is responsible for ensuring that changes made to object names in one domain are updated in references to these objects in other domains? a. PDC emulator b. schema master c. Infrastructure master d. RID Master
Infrastructure master
Why might you need to configure multiple forests? a. Easier access to all domain resources b. Need for a single global catalog c. Single administrator d. Need for different schemas
Need for different schemas
What is the name of a domain controller on which changes can't be written? a. Access only domain controller b. Read only domain controller c. Secured domain controller d. No write domain controller
Read only domain controller
0 points QUESTION 12 What folder contains group policy templates, logon/logoff scripts, and DFS synchronization data? a. Root b. NTDS c. SYSVOL d. System
SYSVOL
0 points QUESTION 3 What features should you configure if you want to limit access to resources by users in a trusted forest, regardless of permission settings on these resources? a. Selective authentication b. Fine-grained password policies c. SID filtering d. Trust transitivity
Selective authentication
Which PowerShell cmdlet below can be used to set permissions for a security principal to a GPO or to all GPOs? a. Change-GPOSecurity b. Set-GPOSecurity c. Set-GPPermission d. Chmod-GPO
Set-GPPermission
0 points QUESTION 23 What can you do if you notice that a DC failed to register its service records? a. Manually add A records to the DNS server. b. Configure entries in the host's file. c. Restart the DNS server using Restart-Service DNS -SRV d. Stop and start the Netlogon service.
Stop and start the Netlogon service.
0 points QUESTION 15 During garbage collection, what setting controls how long deleted objects remain within the database before such objects are completely removed? a. Tombstone lifetime b. Remove by date c. Purge lifetime d. Object expiry date
Tombstone lifetime
Which of the following uses queries to select a group of computers based on certain attributes, and then applies or doesn't apply policies based on the query's results? a. WMI filtering b. GPO status c. security filtering d. blocking enforcement
WMI filtering
The gpupdate command in conjunction with which option below causes synchronous processing during the next computer restart or user logon? a. /full b. /sync c. /force d. /wait
/sync
0 points QUESTION 9 How often does garbage collection run on a DC? a. 18 hours b. 6 hours c. 12 hours d. 2 hours
12 hours
By default, for how long are deleted objects stored within the Active Directory database before they are removed entirely? a. 180 days b. 60 days c. 160 days d. 120 days
180 days
A slow link, by default, is a network connection that's less than which of the following? a. 10 Gbps b. 1 Gbps c. 500 Mbps d. 500 Kbps
500 Kbps
0 points QUESTION 13 What policy setting can be used to force synchronous processing? a. Always wait for the network at computer startup and logon b. Force synchronous processing before logon c. Prevent bypass of synchronous processing d. Change Group Policy processing to run asynchronously when a slow network connection is detected
Always wait for the network at computer startup and logon
0 points QUESTION 25 Within the NTDS folder, which file stores the main Active Directory database? a. edb.chk b. ntds.dit c. ed.dit d. edbres00001.jrs
ntds.dit
0 points QUESTION 11 Which of the following uses permissions to restrict objects from accessing a GPO? a. blocking enforcement b. WMI filtering c. security filtering d. GPO status
security filtering
0 points QUESTION 5 What is the first domain installed in a forest called? a. Global catalog b. Primary tree c. Forest root d. Master domain
Forest root
0 points QUESTION 10 Which of the following is responsible for assigning a bridgehead server to handle replication for each directory partition? a. Inter-Site Topology Generator b. Domain Naming Master c. Infrastructure Master d. Knowledge Consistency Checker
Inter-Site Topology Generator
0 points QUESTION 20 What does the /target option do when used with the gpupdate command? a. The option can be used to specify a remote computer to force policy updates b. The option allows the specification of a target time window for the update c. The option can specify whether computer or user policy settings should be updated d. The option allows the administrator to target a specific policy setting to be updated
The option can specify whether computer or user policy settings should be updated
0 points QUESTION 4 By default, what policies will be downloaded and processed by a Group Policy client? a. All approved polices b. Changed policies only c. No polices are downloaded and processed by default d. All policies
Changed policies only
0 points QUESTION 8 To find a full list of policies and preferences that can have background processing disabled, where should you look? a. User Configuration\Policies\Administrative Templates\System\Group Policy b. User Configuration\Policies\Administrative Templates\Group Policy c. Computer Configuration\Policies\Administrative Templates\System\Group Policy d. Computer Configuration\Policies\Administrative Templates\Group Policy
Computer Configuration\Policies\Administrative Templates\System\Group Policy
What assigned value represents the bandwidth of the connection between sites? a. metric b. cost c. log d. site
cost
Which of the following manages adding, removing, and renaming domains in the forest? a. operations master b. domain naming master c. schema master d. forest master
domain naming master
0 points QUESTION 21 What holds the log of Active Directory transactions or changes? a. edb.log b. aed.dit c. edb.chk d. ntds.log
edb.log
0 points QUESTION 19 Which command shows you detailed information about replication status, including information on each partition? a. showrepl /detailed b. Get-ADReplication /all c. repadmin /showrepl d. dcdiag /replsum
repadmin /showrepl
0 points QUESTION 2 Which command analyzes the overall health of Active Directory and performs replication security checks? a. Get-ADReplication b. repadmin c. net show d. dcdiag
dcdiag
0 points QUESTION 22 You have just installed two new Linux servers to handle a new application. You want to integrate user authentication between Linux and your existing Windows Server 2012 R2 domain controllers. What can you do? a. Create a forest trust b. Create a realm trust c. Create an external trust d. Create a transitive trust
Create a realm trust