Module 10
38. Linda works as a network administrator in a multinational corporation. It has come to her notice that some updates lead to a significant computer downtime because they are either incompatible or not installed properly. In order to resolve this issue, she decides to use the Windows Server Update Services to control the updates that are sent to the computers. How would this move help resolve the current issue? a. Updates can be tested before they are applied. b. The computers can connect to Microsoft updates directly. c. One can choose the updates that need to be installed. d. The WSUS server triggers the updates instead of the computers.
One can choose the updates that need to be installed.
22. Rodriguez returns to his office after taking a sabbatical. When he tries to connect his Windows 10 workstation to the organization domain, authentication to Active Directory is unsuccessful. Identify the issue that could have caused the authentication to fail. a. The office changed the number of computer accounts that can be created by a user to zero. b. Rodriguez was using a standard user account on his Windows 10 workstation. c. The time on the computer was 10:00, and the time on the domain controller was 10:08. d. The password of the computer account on the domain automatically changed.
The time on the computer was 10:00, and the time on the domain controller was 10:08.
11. The Group Policy settings used by Windows 10 are contained in which of the following? a. A Group Policy object b. A group object c. A Domain Policy object d. A controller object
a. A Group Policy object
43. Which of the following can be used to create groups to organize users, but on the cloud? a. Azure AD b. Office 365 Enterprise c. Active Directory d. Microsoft 365 Enterprise
a. Azure AD
19. In which technology are files stored in a file share in a central location but are cached at the remote site to make it faster to open the files? a. BranchCache b. Distributed File System c. User Experience Virtualization d. Windows Server Update Services
a. BranchCache
23. As a systems administrator, you have been asked to quicken the domain join process in your organization by allowing domain-joined computers to join offline. Which of the following actions will you take? a. Create a blob file on the Windows server and import it to the computers b. Synchronize the time between the Windows computer and domain controller c. Instruct the users to sign in to their computer using their Microsoft account d. Create the computer accounts and share them with the users
a. Create a blob file on the Windows server and import it to the computers
25. Suresh works as a network administrator. He is asked to update the security settings of all the workstations under the HR organizational unit. Which of the following can he use for this purpose? a. Group policies b. A domain controller c. Windows Server Update Services d. Azure AD
a. Group policies
6. Each domain can be subdivided into which of the following that allows you to organize the objects in a domain? a. Organizational units (OUs) b. Domain controllers c. Trees d. Forests
a. Organizational units (OUs)
16. Which of the following downloads updates from Microsoft Update and stores them in a local datastore, rather than each client computer downloading updates individually? a. WSUS b. WDS c. USMT d. PXE
a. WSUS
18. Which of the following appears to be a single, large file structure but can really be composed of shared folders on multiple servers? a. BranchCache b. A DFS namespace c. DFS replication d. DNS
b. A DFS namespace
29. Which of the following is a device identification string that can be used to control the installation of a device? a. A device driver b. A hardware ID c. A global catalog server d. A domain controller
b. A hardware ID
3. Which of the following expands on the domain concept by combining domains in logical structures named trees and multiple trees into forests? a. WSUS b. Active Directory c. NAP d. Enterprise Directory
b. Active Directory
10. Which of the following is defined by IP subnets instead of physical locations? a. An Active Directory controller b. An Active Directory site c. An Active Directory DNS d. An Active Directory OU
b. An Active Directory site
15. During the installation process for a new device, what are used in order to control how the device driver software is installed? a. Device identification strings b. Device setup classes c. Hardware IDs d. HDIDs
b. Device setup classes
2. How often do domain controllers download Group Policy settings? a. Every 60 seconds b. Every 5 minutes c. Every 90 minutes d. Every 24 hours
b. Every 5 minutes
12. Which of the following can be pushed down to a computer and can be changed by the user? a. Group Policy objects b. Group Policy Preferences c. Group Policy Settings d. Group Domain objects
b. Group Policy Preferences
31. Rishi works as a network administrator. He configures the domain-joined laptops in his company to sleep if they are on battery power and idle for more than 20 minutes. Some users, to save battery, change this duration to 10minutes. However, the next time they restart the laptop, it is automatically configured to sleep in 20 minutes. Which of the following has Rishi likely used to configure the laptops? a. A domain controller b. Group Policy Preferences c. A Distributed File System d. Organizational units
b. Group Policy Preferences
1. Which of the following is not true of Active Directory? a. It uses multimaster replication. b. It is a single monolithic database with all the information about the network. c. Within Active Directory, Windows servers can be either member servers or domain controllers. d. It uses the same naming convention for domains and objects contained in these domains as DNS.
b. It is a single monolithic database with all the information about the network.
45. You and your friends decide to start up a small company that provides web-based services. You are a team of five working out of a basement. You need to set up email accounts and purchase cloud storage. Which of the following cloud services would be the most cost-effective for you? a. Office 365 Enterprise b. Microsoft 365 Business c. Microsoft 365 Enterprise d. Microsoft Azure
b. Microsoft 365 Business
36. Which of the following can be used to handle domain-joined desktop computers? a. Windows Server Update Services b. Microsoft Endpoint Configuration Manager c. Microsoft BitLocker Administration and Monitoring d. Distributed File System
b. Microsoft Endpoint Configuration Manager
13. When a new device is installed into a Windows 10 computer, the operating system uses a device setup class and which of the following in order to properly install the new device? a. An identification service b. A service string c. A device identification string d. A device controller
c. A device identification string
20. Which of the following is a domain controller that holds a subset of the information in all domain partitions? a. An organizational unit b. Domain path c. A global catalog server d. The schema partition
c. A global catalog server
28. Which of the following is used to identify a device setup class? a. A schema partition b. A global catalog server c. A global unique identifier d. A device identification string
c. A global unique identifier
39. When file shares between two servers are cloned, which of the following synchronizes the data among the fileshares? a. Domain controllers b. BitLocker c. DFS namespaces d. A WSUS server
c. DFS namespaces
5. Which Active Directory component has a central security database that is used by all computers that are members of it? a. OU b. WSUS c. Domain d. DNS
c. Domain
9. Active Directory information can be changed on any domain controller and those changes will be replicated to other domain controllers. What is this type of replication called? a. Multicast b. Unicast c. Multimaster d. Anycast
c. Multimaster
24. Sasha, a systems administrator, configures Michelle's computer to enable offline domain join because she was notable to connect to Active Directory and her computer was unable to contact the domain controller. However, Michelle is still not able to connect to the domain. Which of the following, if true, is likely to be the cause of the problem? a. She does not have the rights to create computer accounts on the domain. b. She rebooted her computer after the configuration was complete. c. She used her domain account to sign in to her Windows 10 computer. d. She did not synchronize her computer's time with that of the domain controller.
c. She used her domain account to sign in to her Windows 10 computer.
17. To enable centralized management of BitLocker, you need to install which of the following on each computer? a. The UE-V profile b. The WDS client c. The MBAM agent d. The WSUS node
c. The MBAM agent
8. In Active Directory, which partition holds general information about the Active Directory forest? a. The application partition b. The schema partition c. The configuration partition d. The domain partition
c. The configuration partition
21. Identify the Active Directory partition that holds the computer accounts in a domain. a. The configuration partition b. The schema partition c. The domain partition d. The application partition
c. The domain partition
26. Which of the following can be used to restrict the installation of a USB drive on a Windows 10 computer? a. A schema partition b. A global catalog server c. A domain controller d. A device identification string
d. A device identification string
27. When a printer is plugged into a Windows 10 computer, which of the following is used to identify the appropriate driver? a. A schema partition b. A global catalog server c. A device setup class d. A device identification string
d. A device identification string
14. What is the most specific device identification string? a. An HDID b. A driver ID c. A GenID d. A hardware ID
d. A hardware ID
40. Which of the following can be used to speed up the opening of files stored in a centralized file share location? a. Domain controllers b. BitLocker c. DFS namespaces d. BranchCache
d. BranchCache
42. A multinational corporation owns offices in various locations. One of its offices has a slow WAN owing to its remote location. To speed up file access for users, the network administrator sets up an infrastructure where the file shares are stored in SERVER X in one location and are also stored on SERVER Y in the remote location. However, the files are not replicated in each server. Which of the following technologies is being used in this scenario? a. A domain controller b. BitLocker c. A Distributed File System d. BranchCache
d. BranchCache
44. Your organization is transitioning to a cloud-based infrastructure. However, several of its services rely on the use of an on-premise Active Directory. Since you are a network administrator, the management has reached out to you to provide a suitable transition plan that would least affect the day-to-day operations of the company. Which of the following suggestions would you provide? a. Use Microsoft Intune to manage the on-premise devices. b. Disable BitLocker from the computers that need to be joined to the cloud. c. Join the computers to Azure AD. d. Configure Windows as hybrid Azure AD-joined.
d. Configure Windows as hybrid Azure AD-joined.
4. Which Active Directory component is responsible for authenticating users when they sign in to a workstation? a. Trees b. Forests c. OUs d. Domain controllers
d. Domain controllers
32. Your organization has configured a Windows 10 computer in the reception area that guests can use. The computer has minimum functionalities for Guests. However, when a user with administrative privileges signs in to the computer, all the functionalities of a typical Windows 10 computer are unlocked. Which of the following statements is true? a. Group Policy Preferences are applied to the computer to restrict functionalities. b. Guests are provided user accounts that have administrative privileges. c. The computer is connected to the organization's domain. d. Multiple local policies have been applied to the computer.
d. Multiple local policies have been applied to the computer.
7. To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and what other partition? a. Controller b. OU c. Forest d. Schema
d. Schema
30. Your organization has two OUs, one each for the Finance and the Administration departments. A GPO setting has been applied to the computers in the Administration OU to prevent the installation of new applications. Another GPO setting has been applied to some users in the Finance OU that provides them administrative privileges. What will happen if a user with administrative privileges from the Finance OU tries to install an application on a computer in the Administration OU? a. The user will be joined to the Administration OU. b. The user will lose the administrative privileges. c. The user will be prompted to provide an administrative password for installation. d. The user will not be able to install the application.
d. The user will not be able to install the application.