Top Banner
1 ASSIGNMENTS Windows 2008 server Part I 1. What are some of the new tools and features provided by Windows Server 2008? Ans:- Windows Server 2008 now provides a desktop environment similar to Microsoft Windows Vista and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive encryption feature. Windows Server 2008 also provides the new IIS7 web server and the Windows Deployment Service. 2. What are the different editions of Windows Server 2008? Ans:- The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition provides a platform for large enterprisewide networks. The Datacenter Edition provides support for unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a scaled- down version of Windows Server 2008 intended for use as a dedicated web server. The Standard, Enterprise, and Datacenter Editions can be purchased with or without the Hyper-V virtualization technology. 3. When a child domain is created in the domain tree, what type of trust relationship exists between the new child domain and the trees root domain? Ans:- Child domains and the root domain of a tree are assigned transitive trusts. This means that the root domain and child domain trust each other and allow resources in any domain in the tree to be accessed by users in any domain in the tree. 4. What is the primary function of domain controllers? Ans:- The primary function of domain controllers is to validate users to the network. However, domain controllers also provide the catalog of Active Directory objects to users on the network. 5. What are two command-line utilities that can be used to check TCP/IP configurations and IP connectivity, respectively? Ans:- The ipconfig command can be used to check a computer’s IP configuration and also renew the client’s IP address if it is provided by a DHCP server. ping can be used to check the connection between the local computer and any computer on the network, using the destination computer’s IP address. 6. What term is used to refer to the first domain created in a new Active Directory tree? Ans:- The first domain created in a tree is referred to as the root domain. Child domains created in the tree share the same namespace as the root domain. 7. What type of Active Directory objects can be contained in a group? Ans:- A group can contain users, computers, contacts, and other nested groups. 8. What types of Active Directory objects can be contained in an Organizational Unit? Ans:- Organizational Units can hold users, groups, computers, contacts, and other OUs. The Organizational Unit provides you with a container directly below the domain level that enables you to refine the logical hierarchy of how your users and other resources are arranged in the Active Directory.
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Jetking   questions and answers 8.5x11

1

ASSIGNMENTSWindows 2008 server Part I

1. What are some of the new tools and features provided by Windows Server 2008?

Ans:- Windows Server 2008 now provides a desktop environment similar to Microsoft Windows Vista and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive encryption feature. Windows Server 2008 also provides the new IIS7 web server and the Windows Deployment Service.

2. What are the different editions of Windows Server 2008?

Ans:- The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition provides a platform for large enterprisewide networks. The Datacenter Edition provides support for unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a scaled-down version of Windows Server 2008 intended for use as a dedicated web server. The Standard, Enterprise, and Datacenter Editions can be purchased with or without the Hyper-V virtualization technology.

3. When a child domain is created in the domain tree, what type of trust relationship exists between the new child domain and the trees root domain?

Ans:- Child domains and the root domain of a tree are assigned transitive trusts. This means that the root domain and child domain trust each other and allow resources in any domain in the tree to be accessed by users in any domain in the tree.

4. What is the primary function of domain controllers?

Ans:- The primary function of domain controllers is to validate users to the network. However, domain controllers also provide the catalog of Active Directory objects to users on the network.

5. What are two command-line utilities that can be used to check TCP/IP configurations and IP connectivity, respectively?

Ans:-Theipconfigcommandcanbeusedtocheckacomputer’sIPconfigurationandalsorenewtheclient’sIPaddressifitisprovidedbyaDHCPserver.pingcanbeusedtochecktheconnectionbetweenthelocalcomputerandanycomputeronthenetwork,usingthedestinationcomputer’sIPaddress.

6. What term is used to refer to the first domain created in a new Active Directory tree?

Ans:-Thefirstdomaincreatedinatreeisreferredtoastherootdomain.Childdomainscreatedinthe tree share the same namespace as the root domain.

7. What type of Active Directory objects can be contained in a group?

Ans:- A group can contain users, computers, contacts, and other nested groups.

8. What types of Active Directory objects can be contained in an Organizational Unit?

Ans:- Organizational Units can hold users, groups, computers, contacts, and other OUs. The Organizational Unit provides you with a container directly below the domain level that enables you to refine the logicalhierarchyofhowyourusersandother resourcesarearranged in theActiveDirectory.

Page 2: Jetking   questions and answers 8.5x11

2

9. How can client computer accounts be added to the Active Directory?

Ans:- Client computer accounts can be added through the Active Directory Users and Computers snap-in. You can also create client computer accounts via the client computer by joining it to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups.

10. What is the purpose of deploying local DNS servers?

Ans:-AdomainDNSserverprovides for the localmappingof fullyqualifieddomainnamesto IPaddresses. Because the DNS is a distributed database, the local DNS servers can provide record informationtoremoteDNSserverstohelpresolveremoterequestsrelatedtofullyqualifieddomainnames on your network.

11. What is LPD?

Ans:-It enables Printing using the line printer daemom protocol, which is used by UNIX clients.

12. What is printer pooling?

Ans:- Printer pooling is used for load balancing. When an end user puts a print job in the queue, the firstavailableprinteristhepoolwilltakethejob.

13. What is HARD quota?

Ans:-Itpreventsusersfromsavingafileafterthevolumeorfolderhasreachedthespecifiedspacelimitandgeneratesnotification.

14. What is the use of OFFLINE file features?

Ans:- Mobileusersmightneedaccesstosharedfoldersevenwhenthey’redisconnectedfromyourinternal network.Offline Filesmakes this possible by allowing client computers to automaticallycacheacopyoffilesonsharedfoldersandbyprovidingtransparentaccesstothefileswhentheuser is disconnected from the network.

15. What is Quotas?

Ans:- disk quotas allow Windows administrators to monitor and control the use of disk space by users. Disk quotas can be deployed in a number of different ways.

16. What is the primary and extended partition?

Ans:- Primary and extended partitions are the main disk divisions; one hard disk may contain up to four primary partitions, or three primary partitions and one extended partition.

17. Which File system is supported by windows 2008 server to secure file and folder?

Ans:-NTfilesystem(NTFS)andEncryptingfilesystem(EFS).

18. What is use of terminal services?

Ans:- Terminal Services provides the ability to host multiple, simultaneous client sessions on Windows Server 2003. Terminal Services is capable of directly hosting compatible multi-user client desktops running on a variety of Windows-based and non Windows-based computers.

19. Which editions of Windows 2008 server we will get Hyper-V role?

Ans:-Hyper-V isavailable inx64-basedversionsofWindowsServer2008—specifically, thex64-based versions of Windows Server 2008 Standard, Windows Server 2008 Enterprise, and Windows Server 2008 Datacenter.

Page 3: Jetking   questions and answers 8.5x11

3

20. What is use of Hyper-V role?

Ans:- Hyper-V Server is a dedicated stand-alone product that contains the hypervisor, Windows Server driver model, virtualization capabilities, and supporting components such as failover clustering.

21. Which role service is required for the Routing in Windows server 2008?

Ans:- RRAS role from Network policies and access services is required for Routing.

22. How to configure VPN server?

Ans:- – Server Manager -> Adding Roles -> Next -> Select Server Roles ->Network Policy and Access Services ->Next ->Routing and Remote Access Services ->Remote Access Service ->Routing -> Next->ConfirmInstallationSelection->Install->ConfigureandEnableRoutingandRemoteAccess->Next->RoutingandRemoteAccessWizard->CustomConfiguration->Next->VPNaccess->Next->Finish->StartServiceThesearethestepstoaddVPNatserverside.

23. What are the different types of VPN?

Ans:- Private VPN

Internal VPN

External VPN

24. What is mean by IP routing?

Ans:- IP rounting is the process of determining the route i.e. communication path and sending data from the source computer to the destination computer in a network.

25. What is static routing?

Ans:-staticroutingisaroutingmechanismisallowsyoutodefineastaticroutefromthesourcetodestination while transmitting data from one computer to another.

26. What is mean by performance monitor?

Ans:- performance monitor is a tool to provide real time data of either a local computer or a network computer.

27. What is reliability monitor?

Ans:- Reliability monitor is a tool that tracks the stability of a computer. Computer can achieve the maximum stability index if new software is not installed and system failures do not occur.

28. What is use of MBSA?

Ans:-Microsoft Baseline Security Analyzer is a Microsoft utility used to scan the server for possible security vulnerabilities.

29. What is WSUS?

Ans:- Microsoft provides the Windows Server Update Services(WSUS) to allow the computerautomatically download the Microsoft software updates.

30. Why computer groups are required in WSUS?

Ans:- Using computer groups we can allow specify computers to install the updates and there are two types of groups All computers and Unassigned computers.

Page 4: Jetking   questions and answers 8.5x11

4

Windows Server 2008 Part II

Ques.1:- What is server?

Ans.:- Server is a computer program that manages access to a centralized resource in a network.

Ques.2:- What is Domain?

Ans.:- Domain made up of a group of client and servers under the control of one central security database. Within a domain, user authenticates once to a centralized server known as domain controller.

Ques.3:- What is the use of Domain Controller?

Ans.:- Domain controller is a server, It is control or responsible of provide to host access of all resource like printer, files, mail within the domain from the central point. Ques.4:- What is the use of ADDS?

Ans.:- ADDS stands for Active Directory Domain Services it is new feature of Windows Server 2008. ADDS provides a database which store the information of directory services and manage communication between domains and users.

Ques.5:-What are functional levels in Server 2008?

Ans.:-Functional leveldetermine the featuresofActiveDirectory(AD) thatayoucanusewithinthedomainbasicallytwotypeoffunctionallevelsareinServer20081.DomainFunctionalLevel2.ForestFunctionalLevel

Ques.6:-what is DNS?

Ans.:- DNS stands for Domain Name System, DNS use domain name resolution mechanism which resolve host name to IP and IP to host name.

Ques.7:-What is DNS Zone?

Ans.:-DNS zone is an entity that stores the object information in to the various records. Windows Server 2008 supports three types of DNS Zones.

Ques.8:-Explain different type of DNS zones?

Ans.:- The DNS server is the primary source for information about this zone, Server 2008 supports three type of zones. 1. Primary Zone: - It stores themaster copy of zone data in a local fileor inADDS. It stores the information in text fileand thisfilecanbeeditedbyanadministrator. 2. Secondary Zone: - A secondary zone is merely a copy of a primary zone that is hosted on another server; it cannot be stored in AD DS.

3. Stub zone: - A stub zone is a copy of a zone that contains only those resource records necessary toidentifytheauthoritativeDomainNameSystem(DNS)serversforthatzone.Astubzoneisusedto resolve names between separate DNS namespaces. This type of resolution may be necessary when a corporate merger requires that the DNS servers for two separate DNS namespaces resolve names for clients in both namespaces.

Ques.9:- How many records in DNS server?

Ans.:-ThroughrecordsDNSServerperformnameresolutionprocess.Manytypeofrecords’inDNSserver some commonly used records are

Host A & AAAA

Alias

Page 5: Jetking   questions and answers 8.5x11

5

MX

PTR

SRV

SOA Etc.

Ques.10:- What is WINS server?

Ans.:-WINS stands for Windows Internet Name Service It is similar DNS, who is use for resolved computer name(NetBIOS)totheIPaddressandIPtoNetBIOSnamelocally.

Ques.11:- What is DHCP?

Ans.:-DHCP stands for Dynamic Host Configuration Protocol which is used to assign automatic IPaddress to DHCP client s.

Ques.12:- What is Dora process in DHCP and how it works?

Ans.:-DHCP provide IP addresses through DORA process, the working of DORA are following

1)Client makes a UDP Broadcast to the server with a DHCP Discover, or Discover packet. 2)DHCPofferstotheclient.

The server sends a DHCP Offer including other configuration parameters (DHCP Options) forthe client per the server configuration file3) In response to theofferClient requests the server. The client replies DHCP Request, uncast to the server, requesting the offered address. 4)Theserver sendsDHCPAckacknowledging the requestwhich is the clients final permissionto take the address as offered. Before sending the ack the server double checks that the offered addressisstillavailable,thattheparametersmatchtheclientsrequestand(ifso)markstheaddresstaken.

Ques.13:- How to configure domain controller?

Ans.:- Clik StartRun Type dcpromo.exe command Click the next button Click next button againSelect Create a new domain in a new forestTypetheforestrootdomainname(Examplejetking.com)Select the Forest Functional Level from (Windows Server 2008)Click the next button Click the next button Click the yes button Click the next button again Click the next button Enter directory services restore mode Admin passwordClick next button Click next button Then reboot the PC.

Ques.14:- How to install DNS?

Ans.:- Click Start Administrative tool Server ManagerRight click the Role node and select the Add Roles options from context menuClick the next button Select the DNS Server from Roles list Click the next Click next button againClick next buttonOnce role installation process finishclicktheclosebutton

Ques.15:-What is child domain?

Ans.:- In DNS hierarchy, a child domain called as sub domain which is the portion of a larger domain name and is a subordinate domain of the root domain, A DNS hierarchy contains the root domain which is divided in to child domain. A child domain must contain the root domain namespace for example the root domain name is Jetking.com then the child domain name is child.Jetking.com, ChilddomainisapartofrootdomaintreethereforeitssharesthesameADschemaandconfigurationinformation.

Page 6: Jetking   questions and answers 8.5x11

6

16. What is Schema?

Ans : It represents the logical structure of AD.

17. What is Global Catalog?

Ans : It contains data related to the objects of own domain controllers and other domain controller with in forest.

18. What is Site Link Bridges?

Ans: Site Link Bridge is an AD object that represents a set of site links through which the domain controllers communicate with each other.

19. What is use of Bridgehead Server?

Ans: Bridgehead Server is used to receive and replicate data between sites .

20. What do you mean by Intersite Replication?

Ans: Replication that occurs between two sites is known as intersite replication.

21. What is use of Active Directory Service?

Ans: Active Directory Service is used to store all the information required to manage the use of the AD objects, such as users, groups and computers.

22. What is use of CSVDE command?

Ans:TheCSVDEcommandisusedtoimportorexportinformationfroma.csvfiletotheADdatabaseto create new objects and modify or delete existing objects.

23. What is use of Dsadd command?

Ans: The Dsadd command is used to add a single computer, contact, group, user, or an OU.

24. What is use of LDIFDE command?

Ans:TheLDIFDEcommandisusedtoimportandexporttheADinformation.

25. What are types of Group?

Ans: Security & Distribution

26. What is VPN?

Ans: VPN is virtual network of computers that uses a public telecommunication infrastructure and provides a user with secure remote access to the network resources.

27. What is NAP?

Ans: Itallowsnetworkadministrators tospecifyoneormorepolicies thatdefine thecondition topermit the access to the network.

28. Which are different VPN technologies support to Windows Vista, Windows 7 and Windows Server 2008?

Ans: Point-to-Point Tunneling Protocol, Layer 2 Tunneling Protocol, Secure Socket Tunneling Protocol.

29. What are types of replication?

Ans: Intrasite & Intersite replication.

Page 7: Jetking   questions and answers 8.5x11

7

30. What are types of Operation Masters?

Ans: The schema master, domain naming master, RID master, PDC emulator master, and the infrastructure master.

31. What is use of Computer Account?

Ans: Computer Account is used to identify a computer in a domain. It also used to force domain permissions and group policies.

32. What are the pre-requisites to add computers to a domain?

Ans: The computer object must exist & need to specify the permissions that who can join a computer with the same name in the domain.

33. What are the steps on client computer to add computers to a domain?

Ans: Log on to the client computer as an administrator

Right-click the Computer option in the start menu.

Select Property from the context menu.

Change setting in the computer name, domain, and workgroup setting group.

Select Domain radio button

Provide name of domain

Click OK.

34. What is use of Windows Power Shell?

Ans: Windows Power Shell is a command-line shell and scripting language that helps IT professionals to easily create new user, groups, or computer.

35. What is Subnet?

Ans:SubnetisthesmallestunitofnetworkdefinedwithauniqueInternetProtocoladdressrange.ItalsodefinedasalogicalIPblockwhichisconnectedtootherIPblockthroughnetworkdevicessuchas,swithches and routers.

Windows 2008 server Part III

1. Describe & Explore Group Policy Objects?

Ans: Group policy objects stores information related to group policy setting, which can be used or implemented on users or computers in the network.GPO affects the user and computers located in sites, domains and different Organization.

2. What is Domain-based GPO?

Ans:GPOavailableintheADdomainareKnownasdomainbasedGPO’s.

DomainbasedGPO’screatedbydefault,

1. Default Domain Policy-Policies are linked to the AD Domain. It affects all the users, computers, and domain controllers in Domain.

2. Default domain Controller Policy-Policies linked to the Domain Controller OU in the Domain. Policy setting in this policy affect the Domain controllers in the current OU only.

Page 8: Jetking   questions and answers 8.5x11

8

3. How to Configure Group Policy settings?

Ans:GroupPolicymanagedwithhelpofGroupPolicyManagementEditor(GPME).

FollowingNodesareusedtoconfigurePolicysettings.

1. Computerconfiguration

2. UserConfiguration.

Both these nodes contains Sub-Nodes,

A. Policy

B. Preferences

A. Policy:Software settings,Windows Settings and Administrative template settings.

B. Preference Node contains Windows and Control panel settings.

4. What is Group Policy Scope?

Ans:TheprocessoflinkingGPO’stotheADObjects,likesites,domainsandotherOrganizationalunits(OU’s)isknownasscopingofgrouppolicy.

5. What is Authentication?

Ans:When a user logs on a network or standalone computer he or she has to provide user name and passwordforidentification.

6. What is Account Lockout Policy?

Ans:Account lockout policy locks an account in a domain when user tries to logon with incorrect user nameandpasswordbeyondthenumberoftimespecifiedinthelockoutpolicy.

7. What is Fine-Grained Policy?

Ans:Administrative accounts have high privilege and authority to change object in AD .These accountsprovidedadditionalsecuritypolicieswhichoverridespoliciesdefinedinDomainpasswordand account lockout policy.

8. What is Password Setting Objects?

Ans:Thefine-grainedpoliciesaredefinedwithhelpofseparateclassofobjectsinADthatmaintainsettingsforfine-grainedpolicies.TheseobjectsarecalledPasswordSettingObjects.

Password setting Objects cannot be applied directly to an OU. If apply on users of an OU must be create global security group of users of OU and then apply PSOs.

9. Explain RODC?

Ans:Read only domain Controller introduced in windows server 2008 to solve problem related to speed, security, and integrity in an enterprise. Domain controller is Read only. It contains all attributes oftheobjectsindomainexceptsensitiveattributeslikepassword’sasexamplewhentheusersinbranchofficelogsonindomain,RODCacceptsusercredentialsandtransferittodomaincontrollerincorporateofficeforauthentication.

Page 9: Jetking   questions and answers 8.5x11

9

10. What is Audit Policy?

Ans:Itisasetofconfiguration,Networkadministratortorecordactivitiesandchangesmadeduetothose activities which performed in the network.

OR

It provides complete information about the activities performed on the Network resources and changes made in the attributes of network objects.

11. What is Windows Management Instrumentation?

Ans:WindowsManagementInstrumentationismanagementinfrastructureTechnologyusedtofilterGPO.

12. How to Implement WMI Filters?

Ans:WMIbasequeriesareusedtofilterthecomputersonBasisofRAM,ProcessorSpeed,Diskcapacity, IP Address, Operating System version and service pack level.

13. Which type of the software need to install on the computers in the network to create software deployment group policy?

Ans:.msifileofthesoftwareneedtoinstalloncomputersinnetworktocreatesoftwaredeploymentgroup policy.

14. Write methods of Deploying softwares

Ans: A. Published

B. Assigned

C. Advanced

15. What is System state data?

Ans:System state data comprises the components on which the windows server 2008 Operating System(OS)forvarioustasks.

It contains

1. AD

2. BootFiles

3. COM+ Class Registration database

4. Registry

5. Sysvol Directory.

16. How to take full server Backup by using wbadmin command?

Ans:wbadminStartSystemStateBackup-backuptarget:(AnyfreeDrive.)e.g:D

17. How to perform Restoring in AD environment?

Ans:PerformingDSRM(DirectoryServicesRestoreMode)RestoredatainADEnvironment.

Page 10: Jetking   questions and answers 8.5x11

10

18. Which precaution need to take when restoring system state Data?

Ans:NeedtoensurethatADservicesarestoppedbecausefullaccesstosystemfilesandADdatastore is required.

19. What is Offline Maintenance?

Ans:These are System maintenance activities that performed when users are not using services provided by a Server.

20. Which type of Backup should you perform when you want to save data that has changed since the last full backup?

Ans:Incremental Backup.

21. What is the function of the Task Manager Tool ?

ANS : The main function of task manager is to monitor the applications and the tasks running in the windows operating system. It provides information to users and administrator who is using the PC &showstheapplicationprocess,CPUusage,performance,networking,usersandfinallyservices.With the help of this task manager you can end the running program or task which is extremely complicated to end, switch to another task, although you can open new task, you can check the usageofCPU,itportraystheuserwhoisusingthepcatthemomentandfinally,youcanshutdownthe pc as well.

22. What is the function of the MMC Tool in Windows 2008 server?

ANS : MMC stands for Microsoft Management console , it is used to enables in creating, saving and opening administrative tools.

23. What is the function of the Dcdiag Tool in Windows 2008 server?

ANS : Dcdiag is used to enables in analyzing the state of domain controllers in a forest or enterprise and also assits in troubleshooting by reporting any problems.

24. What is the function of the Netdom Tool in Windows 2008 server?

ANS : Netdom is used to enables batch management of trusts, connecting computers to domains and validating trusts and secure channels.

25. What is the function of the Event viewer Tool in Windows 2008 server?

ANS : Event viewer is used to enables in monitoring events recorded in event logs.

26. What is Paging file in Windows 2008 server?

ANS:Thepagingfile(Pagefile.sys)isahiddenfileonyourcomputer`sharddisk.ByDefaultWindowsStoresthepagingfileonthebootpartitioni.e.thepartitionthatcontainstheoperatingsystemanditssupportedfiles.Thedefaultpagingfilesizeisequalto1.5timesthetotalRAM.

27. What is Memory Dump in Windows 2008 server?

ANS : In the situation of malfunction of Windows server 2008 the operating system dumps the contentofthesystemmemorytothefilethereforewhiledecidingthestoragerequirementyoushouldalsoconsiderthisfile.Themaximumsizeofwhichisamountofmemoryinstalledinthecomputerplus one megabyte.

28. What is SAN?

ANS : SAN refers to the separate network that helps you to attach remote storage device to the servers and SAN stands for storage area network.

Page 11: Jetking   questions and answers 8.5x11

11

29. What is NAS?

ANS : NAS refers to the data storage technology which allows you to store the data on a network storage location and provides data accessibility to multiple client.

30. What is Log Files?

ANS:LogfilesreferstotheEventtrackonthesystem.

31. How many free disk space do you require to create shadow copy?

ANS : 300 MB minimum and maximum size can be set to all the space that is available on the specifiedvolume.

32. What is Firewall?

ANS:Afirewallhelpstoprotectyourcomputerfromaccessedbyunauthorizedusersormaliciousprogram.

33. What are advantages of Antivirus software?

ANS : Checking for malicious code and any unauthorized access,

Blocking any suspicious network activity,

Implimenting backup of server at regular intervals and checking logs at regular intervals.

34. What is WSUS in windows 2008 server?

ANS : WSUS forms a useful Platform, where the updates are downloaded and distributed centrally.

35. What is Bit locker in windows 2008 server?

ANS : Bit locker is a feature available in Windows 2008 server which protect data on a drive that has beenstolenorthatcanbeaccessedofflinebybypassingfilepermissions.

36. What is rootkit?

ANS : Rootkit is a software that helps a hacker to access a computer without the knowledge of administrator.

37. What is Diskpart?

Ans :Diskpart is a command line utility which is used to create, convert and delete the partition and volume.

38. What is the Ntdsutil Tool in Windows 2008 server?

ANS : Ntdsutil is used to enables managing AD, Single Master Operations, and removing metadata.

39. What is the Terminal services in Windows 2008 server?

ANS : Terminal services is used to enables in remote access and management of computers.

40. What is the Regedit in Windows 2008 server?

ANS : Regedit is used to enables in viewing and altering registry setting.

Page 12: Jetking   questions and answers 8.5x11

12

INTERVIEW QUESTIONS AND ANSWERS

1. What is Domain?

Ans: The term domain can refer either to a local subnetwork or to descriptors for sites on the Internet e.g. www.jetking.com

2. What is Workgroup?

Ans:Aworkgroupisacollectionofcomputersonalocalareanetwork(LAN)thatsharecommonresourcesandresponsibilities.Beingapeer-to-peer(P2P)networkdesign,eachworkgroupcomputermaybothshareandaccessresourcesifconfiguredtodoso.

3. What is use of domain controller?

Ans:- The primary function of domain controllers is to validate users to the network. However, domain controllers also provide the catalog of Active Directory objects to users on the network.

4. What is DNS?

Ans:DNSstandsforDomainNameSystemwhichprovidesforthelocalmappingoffullyqualifieddomain names to IP addresses

5. What is DHCP

Ans:DynamicHostConfigurationProtocol(DHCP)isaclient/serverprotocolthatenablesaservertoautomaticallyassignanIPaddresstoacomputerfromadefinedrangeofnumbers(i.e.,ascope)configuredforagivennetwork.

6. What is DNS & why we used ?

Ans:DNSissimplyadatabasethatlinkshostnames,suchashttp://www.jetking.com,toaspecificIP address, such as 192.168.124.1. Apart from this, DNS has many more features. The key features of host name to IP mapping are as follows:

• Mappingsofaddressestonamesandviceversa(knownasrecords)arestoredinadatabase.

• TheDNSdatabaseisdistributed.

• ADNSdatabasealsostoresadditionalrecords.

7. Working process of DNS

Ans: When a DNS client needs to look up a name used in a program, it queries DNS servers to resolvethename.Forexample, thenamespecifiedcouldbetheFQDNforacomputer,suchas“mumbai.jetking.com.”, DNS queries resolve in a number of different ways. A client can sometimes answer a query locally using cached information obtained from a previous query. The DNS server can use its own cache of resource record information to answer a query. A DNS server can also query or contact other DNS servers on behalf of the requesting client to fully resolve the name, then send an answer back to the client. This process is known as recursion.

In addition, the client itself can attempt to contact additional DNS servers to resolve a name. When a client does so, it uses separate and additional nonrecursive queries based on referral answers from servers. This process is known as iteration.

In general, the DNS query process occurs in two parts:

• Anamequerybeginsataclientcomputerandispassedtoaresolver,theDNSClientservice,forresolution.

Page 13: Jetking   questions and answers 8.5x11

13

• Whenthequerycannotberesolvedlocally,DNSserverscanbequeriedasneededtoresolvethename.

8. HowtoconfigureDHCP?

Ans:FromtheNetworkAdministrationgroup,startDHCPManager.UnderDHCPServers,select*LocalMachine*.FromtheScopemenu,chooseCreate.Complete thescopeconfiguration.TheDHCP server cannot be a DHCP client. It must have a static IP address, subnet mask, and default gatewayaddress.Youalsohavetheoptionofassigninganexclusionrangeorspecificexcludedaddresses as well as lease duration and a name. Choose OK when done. Choose Yes to activate the scope.

9. HowtoconfigureDNS?

Ans:OpentheDNSconsole.HighlightyourcomputernameandchooseAction|ConfigureaDNSServer… to launch the Configure DNS ServerWizard. Click Next and choose to configure thefollowing: forward lookup zone, forward and reverse lookup zone, root hints only. Click Next and then click Yes to create a forward lookup zone. Click Next and type the name of the zone you are creating. Click Next and then click Yes to create a reverse lookup zone. Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone. Click Next and enter the information to identify the reverse lookupzone.YoucanchoosetocreateanewfileoruseanexistingDNSfileOntheDynamicUpdatewindow, specify how DNS accepts secure, nonsecure, or no dynamic updates. If you need to apply aDNSforwarder,youcanapplyitontheForwarderswindow.ClickFinish

10. What is VPN

Ans: VPN stands for Virtual Private Network which is a virtual network of computers that uses a public telecommunication infrastructure and provides a user with secure remote access to the network resources.

11. What is database server

Ans:A database program such asMySQL orOraclewhich is hosted on a server that providesdatabase services to other computer programs or computers, is known as database server. The term may also refer to a computer dedicated to running such a program.

12. In printer password is required or not

Ans: Yes, required

13. How to share a printer in network?

Ans: If you currently have a printer already installed on the computer right-click the printer icon and click Properties. Click the Sharing tab and make sure the printer is shared. Or by using a dedicated print server or a network printer.

14. Types of server

Ans:E-mailserver,databaseserver,fileserver,mailserver,printandwebserver

15. Dial up connection, explain it

Ans: It is a form of Internet access that uses public switched telephone network (PSTN) usingtelephonelinetoconnecttoanInternetserviceprovider(ISP)

Page 14: Jetking   questions and answers 8.5x11

14

16. What is mail server

Ans: A mail server also known as a mail transfer agent or MTA, is an application that receives incominge-mailfromlocalusers(peoplewithinthesamedomain)andremotesendersandforwardsoutgoing e-mail for delivery. A server dedicated to running such applications is also called a mail server.

17. What is login script

Ans: A login script is a series of instructions that a workstation follows every time a user logs on. Theseinstructionsareheldontheserverina‘script’file,whichisabatchfilethatworkstationscanaccess and run.

18. How can create Domain member

Ans: Domain members can be created through the Active Directory Users and Computers snap-in. You can also create client computer accounts via the client computer by joining it to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups.

19. What is WINS and full form of Wins

Ans: WINS stands for Windows Internet Naming Service, supports name resolution, converts NetBIOS names to IP addresses for Windows networks.

20. HowtoconnectPCinserver/Domain

Ans: You can join to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups.

21. What is the use of Active directory

Ans: It is a directory service created by Microsoft for Windows domain networks. It is used to authenticate and authorize all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software.

22. What is ADDS and its use

Ans: ADDS stands for Active Directory Domain Services are the foundation for distributed networks built on Windows 2000 Server, Windows Server 2003 and Microsoft Windows Server 2008 operating systems that use domain controllers. It provides secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services.

23. Win. 2008 server installation steps.

Ans: 1. Insert the media into the DVD drive. 2. Reboot the computer. 3. When prompted for an installation language and other regional options, make your selection and press Next. 4. Press Install Now to begin the installation process. 5. Enter your Product ID in the next window, and click Next. 6. Select the version and click Next. 7. Read and accept the license terms by clicking to select the checkbox and pressing Next.8.ifyou’reinstallingtheserveronaregularIDEharddisk,clicktoselect the first disk, usually Disk 0, and click Next.

24. How to share an internet connection.

Ans: using ICS, NAT, proxy etc.

25. How to make domain controller.

Ans: by using dcpromo command

Page 15: Jetking   questions and answers 8.5x11

15

Exam Questions and Answers

1. WhichtwotypesofGPO’sareusedinWindowsServer2008.

a) GroupPolicyobject&Grouppolicymanagementconsole

b) Local & Domain -based GPO’s.

c) Software&Scriptbased.

d) WinLogon&FileSystembased

2. FullformofGUID?

a) GroupPolicyUniqueIdentifier.

b) GroupPolicyUnifiedIdentifier.

c) Globally Unique Identifier.

d) GroupPolicyunitIndicator.

3. The process of linking Group policy to the AD objects such as site, domains & OU is known as.

a) FilteringGroupPolicy

b) Group Policy Scope

c) GroupPolicysoftwareInstallation

d) Loopbackpolicies

4. WhichtechnologyisusedtofilterGPO’s.

a) Grouppolicymanagementconsole

b) Loopbackpolicies

c) Windows Management Instrumentation

d) GroupPolicyprocessing

5. What are the two modes for processing Loopback policy.

a) Enable&Disable

b) Local&Domain-based

c) Replace & Merge

d) Domains&OU’s

6. which of the following event occurs in Implementing Auditing policies, when a user tries to log on in a domain.

a) Password&Accountlockoutpolicies

b) Auditsystemevent

c) Account Logon event & Logon event

d) AuditProcesstrackingevent

Page 16: Jetking   questions and answers 8.5x11

16

7. whichpolicydefinesthepolicythatdetermineswhichusercredentialarecachedontheRODC.

A) Password&Accountlockoutpolicies

b) Password Replication Policy

c) Fine-Grainedpolicy

d) Domainpasswordpolicy

8. When a child domain is created in the domain tree, what type of trust relationship exists between the new child domain and the trees root domain?

A) Transitive trusts

B) Non-transitivetrusts

C) ForestTrust

D) None

9. What is the primary function of domain controllers?

A) Domain

B) Validate users to the network

C) ChildDomain

D) None

10. If system is not assigned resources, such as RAM, CPU and the performance of the system may slowdown.Whichtoolsareprovidedbyserver2008tomonitorperformance?(Choosetwo)

A) The Task Manager

B) ThecontrolPanel

c) TheMMC

D) The performance tool

11. If System administrator or Users want to see system Events which tool is Helpful___________.

A) ControlPanel

B) The Event Viewer Tool

c) ADDS

D) DNS

12. IfAdministratorwantstocontroltheallocationofCPUResourcestoApplication.whichFeatureisHelpful for administrator_____________.

A) RemovableStorageManager

B) StorageManagerforSANs

c) Windows System Resource Manager

D) WINSserver

Page 17: Jetking   questions and answers 8.5x11

17

13. Which of the following tabs of the task manager windows displays the stastical data for each network adapter available on the system?

A) Applications

B) Processes

c) Performance

D) Networking

14. Which of the following tabs of the windows Task manager windows dosplays a list of programs currently running on the system?

A) Application

B) Processes

C) Performance

D) Networking

15. In which Disk volume the data is written to two disks simultaneously, if one disk fails the server can automatically switch to the second disk without any loss of data.

A) SimpleVolume

B) SpannedVolume

C) Mirrored Volume

D) StripedVolume

16. Which command is use for creating Shadow copy ?

A) Wbadmin

B) VSSadmin create shadow /for=( Drive Letter)

C) vss

D) None

17. Which Disk Volume is a fault-tolerant volume that collects the free disk space of three or more disks into one volume?

A) StipedVolume

B) SpannedVolume

C) MirroredVolume

D) RAID-5

E) SimpleVolume

18. Which of the following technology allows data transfer between a Server and Data center with the helpofTCP/IP?(Choosetwo)

A) DAS(DirectedAttachedStorage)

B) iSCSI ( Internet Small Computer System Interface) SAN

Page 18: Jetking   questions and answers 8.5x11

18

C) Fiber Channel (FC) SAN

D) NONE

19. Which server storage technology allows you to store data to the storage location, which is directly attachedtoaservereitherasinternalharddisksorarack-mountedRAID?)

A) The Direct-attached Storage

B) TheNetwork-attachedStorage

C) TheStorage-attachedNetwork

D) ATA

20. Which windows server 2008 feature is a group of two or more computers to increase the availability of applications and services?

A) DesktopExperience

B) Failover Clustering

C) RemoteAssistance

D) NetworkLoad-balancing

21. _______________ is a group of servers that provides the load balancing service by sharing multiple client requests by using virtual IP addresses and a shared Name.

A) Internetprintingclient

B) SimpleTCP/IPservices

C) SMTPServer

D) Network Load Balancing

22. Whichofthefollowingistheminimumdiskspacerequiredconfiguringshadowcopy?

A) 300 MB

B) 200MB

C) 150MB

D) 100MB

23. AmithisasystemengineerinJetking.Hewantstoconfigurestorageforatwonodefailovercluster.Thestoragedevice isof4 terabytes(TB)volume, inwhichAmithdecidestoconfigureastoragevolumeof3TB.WhichofthefollowingstepsisfirstlytakenbyAmithtoaccomplishthetask?

A) Create a NTFS partition on the disk

B) ConvertthestoragedisktoaMasterBootRecord(MBR)disk

C) ConvertthestoragedisktoaGUIDPartitionTable.

D) Convertthestoragedisktoadynamicdisk.

Page 19: Jetking   questions and answers 8.5x11

19

24. ________________ is a feature available in windows server 2008 is mainly concerned with protecting dataonadrivethathasbeenstolenorthatcanbeaccessedofflinebybypassingfilepermissions.

A) Bit locker

B) Password

C) Localsecurity

D) VPNauthentication

25. Explain the Characteristics of Windows Server Core Edition ?

a) ServerCoreintroducedin2003,MinimumResourcerequirementcomparedtootherEditions,Itprovides a GUI,Does not provide security,Preferrably installed in Head OFFICE whereadministration is skilled

b) Server Core introduced in 2008,Requires heavy Resourcing compared to other Editions,ItprovidesaGUI,Doesprovidesecurity.PerferrablyinstalledinBranchOfficewhereadministrationis unskilled.

c) Server Core introduced in 2008,Requires minimum Resourcing compared to other Editions,It provides a CLI,Does provide security.Perferrably installed in Branch Office where administration is unskilled.

d) Server Core introduced in 2003,Requires heavy Resourcing compared to other Editions,ItprovidesaCLI,Doesprovidesecurity.PerferrablyinstalledinBranchOfficewhereadministrationis skilled.

26. What is the command to install a role on Server 2008 Core edition ?

a) Start /w ocsetup <Role Name>

b) Start/install/role<RoleName>

c) Install/w/ocsteup<RoleName>

d) Start/wOcInstall<RoleName>

27. What utility is used to change the Hostname of a Windows Server 2008 ?

a) Netdom

b) Hostname/r

c) Chghost<newname>

d) Noneoftheabove

28. What is the command to enable Remote desktop on Windows Server Core with NLA Support ?

a) cscriptC:\Windows\System32\Scregedit.wsf/ar1

b) cscript C:\Windows\System32\Scregedit.wsf /ar 0

c) cscriptC:\Windows\System32\Scregedit.wsf/cs1

d) cscriptC:\Windows\System32\Scregedit.wsf/cs0

Page 20: Jetking   questions and answers 8.5x11

20

29. What is PXE ?

a) PreinstallBootExecution b) Preboot Execution Environment c) PreinstallBootExecutionEnvironment d) PreinstallExecutionEnvironment

30. What is a discovery Image ?

a) A discover image is a type of boot image that you can use to install an operating system on a computer that is not capable of network booting using the PXE

b) 2)Adiscoverimageisatypeofbootimagethatyoucanusetoinstallanoperatingsystemona computer that is capable of network booting using the PXE

c) 3)Adiscoverimageisatypeofinstallimagethatyoucanusetobootanoperatingsystemona computer that is not capable of network booting using the PXE

d) 4)Noneoftheabove

31. Whic tool can be used for successful deployment of Windows Operating Sytems in a Networking Environment using Windows Server 2008 ?

a) WDS

b) WSUS

c) RIS

d) IIS

32. WhichutilityprovidedbyWAIKcanbeusedforcreatinganswerfileforWindowsOSDeployment?

a) WSIM

b) MDT

c) MicrosoftACT

d) WDS

33. HowtoinstallPrintServicesonaServerrunningWindowsServer2008StandardEdition?(Choose2)

a) GotoStart>AdministrativeTools>ServerManager>AddFeatures>PrintServices

b) Go to Start > Administrative Tools > Server Manager > Add Roles > Print Services

c) Go to Control Panel > Program and Features > Windows Components > Add Roles > Print Services

d) GotoControlPanel>ProgramandFeatures>WindowsComponents>AddFeatures>PrintServices

34. What are the default permissions when sharing a printer?

a) Print,ManagePrinters b) Print,ManageDocuments c) Print d) Print,ManageDocuments,MangePrinters

Page 21: Jetking   questions and answers 8.5x11

21

35. In an Enterprise Environment, What tool can be used for Printer Deployment?

a) WSUSConsole

b) WindowsDeploymentServicesConsole

c) Group Policy Management Console

d) PrinterDeploymentTool

36. Which script can be used to enable publishing of Printers to Active Directory?

a) Pubprn.vbs

b) prnmgr.vbs

c) PrnPublish.vbs

d) pnrqctl.vbs

37. What do you mean by ABE?

a) Access-based enumeration allows users to see only files and folders on a file server to which they have permission to access.

b) Access-basedenumerationallowsuserstoseefilesandfoldersonafileservertowhichtheyhave no permission to access.

c) Access-basedenumerationallowsuserstoseecachefilesandfoldersonafileserver.

d) Access-basedenumerationdoesnotallowsuserstoseecachefilesandfoldersonafileserver.

38. WhatistheminimumForestFunctionalLevelforDFSDomainbasedNamespaces?

a) Windows Server 2003 or higher

b) WindowsServer2008orhigher

c) WindowsServer2000orhigher

d) WindowsServer2008R2orhigher

39. WhichProtocolissupportedbyDFSfornamespacebasedFileHosting?

a) SMB

b) NFS

c) FATM

d) X.400

40. WhichtoolcanbeusedtoFilterfilestobesavedonafileserverusingFilesbasedExtensions?

a) FSRM

b) DFS

c) QuotaBasedFileAccess.

d) AccessBasedEnumeration

Page 22: Jetking   questions and answers 8.5x11

22

41. WhichcommandlinetoolcanbeusedforqoutamanagementonFilesandFoldersrunningWindowsServer 2008 ?

a) Quotadir

b) Dirquota

c) Quotamgmt

d) dirmgmt

42. WhileinstallingtheFileServerRole,whichofthefollowingroleserviceshouldbeaddedtousetheQuotaManagementconsoleforcreatingnotificationsforstorageutilization?

a) DistributedFileSystem

b) WindowsServer2003FileServices

c) ServicesforNetworkFileSystem

d) File Server Resource Manager

43. YourcompanyisusingFAT32asthesystempartition&nowitisplanningtomovetoNTFS.WhichofthefollowingareadvantagesofNTFS?(MultipleChoice)

a) Disk Quotas

b) Encryption

c) Compression

d) Noneoftheabove

44. Among the following which tool scans the server for possible security vulnerabilities?

a) ReliabilityMonitor

b) DataCollectorSet

c) Microsoft Baseline Security Analyzer Utility

d) WSUS

45. Out of the following, a minimum of how many characters a strong password must have?

a) 8

b) 10

c) 7

d) 15

46. While installing the Print Services role on Windows Server, which role enables installation of the Print Management snap-in?

a) Print Server b) LDPServer

c) InternetPrinting

d) WebServer

Page 23: Jetking   questions and answers 8.5x11

23

47. TheFileServices rolehelps inperformingwhichof the following tasks inwindowsserver2008?(MultipleChoice)

a) Enabling DFS

b) Configuringdiskquotas

c) Generating storage report

d) Installinganyotherserver

48. Which of the following permissions should you set to reset user password while delegating tasks?

a) Readalluserinformation.

b) Create,delete,manageuseraccounts

c) Reset user passwords & force password change at next logon

d) create,delete,&managegroups

49. Imagine you are the System Administrator of Jetking . The users of Jetking are complaining about the low system performance of the server during day time. However ,at night the server functions properly. You plan to record data of the day & night to compare them for the server performance. Which of the following tools are used to record the performance data & compare the two sets of data?

a) Data Collector Sets

b) ReliabilityMonitor

c) EventViewer

d) NetworkMonitor

50. What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts,andotherfilesthatarereplicateddomain-wide?

A. SYSVOL

B. AD

C. C$

D. VOLMGR

51.AWindowsServer2008computer thathasbeenconfiguredwith theActiveDirectoryDS role isreferred to as a __________.

A. domain controller

B. domain manager

C. global catalog

D. DNS server

Page 24: Jetking   questions and answers 8.5x11

24

52. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

A. primary lookup

B. secondary lookup

C. forward lookup

D. reverse lookup

53. What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?

A. DNS

B. DHCP

C. NetBIOS

D. ADFS

54. The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account.

A. Network

B. Interactive

C. Power User

D. Guest

55.WhatarethespecificprocessesoreventsthatyouwanttotrackintheReliabilityandPerformanceMonitor?

A. performance objects B. performance counters C. performance items D. performance classes

56 . In what type of query does the server that receives the name resolution request immediately respond to the requester with the best information it possesses?

A. formative B. iterative C. recursive D. aligned

57. SelectthefeaturesofADDS.(MultipleChoice)

A. flexibility

B. rigidity

C. scalability

D. lengthy

Page 25: Jetking   questions and answers 8.5x11

25

58. What is command used to install ADDS

A. DCinstall.exe

B. dcpromo.exe

C. mmc.exe

D. None

59. What is command to use remove ADDS forcefully?

A. dcpromo /forceremoval

B. dcpromo

C. dcpromo\forceremoval

D. None

60. When Directory Services Restore Mode Administrator Password is required?

A. During Restore of Directory Services

B. During Backup of Directory Services

C. During Domain Login

D. None

61. New feature in server 2008 for ADDS?

A. Domain Controller

B. Read Only Domain Controller

C. Write only Domain Controller

D. None

62. Which Zone is used for IP Address Resolution to Hostname

A. Reverse Lookup Zone

B. ForwardLookupZone

C. Forward&ReverseLookupZone

D. None

63. DNS service can be used as

A. Only as AD integrated service

B. Only as stand-alone service

C. AD integrated service & stand-alone service both

D. None

Page 26: Jetking   questions and answers 8.5x11

26

64. selecttherecordsusedbyDNS(MultipleChoice)

A. Host Record

B. Pointer Record

C. E-Mail Record

D. ConfigurationRecord

65. What is use of Secondary DNS Server

A. Backup of Primary DNS Server

B. Load balancing

C. User Data

D. None

66. To perform a System State restore in Windows Server 2008, you will boot the DC into what mode? (MultipleChoice)

A. Active Directory Restore

B. Active Directory Maintenance

C. Directory Services Maintenance

D. Directory Services Restore

67. Whatallowsbusinessestodefine,manage,access,andsecurenetworkresourcesincludingfiles,printers,people,andapplications?(MultipleChoice)

A. network service

B. Directory service

C. Directory Infrastructure

D. NT directory

68. SelecttheoptionsthatcanbeconfiguredwithDHCP(MultipleChoice)

A. Reservations

B. IP Address Scope

C. WDS

D. None

69.IfclientonautomaticIPAdresssconfigurationdoesnotgetDHCPServer’sIPwhatclientPCwillobtain

A. APIPA

B. Public Address

C. DHCP Server IP

D. None

Page 27: Jetking   questions and answers 8.5x11

27

70 . How is a local print device attached to a computer?

A. through the network

B. through computer ports

C. through another computer

D. none of the above

71. WhatWindowsServer2008featureenablesyoutomaintainpreviousversionsoffilesonaserver?

A. Backup Tape

B. Shadow Copies

C. ShadowFiles

D. OfflineFiles

72.TheWindowsServer2008pagingfileis__________timestheamountofmemoryinstalledinthecomputer by default.

A. 1.5

B. 2

C. 2.5

D. 3

73. A __________ is a complete installation of an operating system that runs in a software environment emulating a physical computer.

A. virtual machine

B. virtual server

C. terminal machine

D. terminal server

74. What is the only authentication method integrated into IIS7 that IIS7 enables by default?

A. Basic Authentication

B. Anonymous Authentication

C. Digest Authentication

D. Windows Authentication

75. Theprocessofgrantingauseraccesstoafileserversharebyreadingtheirpermissionsiscalled__________.

A. authorization

B. authentication

C. ownership

D. delegation

Page 28: Jetking   questions and answers 8.5x11

28

76. What is the only authentication method integrated into IIS7 that IIS7 enables by default?

A. Basic Authentication

B. Anonymous Authentication

C. Digest Authentication

D. Windows Authentication

77. What does RAID stand for?

A. Redundant Array of Interoperative Disks

B. Repetitive Array of Independent Disks

C. Redundant Array of Interpretive Disks

D. Redundant Array of Independent Disks

78. HTTP uses what well-known port number?

A. 80

B. 25

C. 12

D. 110

79. What Windows Server 2008 service can you use to protect sensitive data on a Windows network?

A. ADFS

B. ADFTP

C. ADFSMO

D. AD RMS

80. Whatenablesnetworkadministratorsandowners toconfigureaccessrights forusersduring theusers’entirelifecyclewithinanorganization?

A. Identity Lifecycle Management

B. General Lifecycle Management

C. Microsoft Lifecycle Management

D. Lifecycle of Software Management

81. Whataresmallphysicaldevicesonwhichadigitalcertificateisinstalledthatareusuallythesizeofa credit card or keychain fob?

A. RSA SecureID

B. digitalcertificates

C. smart cards

D. biometric devices

Page 29: Jetking   questions and answers 8.5x11

29

82. What service responds to requests from clients concerning the revocation status of a particular certificate,returningadigitallysignedresponseindicatingthecertificate’scurrentstatus?

A. Web Enrollment B. Web Responder C. enterprise CA D. Online Responder

83. WindowsServer2008computerthathasbeenconfiguredwiththeActiveDirectoryDSroleisreferredto as a __________.

A. domain controller

B. domain manager

C. global catalog

D. DNS server

84. What protocol has become an industry standard that enables data exchange between directory services and applications?

A. NTDS

B. LDAP

C. NDIS

D. AD

85. What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

A. A records

B. MX records

C. SRV records

D. SOA records

86. What is the process of replicating DNS information from one DNS server to another?

A. replication

B. DNS push

C. zone transfer

D. DNS update

87. What type of trust relationship allows you to create two-way transitive trusts between separate forests?

A. shortcut B. cross-forest C. external D. real

Page 30: Jetking   questions and answers 8.5x11

30

90. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

A. primary lookup

B. secondary lookup

C. forward lookup

D. reverse lookup

91. What DLL must be registered to use the Schema Management snap-in?

A. schmmgnt32.dll B. schemamanagement.dll C. schmmgmt.dll D. adschm.dll

92. Replication within Active Directory will occur when which of the following conditions is met?

A. An object is added or removed from Active Directory.

B. The value of an attribute has changed.

C. The name of an object has changed.

D. All of the above

93. What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?

A. Dcdiag

B. Repdiag

C. Repadmin

D. Netstat

94. Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the beginning of the line and applied before any other changes that are waiting to be replicated.

A. urgent

B. immediate

C. fast

D. pushed

95. WhichFSMOrolehastheauthoritytomanagethecreationanddeletionofdomains,domaintrees,and application data partitions in the forest?

A. RelativeIdentifierMaster

B. Infrastructure Master

C. Domain Naming Master

D. Schema Master

Page 31: Jetking   questions and answers 8.5x11

31

96. What types of memberships are stored in the global catalog?

A. domain local

B. universal

C. global

D. local workstation

97.WhatconsolemustbeusedtomovetheDomainNamingMasterFSMOrole?

A. Active Directory Users and Computers

B. ActiveDirectoryForestsandDomains

C. Active Directory Schema

D. Active Directory Domains and Trusts

98. What command-line utility is used to import or export Active Directory information from a comma-separatedvalue(.csv)file?

A. NETDIAG

B. NSLOOKUP

C. CSVDE

D. DCPROMO

99. Whatspecialidentitygroupisusedbythesystemtoallowpermissiontoprotectedsystemfilesforservices to function properly?

A. Network Service

B. Restricted

C. Service

D. Self

100.WhenusingCSVDE,whatisthefirstlineofthetextfilethatusesproperattributenames?

A. header row

B. header record

C. name row

D. name record

Page 32: Jetking   questions and answers 8.5x11

32