logo image

Microsoft Server 70-411 (testbank)

Lesson 15
What is the default authentication protocol for non-domain computers?
a. NTLM
b. PAP
c. CHAP
d. Kerberos
NTLM
What does the acronym NTLM stand for?
a. NT Link Messenger
b. NT Link Manager
c. NT LAN Manager
d. NT LAN Messenger
NT LAN Manager
NTLM uses a challenge-response mechanism for authentication without doing what?
a. revealing the client’s operating system to the server
b. revealing the protocol to the server
c. sending a password to the server
d. sending an encrypt/decrypt message to the server
sending a password to the server
What type of protocol is Kerberos?
a. a secure network authentication protocol
b. a simple Microsoft-only protocol
c. a uni-directional authentication protocol
d. a certificate-based authentication protocol
a secure network authentication protocol
Kerberos security and authentication are based on what type of technology?
a. secure transmission
b. secret key
c. challenge-response
d. legacy code
secret key
What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?
a. 1 minute
b. 5 minutes
c. 15 minutes
d. 45 minutes
5 minutes
Which three components make up a service principal name (SPN)?
a. service name, IP address, and port number
b. service name, URL, and host name
c. service name, host name, and IP address
d. service class, host name, and port number
service class, host name, and port number
What happens if a client submits a service ticket request for an VPN that does not exist in the identity store?
a. An event is written to the Kerberos server’s event log.
b. The client receives an access denied error.
c. The Kerberos server receives an access denied error.
d. The Kerberos ticket for that service is destroyed.
The client receives an access denied error.
Which tool can you use to add SPNs to an account?
a. Notepad
b. LDAP
c. Microsoft Word
d. ADSI Edit
ADSI Edit
Identify another utility that you can use to add SPNs to an account.
a. dnscmd
b. spnedit
c. setspn
d. netsh
setspn
What type of account is an account under which an operating system, process, or service runs?
a. user
b. system
c. service
d. network
service
By default which service accounts will the Windows PowerShell cmdlets manage?
a. standalone MSAs
b. standard local service accounts
c. Group MSAs
d. domain user accounts designated as service accounts
Group MSAs
Which of the following is the format for a virtual account used with Windows Server 2008 R2, and Windows Server 2012, and Windows Server 2012 R2?
a. domainnameservicename
b. computernameservicename
c. NT Serviceservicename
d. NT Serviceservicename$
NT Serviceservicename
Lesson 16
The domain controllers are the computers that store and run the _______________.
a. user database
b. services database
c. Managed Service Accounts database
d. Active Directory database
Active Directory database
How many PDC Emulators are required, if needed, in a domain?
a. one
b. two
c. three
d. four
one
You do not place the infrastructure master on a global catalog server unless what situation exists?
a. You have a single domain.
b. You have Windows NT 4.0 systems to support.
c. You have multiple schemas.
d. Your AD DS is Windows 2008 or higher.
You have a single domain.
When you add attributes to an Active Directory object, what part of the domain database are you actually changing?
a. FSMO
b. schema
c. directory structure
d. organizational units
schema
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?
a. Schema Master
b. Forest
c. RODC
d. Operations Master
Operations Master
How many global catalogs are recommended for every organization?
a. at least one
b. at least two
c. at least three
d. no fewer than four
at least two
Where are you most likely to see a Read-Only Domain Controller (RODC)?
a. in a small network instead of in an enterprise
b. in an enterprise network
c. in a remote site
d. in the place of a standard domain controller
in a remote site
Beginning with which server version can you safely deploy domain controllers in a virtual machine?
a. Windows Server 2003
b. Windows Server 2008
c. Windows Server 2008 R2
d. Windows Server 2012
Windows Server 2012
What utility must you run on a cloned system to ensure that the clone receives its own SID?
a. adprep /renew
b. sysprep
c. dcpromo
d. ntconfig
sysprep
Which type of system must you connect to and use to make changes to Active Directory?
a. RODC
b. Forest Master
c. writable domain controller
d. domain tree
writable domain controller
Which version of Windows Server introduced incremental universal group membership replication?
a. Windows Server 2000
b. Windows Server 2003
c. Windows Server 2008
d. Windows Server 2012
Windows Server 2003
What are the three types of groups in a domain?
a. domain trust groups, domain schema groups, and universal groups
b. domain local groups, global groups, and universal groups
c. global groups, domain trust groups, and schema groups
d. universal groups, global catalog groups, and schema groups
domain local groups, global groups, and universal groups
Lesson 17
What function does the CSVDE tool perform?
a. It decrypts and encrypts Active Directory information.
b. It exports/imports Active Directory information.
c. It exports/imports data from Event Viewer.
d. It extracts Event Viewer information into CSV files.
It exports/imports Active Directory information.
If a single domain controller’s AD database becomes corrupt, which type of restore should you perform on it?
a. authoritative
b. nonauthoritative
c. explicit
d. full
nonauthoritative
To perform an authoritative restore, into what mode must you reboot the domain controller?
a. Repair
b. Safe
c. Command line with networking
d. DSRM
DSRM
What is a GUID?
a. a unique identifier for a snapshot
b. a special file permission
c. an Active Directory object ID
d. a group-user ID in Active Directory
a unique identifier for a snapshot
What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory containers and obects?
a. the Active Directory Lost and Found folder
b. the Active Directory Recycle Bin
c. the Active Directory Undelete utility
d. Active Directory Snapshots
the Active Directory Recycle Bin
By default, how often does Active Directory “garbage collection” occur?
a. every 45 minutes
b. every 2 hours
c. every 8 hours
d. every 12 hours
every 12 hours
After you undelete a user account with the LDP utillity, what action do you need to perform?
a. Remove the old identifier.
b. Re-establish user to domain trust.
c. Reset the user’s password.
d. Restore the user-owned objects from a backup.
Reset the user’s password.
In interactive mode, what aspect of AD can you check with the ‘ntdsutil integrity’ command?
a. low-level database corruption
b. fragmentation levels
c. accuracy of entries
d. completeness of entries
low-level database corruption
What is the proper procedure for removing a domain controller from Active Directory?
a. Shut down the domain controller and manually remove it from AD.
b. Use dcdemo to demote the domain controller.
c. Uninstall Active Directory Domain Services.
d. Enter the DSRM and delete Active Directory.
Uninstall Active Directory Domain Services.
Which of the following ntdsutil commands cleans up metadata?
a. metadata defrag
b. metadata restore
c. metadata cleanup
d. metadata repair
metadata cleanup
To perform an authoritative restore of an obect or subtree, what bit of information do you need to know about the object?
a. its formal name
b. its exact location
c. its OU and proper name
d. its distinguished name
its distinguished name
When you do an authoritative restore process, a back-links file is created. What is a back-links file?
a. a reference to an attribute within another object
b. a reference to metadata
c. a pointer to the obect’s OU
d. a reference to a distinguished name location
a reference to an attribute within another object
Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature?
a. The DSRM console
b. The ntdsutil command-line utility
c. Active Directory Maintenance Mode
d. Restartable Active Directory Domain Services
The ntdsutil command-line utility
Which utility do you use to defragment Active Directory?
a. CSVDE
b. LDIFDE
c. ntdsutil
d. defrag
ntdsutil
Lesson 18
What are examples of password policies? Select all that apply.
a. history
b. length
c. complexity
d. age
age
Why primarily are account lockout policies put into place?
a. privacy
b. security
c. policy
d. regulations
security
What is the default setting for password history?
a. 6
b. 10
c. 16
d. 24
24
What is the default minimum password length in characters?
a. 5
b. 7
c. 8
d. 10
7
What setting can you give for account lockout duration that requires an administrator to manually unlock the account?
a. 0
b. 10
c. 99
d. 99,999
By default, who has read/write capability to the Default Domain Policy?
a. local administrators
b. power users
c. domain users
d. domain administrators
domain administrators
How should you assign Password Settings objects (PSOs) to users?
a. Assign the PSOs directly to individual users.
b. Assign the PSOs to a new group and add the users to the new group.
c. Assign the PSOs to a global security group and add users to the group.
d. Assign the PSOs to various Active Directory groups as needed.
Assign the PSOs to a global security group and add users to the group.
What is the primary advantage of using Group Policies in a domain environment?
a. ease of enforcement
b. user compliance
c. centralized management
d. ease of creation
centralized management
What is the secpol.msc utility used for?
a. editing group policies
b. editing local security policies
c. editing global security policies
d. editing domain-level policies
editing local security policies
What does the minimum password age setting control?
a. how many seconds a user must wait before a password reset
b. how many minutes a user must wait before a password reset
c. how many hours a user must wait before a password reset
d. how many days a user must wait before a password reset
how many days a user must wait before a password reset
Why should administrator passwords change more often than user passwords?
a. because administrator passwords are usually simpler than user passwords
b. because administrator accounts carry more security sensitivity than users do
c. because administrators are paranoid about security
d. because administrator accounts are watched by management in large companies
because administrator accounts carry more security sensitivity than users do
What is the range of password history settings?
a. 0 to 9
b. 0 to 15
c. 0 to 24
d. 0 to 63
0 to 24
What is an easy method of creating a strong password?
a. Use your username and add numbers and special characters.
b. Use your favorite football team’s name with numbers and special characters.
c. Ask a friend for some ideas for good passwords and then add your own number and characters.
d. Start with a sentence and then add numbers and special characters.
Start with a sentence and then add numbers and special characters.
By default, which of the following represents the maximum amount of time by which a computer’s internal clock can be inaccurate yet still be able to use Kerberos authentication?
a. 30 seconds
b. 1 minute
c. 5 minutes
d. 8 minutes
5 minutes
Lesson 19
Which feature affects all users in the domain, including domain controllers?
a. Global Group Policy
b. Default Domain Policy
c. Default Group Policy
d. Default Global Domain Policy
Default Domain Policy
In which order are Group Policy objects (GPOs) processed?
a. Local group policy, Site, Domain, User
b. OU, Domain, Site, Local group policy
c. Local security policy, Site, Domain, OU
d. Local group policy, Site, Domain, OU
Local group policy, Site, Domain, OU
What is the default timeout value for GPOs to process on system startup?
a. 60 seconds
b. 120 seconds
c. 300 seconds
d. 600 seconds
600 seconds
GPOs are processed on computer startup and after logon. Why is the user never aware of the processing?
a. Processing is hidden from the user.
b. The user is too busy to be aware of the processing.
c. The processing occurs when the system is not being used.
d. The user is aware of only startup delays.
Processing is hidden from the user.
What is the first step in the GPO processing order?
a. The user initiates interactive logon.
b. The computer obtains a list of GPOs from the domain controller.
c. The computer establishes a secure link to the domain controller.
d. The GPOs are applied to the computer and to the user.
The computer establishes a secure link to the domain controller.
The downward flow of group policies is known as what feature of GPOs?
a. cumulative processing
b. inherent processing
c. inheritance
d. control
inheritance
If a site, domain, or OU has multiple GPOs, how are the group policies processed?
a. by precedence
b. by importance
c. by administrative control
d. by GPO controller policy
by precedence
By default, which GPO permissions are all authenticated users given?
a. Apply Group
b. Allow Group
c. Apply Global
d. Allow Global
Apply Group
At what point are WMI filters evaluated?
a. when the filter is created
b. when the policy is applied
c. when the filter is applied
d. when the policy is processed
when the policy is processed
To use WMI filters, you must have one domain controller running which version of Windows Server or higher?
a. NT 4.0
b. 2000
c. 2003
d. There is no such requirement to use WMI filters.
2003
How many WMI filters can be configured for a GPO?
a. one
b. two
c. four
d. eight
one
What kind of group policies should you enable for student computers?
a. generic
b. loopback
c. extensive
d. compliant
loopback
You are administrator of a corporation with clients running Windows 8 or Windows 8.1. Your domain controllers are running Windows Server 2012 R2. You have made a change to a GPO and you want the GPO settings to be applied immediately. What can you do?
a. At the domain controller, execute the Gpupdate /force command.
b. Copy the GPO to all domain controllers using Active Directory Sites and Services.
c. On the domain controller, execute the Windows PowerShell Invoke-GPUupdate cmdlet.
d. Enable the Group Policy Caching feature using a GPO.
On the domain controller, execute the Windows PowerShell Invoke-GPUupdate cmdlet.
Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings?
a. GPO Turbo Mode
b. GPO Enhanced Mode
c. Group Policy Update
d. Group Policy Caching
Group Policy Caching
Lesson 20
What is an ADMX file?
a. an ADM file translator
b. the ADM format for newer operating systems
c. a template buffer
d. the protocol that deploys ADM files across networks
the ADM format for newer operating systems
What is the Central Store?
a. an App Store from which you can deploy GPOs
b. a public share that allows users to place GPO requests into a queue
c. a repository for Administrative Templates
d. an online App Store for Administrative Templates
a repository for Administrative Templates
What is the name of the software component used for installation, maintenance, and removal of software on Windows?
a. Control Panel
b. Add/Remove Programs applet
c. Windows Installer
d. Application Installer
Windows Installer
What is the filename extension for the files in which installation information is stored?
a. .txt
b. .xml
c. .ini
d. .msi
.msi
What are MST files used for?
a. They deploy customized software installation files
b. They are template files for software packages
c. They are custom patch files
d. They specialize in software installation test files
They deploy customized software installation files
Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it?
a. Convert it to a ZIP file
b. Convert it to an MSI file
c. Convert it to an MSP file
d. Convert it to an MST file
Convert it to an MSI file
Where is the default location for ADMX files?
a. C:WindowsSYSVOLADMX
b. C:WindowsSystem32XMLADMX
c. C:WindowsInf
d. C:WindowsPolicyDefinitions
C:WindowsPolicyDefinitions
What language are ADMX files based on?
a. HTML
b. XML
c. SGML
d. Java
XML
Unlike ADM files, ADMX files are not stored where?
a. in the Central Store
b. on the domain controller
c. in the SYSVOL folder
d. in individual GPOs
in individual GPOs
Where is the Central Store located?
a. in the SYSVOL directory
b. Microsoft Online
c. TechNet
d. on a domain controller public share
in the SYSVOL directory
Lesson 21
Which domain users are automatically granted permissions to perform Group Policy Management tasks?
a. local administrators
b. power users
c. domain administrators
d. domain users
domain administrators
If you don’t want a GPO to apply, which group policy permission do you apply to user or group?
a. Disallow Read
b. Disallow Write
c. Disallow Modify
d. Disallow Apply
Disallow Apply
When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the change?
a. that you’re about to reset policies to their defaults
b. that all User Rights Assignments will be replaced
c. that all security for the domain will be overwritten
d. that you’re about to restore all security to the default
that all User Rights Assignments will be replaced
Lesson 22
Which utility do you use to create GPO preferences?
a. Group Policy Management Editor
b. Group Policy Preference Editor
c. Group Policy Editor
d. Group Policy Wizard
Group Policy Management Editor
For GPP editing states, which key do you use to toggle Enable Current?
a. F4
b. F5
c. F6
d. F7
F6
How do you stop processing a preference if an error occurs?
a. Select the Stop processing items option on the Common tab.
b. Select the Remove this item option on the Common tab.
c. Select the Stop on any error option in the GPP Wizard.
d. Select the Stop on all errors option in the GPP Wizard.
Select the Stop processing items option on the Common tab.
Which Windows extension allows you to copy registry settings and apply them to other computers, create, replace or delete registry settings?
a. Applications
b. Environment
c. Files
d. Registry
Registry
Which Windows extension allows you to add, replace or delete sections or properties in configuration settings or setup information files?
a. .ini files
b. files
c. folders
d. environment
.ini files
To support GPPs on older Windows versions (Server and Workstation), you have to install what component from Microsoft?
a. GPP Registry Tweaks
b. GPP Service Pack 1
c. A special GPP hotfix
d. GPP Client-Side Extensions
GPP Client-Side Extensions
Which component allows you to create multiple Registry preference items based on registry settings that you select?
a. the Registry Scope
b. the Registry Extension
c. the Registry Configurator
d. the Registry Wizard
the Registry Wizard
Which term describes changing the scope of individual preference items so that the preference items apply only to selected users or computers?
a. individual targeting
b. user-specific targeting
c. item-level targeting
d. focused targeting
item-level targeting

Need essay sample on "Microsoft Server 70-411 (testbank)"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy