Microsoft Server 70-411 (testbank)
a. NT Link Messenger
b. NT Link Manager
c. NT LAN Manager
d. NT LAN Messenger
a. revealing the client’s operating system to the server
b. revealing the protocol to the server
c. sending a password to the server
d. sending an encrypt/decrypt message to the server
a. a secure network authentication protocol
b. a simple Microsoft-only protocol
c. a uni-directional authentication protocol
d. a certificate-based authentication protocol
a. secure transmission
b. secret key
d. legacy code
a. 1 minute
b. 5 minutes
c. 15 minutes
d. 45 minutes
a. service name, IP address, and port number
b. service name, URL, and host name
c. service name, host name, and IP address
d. service class, host name, and port number
a. An event is written to the Kerberos server’s event log.
b. The client receives an access denied error.
c. The Kerberos server receives an access denied error.
d. The Kerberos ticket for that service is destroyed.
c. Microsoft Word
d. ADSI Edit
a. standalone MSAs
b. standard local service accounts
c. Group MSAs
d. domain user accounts designated as service accounts
c. NT Serviceservicename
d. NT Serviceservicename$
a. user database
b. services database
c. Managed Service Accounts database
d. Active Directory database
a. You have a single domain.
b. You have Windows NT 4.0 systems to support.
c. You have multiple schemas.
d. Your AD DS is Windows 2008 or higher.
c. directory structure
d. organizational units
a. Schema Master
d. Operations Master
a. at least one
b. at least two
c. at least three
d. no fewer than four
a. in a small network instead of in an enterprise
b. in an enterprise network
c. in a remote site
d. in the place of a standard domain controller
a. Windows Server 2003
b. Windows Server 2008
c. Windows Server 2008 R2
d. Windows Server 2012
a. adprep /renew
b. Forest Master
c. writable domain controller
d. domain tree
a. Windows Server 2000
b. Windows Server 2003
c. Windows Server 2008
d. Windows Server 2012
a. domain trust groups, domain schema groups, and universal groups
b. domain local groups, global groups, and universal groups
c. global groups, domain trust groups, and schema groups
d. universal groups, global catalog groups, and schema groups
a. It decrypts and encrypts Active Directory information.
b. It exports/imports Active Directory information.
c. It exports/imports data from Event Viewer.
d. It extracts Event Viewer information into CSV files.
c. Command line with networking
a. a unique identifier for a snapshot
b. a special file permission
c. an Active Directory object ID
d. a group-user ID in Active Directory
a. the Active Directory Lost and Found folder
b. the Active Directory Recycle Bin
c. the Active Directory Undelete utility
d. Active Directory Snapshots
a. every 45 minutes
b. every 2 hours
c. every 8 hours
d. every 12 hours
a. Remove the old identifier.
b. Re-establish user to domain trust.
c. Reset the user’s password.
d. Restore the user-owned objects from a backup.
a. low-level database corruption
b. fragmentation levels
c. accuracy of entries
d. completeness of entries
a. Shut down the domain controller and manually remove it from AD.
b. Use dcdemo to demote the domain controller.
c. Uninstall Active Directory Domain Services.
d. Enter the DSRM and delete Active Directory.
a. metadata defrag
b. metadata restore
c. metadata cleanup
d. metadata repair
a. its formal name
b. its exact location
c. its OU and proper name
d. its distinguished name
a. a reference to an attribute within another object
b. a reference to metadata
c. a pointer to the obect’s OU
d. a reference to a distinguished name location
a. The DSRM console
b. The ntdsutil command-line utility
c. Active Directory Maintenance Mode
d. Restartable Active Directory Domain Services
a. local administrators
b. power users
c. domain users
d. domain administrators
a. Assign the PSOs directly to individual users.
b. Assign the PSOs to a new group and add the users to the new group.
c. Assign the PSOs to a global security group and add users to the group.
d. Assign the PSOs to various Active Directory groups as needed.
a. ease of enforcement
b. user compliance
c. centralized management
d. ease of creation
a. editing group policies
b. editing local security policies
c. editing global security policies
d. editing domain-level policies
a. how many seconds a user must wait before a password reset
b. how many minutes a user must wait before a password reset
c. how many hours a user must wait before a password reset
d. how many days a user must wait before a password reset
a. because administrator passwords are usually simpler than user passwords
b. because administrator accounts carry more security sensitivity than users do
c. because administrators are paranoid about security
d. because administrator accounts are watched by management in large companies
a. 0 to 9
b. 0 to 15
c. 0 to 24
d. 0 to 63
a. Use your username and add numbers and special characters.
b. Use your favorite football team’s name with numbers and special characters.
c. Ask a friend for some ideas for good passwords and then add your own number and characters.
d. Start with a sentence and then add numbers and special characters.
a. 30 seconds
b. 1 minute
c. 5 minutes
d. 8 minutes
a. Global Group Policy
b. Default Domain Policy
c. Default Group Policy
d. Default Global Domain Policy
a. Local group policy, Site, Domain, User
b. OU, Domain, Site, Local group policy
c. Local security policy, Site, Domain, OU
d. Local group policy, Site, Domain, OU
a. 60 seconds
b. 120 seconds
c. 300 seconds
d. 600 seconds
a. Processing is hidden from the user.
b. The user is too busy to be aware of the processing.
c. The processing occurs when the system is not being used.
d. The user is aware of only startup delays.
a. The user initiates interactive logon.
b. The computer obtains a list of GPOs from the domain controller.
c. The computer establishes a secure link to the domain controller.
d. The GPOs are applied to the computer and to the user.
a. cumulative processing
b. inherent processing
a. by precedence
b. by importance
c. by administrative control
d. by GPO controller policy
a. Apply Group
b. Allow Group
c. Apply Global
d. Allow Global
a. when the filter is created
b. when the policy is applied
c. when the filter is applied
d. when the policy is processed
a. NT 4.0
d. There is no such requirement to use WMI filters.
a. At the domain controller, execute the Gpupdate /force command.
b. Copy the GPO to all domain controllers using Active Directory Sites and Services.
c. On the domain controller, execute the Windows PowerShell Invoke-GPUupdate cmdlet.
d. Enable the Group Policy Caching feature using a GPO.
a. GPO Turbo Mode
b. GPO Enhanced Mode
c. Group Policy Update
d. Group Policy Caching
a. an ADM file translator
b. the ADM format for newer operating systems
c. a template buffer
d. the protocol that deploys ADM files across networks
a. an App Store from which you can deploy GPOs
b. a public share that allows users to place GPO requests into a queue
c. a repository for Administrative Templates
d. an online App Store for Administrative Templates
a. Control Panel
b. Add/Remove Programs applet
c. Windows Installer
d. Application Installer
a. They deploy customized software installation files
b. They are template files for software packages
c. They are custom patch files
d. They specialize in software installation test files
a. Convert it to a ZIP file
b. Convert it to an MSI file
c. Convert it to an MSP file
d. Convert it to an MST file
a. in the Central Store
b. on the domain controller
c. in the SYSVOL folder
d. in individual GPOs
a. in the SYSVOL directory
b. Microsoft Online
d. on a domain controller public share
a. local administrators
b. power users
c. domain administrators
d. domain users
a. Disallow Read
b. Disallow Write
c. Disallow Modify
d. Disallow Apply
a. that you’re about to reset policies to their defaults
b. that all User Rights Assignments will be replaced
c. that all security for the domain will be overwritten
d. that you’re about to restore all security to the default
a. Group Policy Management Editor
b. Group Policy Preference Editor
c. Group Policy Editor
d. Group Policy Wizard
a. Select the Stop processing items option on the Common tab.
b. Select the Remove this item option on the Common tab.
c. Select the Stop on any error option in the GPP Wizard.
d. Select the Stop on all errors option in the GPP Wizard.
a. .ini files
a. GPP Registry Tweaks
b. GPP Service Pack 1
c. A special GPP hotfix
d. GPP Client-Side Extensions
a. the Registry Scope
b. the Registry Extension
c. the Registry Configurator
d. the Registry Wizard
a. individual targeting
b. user-specific targeting
c. item-level targeting
d. focused targeting
Need essay sample on "Microsoft Server 70-411 (testbank)"? We will write a custom essay sample specifically for you for only $ 13.90/page