You are on page 1of 2

Sample question of Server -2008 Qus 1 : When replicating information between sites, Active Directory will designate a __________

server in each site to act as a gatekeeper in managing site-to-site replication. A. primary B. masthead C. bridgehead D. global catalog Qus 2 : What defines a chain of site links by which domain controllers from different sites can communicate? A. site link bridge B. site chain C. site chain bridge D. site link chain Qus 3 : How many FSMO roles does Active Directory support? A. 2 B. 5 C. 10 D. 12 Qus 4 : How many RID Masters can a domain have? A. 1 B. 2 C. 3 D. 5 E. 8 Qus 5 : What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role? A. role transfer B. role migration C. role seizure D. role separation Qus 5 : __________ name refers to each users login name. A. Common B. Distinguished C. SAM account D. AD Name Qus 6 : What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary? A. DCPROMO B. LDIFDE C. CSVDE D. NSLOOKUP Qus 7 : Which of the following is a benefit of implementing a public key infrastructure (PKI)? A. Users no longer need to remember passwords. B. All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it. C. Smart cards can be used from remote locations, such as a home office, to provide authentication services. D. All of the above Qus 8 : What is a method of controlling settings across your network? A. Group Policy B. Active Directory C. FSMO roles D. MMC

Qus 9 : What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU? A. Group Policies B. Group Policy Settings C. Group Policy Objects D. Group Policy Links Qus 10 : What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run? A. Reverse Processing B. Switchback Processing C. Loopback Processing D. Repeat Processing Qus 11 : What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain? A. Fine-Grained Password Policies B. Fine-Tuned Password Policies C. Restricted Password Policies D. Custom Password Policies Qus 12 : Where can you configure the Group Policy refresh interval? A. Computer Configuration\\System\\Group Policy B. User Configuration\\Administrative Templates\\System\\Group Policy C. Computer Configuration\\Administrative Templates\\System\\Group Policy D. Computer Configuration\\Administrative Templates\\Group Policy Qus 13 : Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file? A. .exe B. .msi C. .mse D. .inf Qus 14 : Modifications to .msi files require transform files, which have the __________ extension. A. .msit B. .mse C. .msx D. .mst Qus 15 : When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users? A. Unrestricted B. Restricted C. Basic User D. Disallowed Qus 16 : What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information? A. Linked Group Policy Objects B. Group Policy Inheritance C. Delegation D. Management

You might also like