Você está na página 1de 9

ITT Technical Institute

3825 West Cheyenne Avenue, Suite 600


North Las Vegas, Nevada 89032
NT1330 Client-Server Networking II
Name: ____________________________________________________ Date: _______________________
Steve Todd Page 1 of 9
NT1330 Week 3, Assignment 3
Instructions:
1. Complete this assignment and submit it prior to the beginning of the next class meeting.
2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will
be marked as incorrect.
1. Inbound replication is when a domain controller transmits replication information to other domain
controllers on the network.
A True
B False
2. Interoperability with prior versions of Microsoft Windows is available in Windows Server 2008 through
the use of functional levels.
A True
B False
3. Administration of an OU also can be delegated to a departmental supervisor or manager, and thus can
allow that person to manage day-to-day resource access or more mundane tasks, such as resetting
passwords. This is referred to as assignment of control.
A True
B False
4. Active Directory relies on DNS to provide a locator service for clients on the network.
A True
B False
5. Only the primary domain controller of the entire forest must be running an operating system supported by
the targeted forest functional level.
A True
B False
6. The default location for the Active Directory database and log files is C:\Windows\System32.
A True
B False
Steve Todd Page 2 of 9
7. You can launch the Active Directory Installation Wizard using the dcpromo.exe command-line tool or
from the Server Manager utility thats installed in the Administrative Tools folder of each Windows
Server 2008 server.
A True
B False
8. Aging is the process of removing records that were not refreshed or updated within specified time intervals,
which will occur naturally with machines that are removed from the network.
A True
B False
9. For domain controllers to register their records with DNS at startup, dynamic updates must be allowed.
A True
B False
10. Because Server Core does not support graphical utilities, such as Server Manager and the Active Directory
Installation Wizard, you need to run dcpromo from the command line using an unattended installation,
which uses a specially formatted text file to specify the necessary installation options.
A True
B False
11. What allows businesses to define, manage, access, and secure network resources including files, printers,
people, and applications?
A network service
B directory service
C Directory Infrastructure
D NT directory
12. A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred
to as a __________.
A domain controller
B domain manager
C global catalog
D DNS server
13. The process of keeping each domain controller in synch with changes that have been made elsewhere on
the network is called __________.
A copying
B osmosis
C transferring
D replication
Steve Todd Page 3 of 9
14. Which of the following is not a benefit of Active Directory Domain Services?
A single logon for access to global resources
B fault tolerance and redundancy
C personalized desktops
D simplified resource location
15. Interoperability with prior versions of Microsoft Windows is available in Windows Server 2008 through
the use of __________.
A domain controllers
B functional levels
C global catalogs
D DNS servers
16. The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does
not replicate its changes to other domain controllers within Active Directory.
A Secondary
B Primary
C Read-Only
D Mandatory
17. The largest container object within Active Directory is a(n) __________.
A organization unit
B domain
C tree
D forest
18. What contains the rules and definitions that are used for creating and modifying object classes and
attributes within Active Directory?
A Configuration NC
B Schema NC
C Domain NC
D DC NC
19. What master database contains definitions of all objects in the Active Directory?
A schema
B global catalog
C DNS
D domain controller
Steve Todd Page 4 of 9
20. A __________ is defined as one or more IP subnets that are connected by fast links.
A domain
B network
C site
D forest
21. What protocol has become an industry standard that enables data exchange between directory services and
applications?
A NTDS
B LDAP
C NDIS
D AD
22. A __________ name references an object in the Active Directory directory structure by using its entire
hierarchical path, starting with the object itself and including all parent objects up to the root of the
domain
A common
B DNS
C schema
D distinguished
23. What locator records within DNS allow clients to locate an Active Directory domain controller or global
catalog?
A A records
B MX records
C SRV records
D SOA records
24. Which functional level only allows Windows Server 2003 and Windows 2008 domain controllers?
A Windows 2000 Native
B Windows Server 2003
C Windows Server 2008
D Windows 2003 Mixed
25. __________ is the highest available forest functional level.
A Windows 2000
B Windows Server 2003
C Windows Server 2008
D Windows 2009
Steve Todd Page 5 of 9
26. To raise the functional level of a forest, you must be logged on as a member of the __________ group.
A Domain Admins
B Enterprise Admins
C Global Admins
D Universal Admins
27. Active Directory uses __________ relationships to allow access between multiple domains and/or forests,
either within a single forest or across multiple enterprise networks.
A trust
B domain
C forest
D global
28. What type of trust is new to Windows Server 2008 and is only available when the forest functionality is set
to Windows Server 2008?
A parent-child trust
B two-way transitive trust
C cross-forest trust
D simple trust
29. When a child domain is created, it automatically receives a __________ trust with its parent domain.
A parent-child
B two-way transitive
C cross-forest
D simple
30. If the domains within a forest are separated by slow WAN links and the tree-walking process takes an
exceedingly long time to allow user authentication across domains, you can configure a __________
trust.
A two-way transitive
B cross-forest
C shortcut
D parent-child
31. What command can you use to run the Active Directory Installation Wizard?
A adpromo
B dcpromo
C domainpromo
D adcreate
Steve Todd Page 6 of 9
32. What shared folder exists on all domain controllers and is used to store Group Policy objects, login
scripts, and other files that are replicated domain-wide?
A SYSVOL
B AD
C C$
D VOLMGR
33. What is the minimum amount of storage space required for the Active Directory installation files?
A 100 MB
B 150 MB
C 200 MB
D 250 MB
34. What is the process of replicating DNS information from one DNS server to another?
A replication
B DNS push
C zone transfer
D DNS update
35. __________ roles work together to enable the multimaster functionality of Active Directory.
A FSMO
B FMMO
C FMSO
D FOMO
36. __________ partitions are used to separate forest-wide DNS information from domain-wide DNS
information to control the scope of replication of different types of DNS data.
A DNA record
B DNS type
C DNS data
D Application Directory
37. What processes can be used by Windows Server 2008 DNS to clean up the DNS database after DNS
records become stale or out of date?
A searching and destroying
B aging and scavenging
C seeking and removing
D finding and deleting
Steve Todd Page 7 of 9
38. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name
resolution by a variety of services?
A primary lookup
B secondary lookup
C forward lookup
D reverse lookup
39. What SRV record information serves as a mechanism to set up load balancing between multiple servers
that are advertising the same SRV records?
A priority
B time-to-live
C weight
D port
40. What new Windows Server 2008 feature is a special installation option that creates a minimal environment
for running only specific services and roles?
A Minimal Installation Option
B Server Core
C Server Standard
D Minimal Server Environment (MSE)
41. Read-Only Domain Controllers provide added security in the way passwords are stored through what
feature?
A Password Integration Policy
B Password Caching Policy
C Password Storage Policy
D Password Replication Policy
42. What feature makes it possible to configure a user as the local administrator of a specific RODC without
making the user a Domain Admins with far-reaching authority over all domain controllers in your entire
domain and full access to your Active Directory domain data?
A Role Delegation
B Admin Role Separation
C New Administrative Security Groups
D Domain Functional Levels
43. Each class or attribute that you add to the schema should have a valid __________.
A username
B password
C OID
D SID
Steve Todd Page 8 of 9
44. When modifying the schema, Microsoft recommends adding administrators to what group only for the
duration of the task?
A Schema Admins
B Enterprise Admins
C Global Admins
D Forest Admins
45. What DLL must be registered to use the Schema Management snap-in?
A schmmgnt32.dll
B schemamanagement.dll
C schmmgmt.dll
D adschm.dll
46. What role provides developers with the ability to store data for directory-enabled applications without
incurring the overhead of extending the Active Directory schema to support their applications?
A AD LSD
B AD SLD
C AD DLS
D AD LDS
47. What type of trust allows you to configure trust relationships between Windows Server 2008 Active
Directory and a UNIX MIT Kerberos realm?
A shortcut
B cross-forest
C external
D realm
48. What type of trust relationship allows you to create two-way transitive trusts between separate forests?
A shortcut
B cross-forest
C external
D real
49. What utility is used to manually create trust relationships?
A Active Directory Trust Console
B Active Directory Trust Wizard
C Active Directory Domains and Trusts MMC snap-in
D Active Directory Domains and Trusts control panel
Steve Todd Page 9 of 9
50. What command-line tool is used to create, delete, verify, and reset trust relationships from the Windows
Server 2008 command line?
A adtrust
B netdom
C csvde
D nslookup

Você também pode gostar