The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.
peer-based; periods
hierarchical; commas
unranked; commas
hierarchical; periods
What are the servers at the top of the DNS hierarchy called?
Down-level servers
Authoritative sources
Root servers
Forwarders
A __________ is any machine issuing queries to a DNS server
DNS server
DNS client
DNS resolver
HOSTS file
You need to have your DNS database automatically update its records. What do you need to configure?
DNS Auto updates
DNS database update
Dynamic DNS
secure only
What do you call the source responsible for maintaining a domain’s resource records?
Authoritative source
Root server
Down-level server
Authenticate source
The typical query one DNS server sends to a root name server is called a(n) _______.
forwarded query
referral
recursive query
iterative query
What is the primary benefit of a DNS forwarder?
Making the most of iterative queries to other DNS servers
Exchanging iterative queries for recursive queries across the network perimeter
Reducing the burden on the Internet’s root name servers
Reducing the traffic and making efficient use of available bandwidth across the network perimeter
What is the primary purpose of name caching?
Name caching greatly reduces traffic on the company network
Name caching enables the second name resolution request for the same name to bypass the referral process.
Name caching saves an extraordinary amount of time for the user
Name caching validates why you should deploy caching-only servers.
What is the first packet sent to a DHCP server when a computer boots up?
DHCPINFORM
DHCPDISCOVER
DHCPOFFER
DHCPACK
How do DHCP servers respond to a DHCPDISCOVER message?
DHCPRELEASE
How does a DHCP client communicate which offered IP address it will accept from which DHCP server?
The client sends a DHCPREQUEST message to the server
The client sends a DHCPREQUEST message to all servers the IP address of the chosen DHCP server.
The client sends a DHCPACK message to all servers with the IP address of the chosen DHCP server
The client selects the closest server and beeps audibly to accept the offer.
The following is the process in which IP addresses are handed out to clients through DHCP: Discover Offer Request Assign
During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address?
The server responds with a DHCPACK message to the client
The server responds with a DHCPNAK message to the client.
The server responds with a DHCPSOS message to the client
The server ignores the client until the lease negotiation expires and process restarts
What is the default lease period for DHCP dynamic address allocation?
96 hours
8 days
4.5 days
3.5 days
How far into the lease period does a DHCP client begin requesting renewal of the IP address?
50 percent, or about 2 days into the lease
75 percent, or about 2 days into the lease
50 percent, or at 4 days into the lease
87.5 percent, or about 7 days into the lease
You want to use DHCP to reserve a range of address that should not be automatically assigned.
Restrictions
Strings
Reservations
Exclusions
The ability to enable the DHCP server to provide addresses from more than one scope to clients on the same physical subnet is called:
Subscope
Superscope
Scope
Multiscope
If no DHCP server is available on the client’s network, you can use a _____________ to forward DHCP broadcasts from the client’s network to the DHCP server.
DHCP IP Helper
DHCP Relay Agent
DNS
Hosts File
Which of the following are advantages to using NTFS file system?
Compression
Encryption
Quotas
Security
Which of the following protocols or services are required by Active Directory?
DHCP
TCP/IP
ASDN
BLNA
NetBEUI
Which of the following statements would allow for faster backups?
Full backups are performed
Windows keeps a shadow copy of the source volume
Each volume is backed up separately
Incremental backups are performed
What functionality allows you to recover deleted Active Directory objects without the need of using a backup?
Active Directory Recycle Bin
Active Directory Authoritative Restore
Active Directory Non-Authoritative Restore
Active Directory Secure Restore
How many of the statements regarding AD are true?
After making changes to AD the server must be rebooted.
In order to defrag the AD database, you need to stop the AD service
After making changes to an AD domain controller you must force other controllers to be updated
When compacting an AD database, it will create an additional compacted copy of the current database
What Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrators to recover accidentally deleted or overwritten files as well as compare different versions of the same file?
Version Management Copies
Shadow Copy Version Control
Shadow Copies for Shared Volumes
Version Control Shadow Copy Provider
Within a domain, the primary hierarchical building block is the _________.
forest
organizational unit
group
user
What is a key difference between a domain tree hierarchy and the organizational unit (OU) hierarchy within a domain?
Ability to apply Group Policy
Members allowed within
Membership
Inheritance
What is the only OU created by default after installing Active Directory?
Users OU
Domain Controllers OU
Global OU
Computers OU
Resource access for individuals takes place through their ______.
computer accounts
user accounts
authentication
shared folders
What is the SAM account name and the User Principal Name for the account ella@contoso.com?
SAM account name is ella@contoso.com, and the User Principal Name is ella
SAM account name is ella, and the User Principal Name is ella@contoso.com
Both the SAM account name and the User Principal Name are: ella@contoso.com
Both the SAM account name and the User Principal Name are: ella
What are the two built-in user accounts are created on a computer running Windows Server 2012?
system and guest
default and guest
domain administrator and local administrator
administrator and guest
When would administrators choose to use a User Template?
When an administrator wants to save time while creating single users with many attributes
When an administrator wants to save task steps while delegating user creation to other users
When an administrator wants to ensure quality assurance in creating new objects
When an administrator is accustomed to using User Templates
Can a domain user, who does not possess explicit object creation permissions, create computer objects?
. No, not without the object creation permission
Yes, an authenticated user can create a server object, after authenticating to a different domain server
Can create workstation and server objects
Yes, authenticated users can create workstation, but not server objects
Which of the following is NOT a group scope?
Security groups
Universal groups
Global groups
Domain local groups
The three types of Group Policy Objects (GPOs) include local, domain and _____.
OU
universal
starter
nonlocal
Where is the path to the default GPT structure for a domain?
%systemroot%\SYSVOL\sysvol\<domain name>\Policies\
%systemroot%\SYSVOL\sysvol\<domain name>\Policies\{GUID}
%systemroot%\SYSVOL\sysvol\<domain name>\Policies
%systemroot%\SYSVOL\sysvol\<domain name>
Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?
Software settings, Windows settings, and Delegation Templates
Software settings, Windows settings, and Administrative Templates
Security settings, Windows settings, and Delegation Templates
Security settings, Windows settings, and Administrative Templates
Configuring a Central Store of ADMX files help solve the problem of ________
Excessive REQ_QWORD registry entries on every workstation
Replication time for copying policies
Windows 7 workstations not able to receive policies
SYSVOL bloat
You want to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this?
The Enforce option
The Block Policy Inheritance option
The Disable option
The Deny permission
You want to ensure that a certain GPO that is applied at the domain level is not overridden at lower levels. Which option can they use to do this?
Which of the following levels can CPOs be applied?
Sites
Groups
OUs
Domains
What is the Microsoft Management Console (MMC) snap-in that you use to create GPOs and manage their deployment to AD DS objects?
Group Policy Management console
Active Directory Administrative Center
Server Manager
Disk Management
What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?
Special identity linking
Permission granting
Security filtering
In order to be accessible to other domain controllers, logon/logoff and startup/shutdown scripts should be placed in the SYSVOL share