Final Review Questions

Description

FINAL NTEN 127 Quiz on Final Review Questions, created by j.salvino on 13/04/2016.
j.salvino
Quiz by j.salvino, updated more than 1 year ago
j.salvino
Created by j.salvino about 8 years ago
28
0

Resource summary

Question 1

Question
The domain name part of a DNS name is _______ and consists of two or more words, separated by ______.
Answer
  • peer-based; periods
  • hierarchical; commas
  • unranked; commas
  • hierarchical; periods

Question 2

Question
What are the servers at the top of the DNS hierarchy called?
Answer
  • Down-level servers
  • Authoritative sources
  • Root servers
  • Forwarders

Question 3

Question
A __________ is any machine issuing queries to a DNS server
Answer
  • DNS server
  • DNS client
  • DNS resolver
  • HOSTS file

Question 4

Question
You need to have your DNS database automatically update its records. What do you need to configure?
Answer
  • DNS Auto updates
  • DNS database update
  • Dynamic DNS
  • secure only

Question 5

Question
What do you call the source responsible for maintaining a domain’s resource records?
Answer
  • Authoritative source
  • Root server
  • Down-level server
  • Authenticate source

Question 6

Question
The typical query one DNS server sends to a root name server is called a(n) _______.
Answer
  • forwarded query
  • referral
  • recursive query
  • iterative query

Question 7

Question
What is the primary benefit of a DNS forwarder?
Answer
  • Making the most of iterative queries to other DNS servers
  • Exchanging iterative queries for recursive queries across the network perimeter
  • Reducing the burden on the Internet’s root name servers
  • Reducing the traffic and making efficient use of available bandwidth across the network perimeter

Question 8

Question
What is the primary purpose of name caching?
Answer
  • Name caching greatly reduces traffic on the company network
  • Name caching enables the second name resolution request for the same name to bypass the referral process.
  • Name caching saves an extraordinary amount of time for the user
  • Name caching validates why you should deploy caching-only servers.

Question 9

Question
What is the first packet sent to a DHCP server when a computer boots up?
Answer
  • DHCPINFORM
  • DHCPDISCOVER
  • DHCPOFFER
  • DHCPACK

Question 10

Question
How do DHCP servers respond to a DHCPDISCOVER message?
Answer
  • DHCPINFORM
  • DHCPRELEASE
  • DHCPACK
  • DHCPOFFER

Question 11

Question
How does a DHCP client communicate which offered IP address it will accept from which DHCP server?
Answer
  • The client sends a DHCPREQUEST message to the server
  • The client sends a DHCPREQUEST message to all servers the IP address of the chosen DHCP server.
  • The client sends a DHCPACK message to all servers with the IP address of the chosen DHCP server
  • The client selects the closest server and beeps audibly to accept the offer.

Question 12

Question
The following is the process in which IP addresses are handed out to clients through DHCP: Discover Offer Request Assign
Answer
  • True
  • False

Question 13

Question
During DHCP lease negotiation, what happens if the client requests an IP address from the server but the server has already assigned the offered IP address?
Answer
  • The server responds with a DHCPACK message to the client
  • The server responds with a DHCPNAK message to the client.
  • The server responds with a DHCPSOS message to the client
  • The server ignores the client until the lease negotiation expires and process restarts

Question 14

Question
What is the default lease period for DHCP dynamic address allocation?
Answer
  • 96 hours
  • 8 days
  • 4.5 days
  • 3.5 days

Question 15

Question
How far into the lease period does a DHCP client begin requesting renewal of the IP address?
Answer
  • 50 percent, or about 2 days into the lease
  • 75 percent, or about 2 days into the lease
  • 50 percent, or at 4 days into the lease
  • 87.5 percent, or about 7 days into the lease

Question 16

Question
You want to use DHCP to reserve a range of address that should not be automatically assigned.
Answer
  • Restrictions
  • Strings
  • Reservations
  • Exclusions

Question 17

Question
The ability to enable the DHCP server to provide addresses from more than one scope to clients on the same physical subnet is called:
Answer
  • Subscope
  • Superscope
  • Scope
  • Multiscope

Question 18

Question
If no DHCP server is available on the client’s network, you can use a _____________ to forward DHCP broadcasts from the client’s network to the DHCP server.
Answer
  • DHCP IP Helper
  • DHCP Relay Agent
  • DNS
  • Hosts File

Question 19

Question
Which of the following are advantages to using NTFS file system?
Answer
  • Compression
  • Encryption
  • Quotas
  • Security

Question 20

Question
Which of the following protocols or services are required by Active Directory?
Answer
  • DHCP
  • TCP/IP
  • ASDN
  • DNS
  • BLNA
  • NetBEUI

Question 21

Question
Which of the following statements would allow for faster backups?
Answer
  • Full backups are performed
  • Windows keeps a shadow copy of the source volume
  • Each volume is backed up separately
  • Incremental backups are performed

Question 22

Question
What functionality allows you to recover deleted Active Directory objects without the need of using a backup?
Answer
  • Active Directory Recycle Bin
  • Active Directory Authoritative Restore
  • Active Directory Non-Authoritative Restore
  • Active Directory Secure Restore

Question 23

Question
How many of the statements regarding AD are true?
Answer
  • After making changes to AD the server must be rebooted.
  • In order to defrag the AD database, you need to stop the AD service
  • After making changes to an AD domain controller you must force other controllers to be updated
  • When compacting an AD database, it will create an additional compacted copy of the current database

Question 24

Question
What Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrators to recover accidentally deleted or overwritten files as well as compare different versions of the same file?
Answer
  • Version Management Copies
  • Shadow Copy Version Control
  • Shadow Copies for Shared Volumes
  • Version Control Shadow Copy Provider

Question 25

Question
Within a domain, the primary hierarchical building block is the _________.
Answer
  • forest
  • organizational unit
  • group
  • user

Question 26

Question
What is a key difference between a domain tree hierarchy and the organizational unit (OU) hierarchy within a domain?
Answer
  • Ability to apply Group Policy
  • Members allowed within
  • Membership
  • Inheritance

Question 27

Question
What is the only OU created by default after installing Active Directory?
Answer
  • Users OU
  • Domain Controllers OU
  • Global OU
  • Computers OU

Question 28

Question
Resource access for individuals takes place through their ______.
Answer
  • computer accounts
  • user accounts
  • authentication
  • shared folders

Question 29

Question
What is the SAM account name and the User Principal Name for the account ella@contoso.com?
Answer
  • SAM account name is ella@contoso.com, and the User Principal Name is ella
  • SAM account name is ella, and the User Principal Name is ella@contoso.com
  • Both the SAM account name and the User Principal Name are: ella@contoso.com
  • Both the SAM account name and the User Principal Name are: ella

Question 30

Question
What are the two built-in user accounts are created on a computer running Windows Server 2012?
Answer
  • system and guest
  • default and guest
  • domain administrator and local administrator
  • administrator and guest

Question 31

Question
When would administrators choose to use a User Template?
Answer
  • When an administrator wants to save time while creating single users with many attributes
  • When an administrator wants to save task steps while delegating user creation to other users
  • When an administrator wants to ensure quality assurance in creating new objects
  • When an administrator is accustomed to using User Templates

Question 32

Question
Can a domain user, who does not possess explicit object creation permissions, create computer objects?
Answer
  • . No, not without the object creation permission
  • Yes, an authenticated user can create a server object, after authenticating to a different domain server
  • Can create workstation and server objects
  • Yes, authenticated users can create workstation, but not server objects

Question 33

Question
Which of the following is NOT a group scope?
Answer
  • Security groups
  • Universal groups
  • Global groups
  • Domain local groups

Question 34

Question
The three types of Group Policy Objects (GPOs) include local, domain and _____.
Answer
  • OU
  • universal
  • starter
  • nonlocal

Question 35

Question
Where is the path to the default GPT structure for a domain?
Answer
  • %systemroot%\SYSVOL\sysvol\<domain name>\Policies\
  • %systemroot%\SYSVOL\sysvol\<domain name>\Policies\{GUID}
  • %systemroot%\SYSVOL\sysvol\<domain name>\Policies
  • %systemroot%\SYSVOL\sysvol\<domain name>

Question 36

Question
Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?
Answer
  • Software settings, Windows settings, and Delegation Templates
  • Software settings, Windows settings, and Administrative Templates
  • Security settings, Windows settings, and Delegation Templates
  • Security settings, Windows settings, and Administrative Templates

Question 37

Question
Configuring a Central Store of ADMX files help solve the problem of ________
Answer
  • Excessive REQ_QWORD registry entries on every workstation
  • Replication time for copying policies
  • Windows 7 workstations not able to receive policies
  • SYSVOL bloat

Question 38

Question
You want to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this?
Answer
  • The Enforce option
  • The Block Policy Inheritance option
  • The Disable option
  • The Deny permission

Question 39

Question
You want to ensure that a certain GPO that is applied at the domain level is not overridden at lower levels. Which option can they use to do this?
Answer
  • The Enforce option
  • The Block Policy Inheritance option
  • The Disable option
  • The Deny permission

Question 40

Question
Which of the following levels can CPOs be applied?
Answer
  • Sites
  • Groups
  • OUs
  • Domains

Question 41

Question
What is the Microsoft Management Console (MMC) snap-in that you use to create GPOs and manage their deployment to AD DS objects?
Answer
  • Group Policy Management console
  • Active Directory Administrative Center
  • Server Manager
  • Disk Management

Question 42

Question
What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?
Answer
  • Inheritance
  • Special identity linking
  • Permission granting
  • Security filtering

Question 43

Question
In order to be accessible to other domain controllers, logon/logoff and startup/shutdown scripts should be placed in the SYSVOL share
Answer
  • True
  • False
Show full summary Hide full summary

Similar

70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 2
Mike M
70-410 - MCSA: Windows Server 2012 - Installing and Configuring - Exam 3
Mike M
NTEN 127 - LAN Management Review Questions
j.salvino
Exam 70-410: Installing and Configuring Windows Server 2012 R2
Mike M
OCR gcse computer science
Jodie Awthinre
Networks
B Ilo
IT - The Online World
Summir
Microsoft Exam 70-410: Volume1- Test 1
Alex Quito
The Internet
Gee_0599
WANs and LANs
Josh Watkins
Microsoft Exam 70-410: - Volume 2 - Test 2
Alex Quito