Académique Documents
Professionnel Documents
Culture Documents
HOME » ACTIVE DIRECTORY Questions » 50 REAL TIME ACTIVE DIRECTORY Multiple Choice
A. Operation
B. Administration
The Best Balance
C. Primary of Speed &
D. Shadow Usability. Buy
Answer:- D Now, only £3.25
per month
2. ACL stands for Access Control List
A. True
B. False
Answer:- A
3. How do you create a group by using Active Directory Users and Computers snap- in?
A. Left click the OU in which you want to create a group, select New, and choose Group.
OPEN
B. Right click the OU in which you want to create a group, select New, and choose Group.
Answer:- B
Answers
Interview Questions Answers PDF
2,451 likes
Answer:- A
5. The Dsadd command –secgrp {yes | no} specifies group type: security (yes) or distribution (no).
A. False
B. True
Answer:- B
6. What option can you use to prevent deleting a group in Windows Server 2008?
Answer:- C
A. True
B. False
Answer:- A
8. What default group has the right to log on locally, start and stop services, perform backup and restore operations,
format disks, create or delete shares, and even power down domain controllers?
A. Server Operators
B. Schema Admins
C. Enterprise Admins
D. Backup Operators
Answer:- A
A. Three
B. Zero
C. Ten
D. Five
Answer:- A
Answer:- B
11. Which is not one of the four divisions or container structures in Active Directory?
A. Forests
B. Domain
C. Webs
D. Organizational units
E. Sites
Answer:- C
A. Physical groupings independent of the domain and OU structure. Sites distinguish between locations connected
by low- and high-speed connections and are defined by one or more IP subnets.
B. The collection of every object, its attributes and attribute syntax in the Active Directory.
C. Containers in which domains can be grouped. They create a hierarchy for the domain and create the structure of
D. A collection of computers that share a common set of policies, a name and a database of their members.
Answer:- B
A. Store the database, maintain the policies and provide the authentication of domain logons.
Answer:- A
A. A set of folder rules that determine where Outlook will save email messages.
B. Affords the capability for secure extension of network operations to the Web
C. They determine the hierarchy of a domain, which can fit the operational structure of an organization.
D. A collection of settings that define what a system will look like and how it will behave for a defined group of users.
Answer:- D
15. In Windows Server 2012 and Windows 8, Group Policy Objects give administrators the ability to select new
A. True
B. False
Answer:- A
16. Active Directory Rights Management Services is designed to give complete control of all documents stored in
RMS-enabled applications.
A. True
B. False
Answer:- B
17. According to Jonathan Hassell, what is a good practice to follow with forest trusts?
Answer:- D
18. According to Gary Olsen, domain controller load can be insufficient for the following reason(s):
B. The number of authenticated clients is unpredictable because multiple DCs share the load for clients in and out of
the site.
C. Active Directory (AD) analysis and monitoring tools put additional load on the DC.
D. A and C only
E. A, B and C
Answer:- E
18. About how many settings are in a single Group Policy Object
A. 1,800
B. 3,200
C. 900
D. 5,000
Answer:- A
19. In what version of Windows did Microsoft adopt Kerberos as an authentication policy?
A. Windows NT
D. Windows 2008
Answer:- C
20. Between Sites you can also choose to use ________ for replication, but only for changes in the Schema or
Configuration.
D. E-mail
Answer:- C
21. Active Directory and a Windows-based file server are not required to implement ________ on client Windows
computers.
A. Windows Registry
B. Internet Explorer
C. Windows 2000
Answer:- D
22. Authentication across this type of trust is Kerberos based (as opposed to ________).
A. LM hash
B. NTLM
C. Samba (software)
Answer:- B
23. Unlike earlier versions of Windows which used ________ to communicate, Active Directory is fully integrated
A. NetBIOS
D. Ethernet
Answer:- A
24. Another option is to use ________ with its translucent overlay, which can extend entries in any remote LDAP
A. Mac OS X
B. Berkeley DB
D. OpenLDAP
Answer:- D
25. A different ‘cost’ can be given to each link (e.g., DS3, T1, ________ etc.) and the site link topology will be
A. OSI model
D. Physical Layer
Answer:- B
B. Active Directory
Answer:- D
27. Active Directory is a technology created by ________ that provides a variety of network services, including:
A. Microsoft
B. Internet Explorer
C. Microsoft Office
D. Microsoft Windows
Answer:- A
28. ADAM is capable of running as a service, on computers running Microsoft ________ or Windows XP
Professional.
C. Windows 2000
D. Microsoft Windows
Answer:- A
29. In ________, ADAM has been renamed AD LDS (Lightweight Directory Services).
A. Microsoft Windows
B. Windows Vista
D. Windows 2000
Answer:- C
30. To which of the following Active Directory containers can Group Policies be applied?
A. sites
B. OUs
C. domains
Answer:- D
31. To create a GPO for a domain or an organizational unit, you use either the Active Directory Users and Computers
Answer:- C
32. For each GPO, there is a GPC container stored in the System\Policies folder in the __________.
Answer:- C
33. Each GPT folder is identified by the ___________ for the GPO.
A. GPCID
B. GPTID
C. GPID
D. GUID
Answer:- D
34. Group Policy settings are divided into two categories: Computer Configuration settings and __________.
Answer:- D
35. Which of the following containers contains all Registry-based Group Policy settings, including settings for
A. Administrative Templates
B. Software Templates
C. Windows Templates
D. Logon Settings
Answer:- A
A. It can be used to link sites, search for sites, and to delegate Group Policy-related features.
C. It provides administrators with the ability to back up, restore, import, and copy/paste GPOs, as well as to create,
Answer:- C
37. Which of the following are exceptions to the order in which GPOs are processed?
A. The default order for processing Group policy settings is also affected by selecting the Enforced setting.
B. You can modify the default behavior by using the Block Inheritance option.
Answer:- D
38. when you configure loopback in ________ mode, the Computer Configuration GPO settings are appended to
A. Replace
B. Merge
C. Default
D. Append
Answer:- B
39. In order to delegate permissions for a GPO, you must have the ___________ permission for the GPO.
Answer:- B
40. The GPMC combines the functionality of the ACL Editor, Delegation Wizard, and Resultant Set of Policy tool.
A. True
B. False
Answer:- A
41. The GPT contains all of the Registry entries, as well as associated files and folders required to implement the
A. True
B. False
Answer:- A
42. Administrative settings are used to determine the applications that will be distributed to computers or users via
a GPO.
A. True
B. False
Answer:- B
43. The User Group Policy loopback processing mode is used when both the user account and the computer account
A. True
B. False
Answer:- A
44. You assign permissions to delegate administrative control over a GPO on the Delegation tab in the GPMC.
A. True
B. False
Answer:- A
ACTIVE DIRECTORY Objective type Interview Questions and Answers pdf free
download ::
← 100 REAL TIME ACCOUNTS RECEIVABLE Multiple Choice Questions and Answers
ADD COMMENT
Required fields are marked *. Your email address will not be published.
Comment
POST A QUESTION
Interview Questions and Answers pdf free download for freshers experienced MCQs Real time certification basic asked objective