Vous êtes sur la page 1sur 1

HOME INTERVIEW QUESTIONS GD TOPICS ABOUT US Contact US Privacy Policy TERMS & C Enter search keywords here …

HOME » ACTIVE DIRECTORY Questions » 50 REAL TIME ACTIVE DIRECTORY Multiple Choice

Questions and Answers

50 REAL TIME ACTIVE DIRECTORY Multiple Choice


Questions and Answers

ESET NOD32® for Windows


OPEN
ESET
Join 100,000,000 Loyal Users. Buy Now or Get 30 Day Free Trial
eset.com/uk/home/antivirus/ NOD32®
for
ACTIVE DIRECTORY Multiple Choice Questions and Windows
Answers :-
1. A ——————group is a group that contains the same users as an OU. (Fill in the blank) eset.com

A. Operation

B. Administration
The Best Balance
C. Primary of Speed &
D. Shadow Usability. Buy
Answer:- D Now, only £3.25
per month
2. ACL stands for Access Control List

A. True

B. False

Answer:- A

3. How do you create a group by using Active Directory Users and Computers snap- in?

A. Left click the OU in which you want to create a group, select New, and choose Group.
OPEN
B. Right click the OU in which you want to create a group, select New, and choose Group.

C. This can only be done in the registry editor.

D. You can create a group by typing MSCONFIG in the Run box.

Answer:- B

ACTIVE DIRECTORY Multiple Choice Questions and

Answers
Interview Questions Answers PDF
2,451 likes

4. LDIFDE is a defragment tool in all versions of Windows Server.

A. False Like Page Send Message

B. True Be the first of your friends to like this

Answer:- A

5. The Dsadd command –secgrp {yes | no} specifies group type: security (yes) or distribution (no).

A. False

B. True

Answer:- B

6. What option can you use to prevent deleting a group in Windows Server 2008?

A. You could prevent this by formatting the hard drive.

B. You can prevent deleting a group by restarting the computer.

C. Protect object from accidental deletion.

D. Use /noreboot to prevent deleting a group.

Answer:- C

7. There are two types of groups in Active Directory.

A. True

B. False

Answer:- A

8. What default group has the right to log on locally, start and stop services, perform backup and restore operations,

format disks, create or delete shares, and even power down domain controllers?

A. Server Operators

B. Schema Admins

C. Enterprise Admins

D. Backup Operators

Answer:- A

9. How many group scopes are there in Active Directory?

A. Three

B. Zero

C. Ten

D. Five

Answer:- A

10. What is the basic syntax for Dsrm?

A. dsrm ObjectND.,,(subtree-(+exclude)) (+yesprompt) (*c)

B. dsrn ObjectDN. noprompt – c

C. dsrm ObjectDN…[-subtree [-exclude]] [-noprompt] [-c]

D. dsrm ObjectN…. [-subtree [-exclude]] [noprompt] [c-]

Answer:- B

11. Which is not one of the four divisions or container structures in Active Directory?

A. Forests

B. Domain

C. Webs

D. Organizational units

E. Sites

Answer:- C

12. What is a forest?

A. Physical groupings independent of the domain and OU structure. Sites distinguish between locations connected

by low- and high-speed connections and are defined by one or more IP subnets.

B. The collection of every object, its attributes and attribute syntax in the Active Directory.

C. Containers in which domains can be grouped. They create a hierarchy for the domain and create the structure of

the Active Directory’s company in geographical or organizational terms.

D. A collection of computers that share a common set of policies, a name and a database of their members.

Answer:- B

13. What do domain controllers do?

A. Store the database, maintain the policies and provide the authentication of domain logons.

B. Control granular settings in a domain environment.

C. Receive and relay domain commands

Answer:- A

14. What are Group Policy Objects?

A. A set of folder rules that determine where Outlook will save email messages.

B. Affords the capability for secure extension of network operations to the Web

C. They determine the hierarchy of a domain, which can fit the operational structure of an organization.

D. A collection of settings that define what a system will look like and how it will behave for a defined group of users.

Answer:- D

15. In Windows Server 2012 and Windows 8, Group Policy Objects give administrators the ability to select new

Internet Explorer policies.

A. True

B. False

Answer:- A

16. Active Directory Rights Management Services is designed to give complete control of all documents stored in

RMS-enabled applications.

A. True

B. False

Answer:- B

17. According to Jonathan Hassell, what is a good practice to follow with forest trusts?

A. Use shortcut trusts

B. Keep a current list of all trust relationships in the forest

C. Back up and ensure you have restore capability

D. All of the above

Answer:- D

18. According to Gary Olsen, domain controller load can be insufficient for the following reason(s):

A. Inefficient LDAP queries can put an unpredictable load on the DC.

B. The number of authenticated clients is unpredictable because multiple DCs share the load for clients in and out of

the site.

C. Active Directory (AD) analysis and monitoring tools put additional load on the DC.

D. A and C only

E. A, B and C

Answer:- E

18. About how many settings are in a single Group Policy Object

A. 1,800

B. 3,200

C. 900

D. 5,000

Answer:- A

19. In what version of Windows did Microsoft adopt Kerberos as an authentication policy?

A. Windows NT

B. Windows Server 2003 R2

C. Windows Server 2000

D. Windows 2008

Answer:- C

20. Between Sites you can also choose to use ________ for replication, but only for changes in the Schema or

Configuration.

A. Internet Message Access Protocol

B. Post Office Protocol

C. Simple Mail Transfer Protocol

D. E-mail

Answer:- C

21. Active Directory and a Windows-based file server are not required to implement ________ on client Windows

computers.

A. Windows Registry

B. Internet Explorer

C. Windows 2000

D. Roaming user profile

Answer:- D

22. Authentication across this type of trust is Kerberos based (as opposed to ________).

A. LM hash

B. NTLM

C. Samba (software)

D. Integrated Windows Authentication

Answer:- B

23. Unlike earlier versions of Windows which used ________ to communicate, Active Directory is fully integrated

with DNS and TCP/IP—indeed DNS is required.

A. NetBIOS

B. NetBIOS Frames protocol

C. Server Message Block

D. Ethernet

Answer:- A

24. Another option is to use ________ with its translucent overlay, which can extend entries in any remote LDAP

server with additional attributes stored in a local database.

A. Mac OS X

B. Berkeley DB

C. Berkeley Software Distribution

D. OpenLDAP

Answer:- D

25. A different ‘cost’ can be given to each link (e.g., DS3, T1, ________ etc.) and the site link topology will be

altered accordingly by the KCC.

A. OSI model

B. Integrated Services Digital Network

C. Universal Serial Bus

D. Physical Layer

Answer:- B

26. AGDLP (implementing ________ using nested groups)

A. Mandatory access control

B. Active Directory

C. Microsoft SQL Server

D. Role-based access control

Answer:- D

27. Active Directory is a technology created by ________ that provides a variety of network services, including:

A. Microsoft

B. Internet Explorer

C. Microsoft Office

D. Microsoft Windows

Answer:- A

28. ADAM is capable of running as a service, on computers running Microsoft ________ or Windows XP

Professional.

A. Windows Server 2003

B. Windows Server 2008

C. Windows 2000

D. Microsoft Windows

Answer:- A

29. In ________, ADAM has been renamed AD LDS (Lightweight Directory Services).

A. Microsoft Windows

B. Windows Vista

C. Windows Server 2008

D. Windows 2000

Answer:- C

30. To which of the following Active Directory containers can Group Policies be applied?

A. sites

B. OUs

C. domains

D. all of the above

Answer:- D

31. To create a GPO for a domain or an organizational unit, you use either the Active Directory Users and Computers

console or the __________.

A. Group Policy Maintenance console

B. Domain Policy Management console

C. Group Policy Management Console

D. Active Directory Sites and Services console

Answer:- C

32. For each GPO, there is a GPC container stored in the System\Policies folder in the __________.

A. Active Directory Domains and Trusts console

B. Active Directory GPO and Sites console

C. Active Directory Users and Computers console

D. Active Directory Group Policy console

Answer:- C

33. Each GPT folder is identified by the ___________ for the GPO.

A. GPCID

B. GPTID

C. GPID

D. GUID

Answer:- D

34. Group Policy settings are divided into two categories: Computer Configuration settings and __________.

A. Policy Configuration settings

B. Organizational Configuration settings

C. Group Configuration settings

D. User Configuration settings

Answer:- D

35. Which of the following containers contains all Registry-based Group Policy settings, including settings for

Windows Components, System, and Network?

A. Administrative Templates

B. Software Templates

C. Windows Templates

D. Logon Settings

Answer:- A

36. Which of the following is a function of the GPMC?

A. It can be used to link sites, search for sites, and to delegate Group Policy-related features.

B. It can be used to sign and encrypt all LDAP communications.

C. It provides administrators with the ability to back up, restore, import, and copy/paste GPOs, as well as to create,

delete, and rename them.

D. It can be used to view all Group Policy management functions.

Answer:- C

37. Which of the following are exceptions to the order in which GPOs are processed?

A. The default order for processing Group policy settings is also affected by selecting the Enforced setting.

B. You can modify the default behavior by using the Block Inheritance option.

C. If a computer belongs to a workgroup, it processes only local GPOs.

D. all of the above

Answer:- D

38. when you configure loopback in ________ mode, the Computer Configuration GPO settings are appended to

the default list of GPOs.

A. Replace

B. Merge

C. Default

D. Append

Answer:- B

39. In order to delegate permissions for a GPO, you must have the ___________ permission for the GPO.

A. Edit user, context, menu

B. Edit settings, delete, and modify security

C. Edit group, delete, modify user

D. none of the above

Answer:- B

40. The GPMC combines the functionality of the ACL Editor, Delegation Wizard, and Resultant Set of Policy tool.

A. True

B. False

Answer:- A

41. The GPT contains all of the Registry entries, as well as associated files and folders required to implement the

various GPO functions.

A. True

B. False

Answer:- A

42. Administrative settings are used to determine the applications that will be distributed to computers or users via

a GPO.

A. True

B. False

Answer:- B

43. The User Group Policy loopback processing mode is used when both the user account and the computer account

are members of a Windows 2000 or later domain.

A. True

B. False

Answer:- A

44. You assign permissions to delegate administrative control over a GPO on the Delegation tab in the GPMC.

A. True

B. False

Answer:- A

ACTIVE DIRECTORY Objective type Interview Questions and Answers pdf free
download ::

May 14, 2016 iqapdf  ACTIVE DIRECTORY Questions  Leave a Comment

← 100 REAL TIME ACCOUNTS RECEIVABLE Multiple Choice Questions and Answers

70 REAL TIME ADO.NET Multiple Choice Questions and Answers →

ADD COMMENT

Required fields are marked *. Your email address will not be published.

Comment

Name * E-mail Address * Website

  

POST A QUESTION

Interview Questions and Answers pdf free download for freshers experienced MCQs Real time certification basic asked objective

programming on IT & NON-IT Placement Papers FAQs

This site is protected by wp-copyrightpro.com

Vous aimerez peut-être aussi