What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications?
directory service
A __________ is defined as one or more IP subnets that are connected by fast links.
site
What contains the rules and definitions that are used for creating and modifying object classes and attributes within Active Directory?
Schema NC
What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide?
SYSVOL
What new Windows Server 2008 feature is a special installation option that creates a minimal environment for running only specific services and roles?
Server Core
What is the minimum amount of storage space required for the Active Directory installation files?
200 MB
When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?
Schema Admins
When you install the forest root domain controller in an Active Directory forest, the Active Directory Installation Wizard creates a single site named __________.
Default-First-Site-Name
What command-line tool used for monitoring Active Directory provides functionality that includes performing connectivity and replication tests?
dcdiag
When replicating information between sites, Active Directory will designate a __________ server in each site to act as a gatekeeper in managing site-to-site replication.
bridgehead
What defines a chain of site links by which domain controllers from different sites can communicate?
site link bridge
How many FSMO roles does Active Directory support?
5
How many RID Masters can a domain have?
1
What procedure is used only when you have experienced a catastrophic failure of a domain controller that holds a FSMO role and you need to recover that role?
role seizure
What special identity group contains all authenticated users and domain guests?
Everyone
__________ name refers to each user’s login name.
SAM account
You cannot manually modify the group membership of or view the membership lists of __________ groups.
special identity
What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?
LDIFDE
Which of the following is a benefit of implementing a public key infrastructure (PKI)?
1) . Users no longer need to remember passwords.
2) . All information is stored on the smart card, making it difficult for anyone except the intended user to use or access it.
3) . Smart cards can be used from remote locations, such as a home office, to provide authentication services.
What method of authentication requires a smart card and a PIN to provide more secure access to company resources?
two-factor authentication
What dedicated workstation allows an administrator or another authorized user to preconfigure certificates and smart cards on behalf of a user or workstation?
smart card enrollment station
Passwords for Windows Server 2008, Windows Vista, Windows Server 2003, and Microsoft Windows XP clients can be __________ characters in length.
127
What is a method of controlling settings across your network?
Group Policy
What contains all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU?
Group Policy Objects
What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?
Loopback Processing
Local GPO settings are stored in what folder on a computer?
%systemroot%/System32/GroupPolicy
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?
Fine-Grained Password Policies
Where can you configure the Group Policy refresh interval?
Computer Configuration\Administrative Templates\System\Group Policy
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
.msi
Modifications to .msi files require transform files, which have the __________ extension.
.mst
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Basic User
What tab displays groups and users with permission to link, perform modeling analyses, or read Group Policy Results information?
Delegation
What setting will prevent policy settings from applying to all child objects at the current level and all subordinate levels?
Block Policy Inheritance
How many WMI filters can be configured per GPO?
one (1)
To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
Directory Services Restore
In Windows Server 2008, you must back up __________ rather than only backing up the System State data.
critical volumes
To back up Active Directory, you must install what feature from the Server Manager console?
Windows Server Backup
What is the process by which one DNS server sends a name resolution request to another DNS server?
referral
What DNS server contains no zones and hosts no domains?
caching-only server
What Windows Server 2008 service can you use to protect sensitive data on a Windows network?
AD RMS
What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization?
Identity Lifecycle Management
What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob?
smart cards
What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status?
Online Responder