A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
domain controller
What protocol has become an industry standard that enables data exchange between directory services and applications?
LDAP
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
SRV records
What is the process of replicating DNS information from one DNS server to another?
zone transfer
What type of trust relationship allows you to create two-way transitive trusts between separate forests?
cross-forest
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
forward lookup
What DLL must be registered to use the Schema Management snap-in?
schmmgmt.dll
Replication within Active Directory will occur when which of the following conditions is met?
An object is added or removed from Active Directory.
The value of an attribute has changed.
The name of an object has changed.
What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?
Repadmin
Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.
urgent
Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
Domain Naming Master
What types of memberships are stored in the global catalog?
universal
What console must be used to move the Domain Naming Master FSMO role?
Active Directory Domains and Trusts
What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?
CSVDE
What special identity group is used by the system to allow permission to protected system files for services to function properly?
Service
When using CSVDE, what is the first line of the text file that uses proper attribute names?
header record
Which of the following is not a characteristic of a strong password?
is not your birth date
What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
PKI
What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
X
What process applies Group Policy settings to various containers within Active Directory?
linking
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
Default Domain
What policies work with folder redirection to provide the ability to cache files locally?
offline file storage
What is the path to the default GPT structure for a domain?
%systemroot%\sysvol\sysvol\domain.com\Policies
What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
Audit Policy
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
Folder Redirection
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
Public Key Policies
__________ files are used to apply service packs and hotfixes to installed software.
Patch
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
hash rule
certificate rule
Path rule
What policies are designed to identify software and control its execution?
Software Restriction
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
Resultant Set of Policy
Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?
Group Policy Results
What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?
Security Group Filtering
What manual process defragments the Active Directory database in addition to reducing its size?
offline defragmentation
The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.
Object
What is the command-line component of the Windows Server Backup snap-in?
wbadmin
Server Backup does not support the use of which type of backup media?
magnetic tape
What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?
DNS
What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?
primary zone
What are the highest-level DNS servers in the entire namespace?
root name server
In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?
account organizations
What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?
Active Directory Certificate Services
What enables a user to manually create a certificate request file using the Certificates MMC snap-in?
Certificate Request Wizard
What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing?
enrollment agents