A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
What protocol has become an industry standard that enables data exchange between directory services and applications?
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
What is the process of replicating DNS information from one DNS server to another?
What type of trust relationship allows you to create two-way transitive trusts between separate forests?
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
What DLL must be registered to use the Schema Management snap-in?
Replication within Active Directory will occur when which of the following conditions is met?
An object is added or removed from Active Directory.
The value of an attribute has changed.
The name of an object has changed.
What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?
Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.
Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
Domain Naming Master
What types of memberships are stored in the global catalog?
What console must be used to move the Domain Naming Master FSMO role?
Active Directory Domains and Trusts
What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?
What special identity group is used by the system to allow permission to protected system files for services to function properly?
When using CSVDE, what is the first line of the text file that uses proper attribute names?
Which of the following is not a characteristic of a strong password?
is not your birth date
What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
What process applies Group Policy settings to various containers within Active Directory?
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
What policies work with folder redirection to provide the ability to cache files locally?
offline file storage
What is the path to the default GPT structure for a domain?
What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
Public Key Policies
__________ files are used to apply service packs and hotfixes to installed software.
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
What policies are designed to identify software and control its execution?
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
Resultant Set of Policy
Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?
Group Policy Results
What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?
Security Group Filtering
What manual process defragments the Active Directory database in addition to reducing its size?
The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.
What is the command-line component of the Windows Server Backup snap-in?
Server Backup does not support the use of which type of backup media?
What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?
What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?
What are the highest-level DNS servers in the entire namespace?
root name server
In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?
What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?
Active Directory Certificate Services
What enables a user to manually create a certificate request file using the Certificates MMC snap-in?
Certificate Request Wizard
What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing?