SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
1
ASSIGNMENTS
Windows 2008 server Part I
1. 	 What are some of the new tools and features provided by Windows Server 2008?
	 Ans:- Windows Server 2008 now provides a desktop environment similar to Microsoft Windows
Vista and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive
encryption feature. Windows Server 2008 also provides the new IIS7 web server and the Windows
Deployment Service.
2. 	 What are the different editions of Windows Server 2008?
	 Ans:- The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition
provides a platform for large enterprisewide networks. The Datacenter Edition provides support for
unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a scaled-
down version of Windows Server 2008 intended for use as a dedicated web server. The Standard,
Enterprise, and Datacenter Editions can be purchased with or without the Hyper-V virtualization
technology.
3. 	 When a child domain is created in the domain tree, what type of trust relationship exists
between the new child domain and the trees root domain?
	 Ans:- Child domains and the root domain of a tree are assigned transitive trusts. This means that the
root domain and child domain trust each other and allow resources in any domain in the tree to be
accessed by users in any domain in the tree.
4.	 What is the primary function of domain controllers?
	 Ans:- The primary function of domain controllers is to validate users to the network. However, domain
controllers also provide the catalog of Active Directory objects to users on the network.
5. 	 What are two command-line utilities that can be used to check TCP/IP configurations and IP
connectivity, respectively?
	 Ans:- The ipconfig command can be used to check a computer’s IP configuration and also renew
the client’s IP address if it is provided by a DHCP server. ping can be used to check the connection
between the local computer and any computer on the network, using the destination computer’s IP
address.
6. 	 What term is used to refer to the first domain created in a new Active Directory tree?
	 Ans:- The first domain created in a tree is referred to as the root domain. Child domains created in
the tree share the same namespace as the root domain.
7. 	 What type of Active Directory objects can be contained in a group?
	 Ans:- A group can contain users, computers, contacts, and other nested groups.
8. 	 What types of Active Directory objects can be contained in an Organizational Unit?
	 Ans:- Organizational Units can hold users, groups, computers, contacts, and other OUs. The
Organizational Unit provides you with a container directly below the domain level that enables you
to refine the logical hierarchy of how your users and other resources are arranged in the Active
Directory.
2
9. 	 How can client computer accounts be added to the Active Directory?
	 Ans:- Client computer accounts can be added through the Active Directory Users and Computers
snap-in. You can also create client computer accounts via the client computer by joining it to the
domain via the System Properties dialog box. This requires a user account that has administrative
privileges, such as members of the Domain Administrator or Enterprise Administrator groups.
10. 	What is the purpose of deploying local DNS servers?
	 Ans:- A domain DNS server provides for the local mapping of fully qualified domain names to IP
addresses. Because the DNS is a distributed database, the local DNS servers can provide record
information to remote DNS servers to help resolve remote requests related to fully qualified domain
names on your network.
11. 	 What is LPD?
	 Ans:-It enables Printing using the line printer daemom protocol, which is used by UNIX clients.
12. 	What is printer pooling?
	Ans:- Printer pooling is used for load balancing. When an end user puts a print job in the queue, the
first available printer is the pool will take the job. 
13. 	What is HARD quota?
	 Ans:- It prevents users from saving a file after the volume or folder has reached the specified space
limit and generates notification.	
14. 	What is the use of OFFLINE file features?
	Ans:- Mobile users might need access to shared folders even when they’re disconnected from your
internal network. Offline Files makes this possible by allowing client computers to automatically
cache a copy of files on shared folders and by providing transparent access to the files when the
user is disconnected from the network.
15.	 What is Quotas?
	 Ans:- disk quotas allow Windows administrators to monitor and control the use of disk space by
users. Disk quotas can be deployed in a number of different ways.
16. 	What is the primary and extended partition?
	Ans:- Primary and extended partitions are the main disk divisions; one hard disk may contain up to
four primary partitions, or three primary partitions and one extended partition.
17.	 Which File system is supported by windows 2008 server to secure file and folder?
	 Ans:- NT file system(NTFS) and Encrypting file system (EFS).
18.	 What is use of terminal services?
	 Ans:- Terminal Services provides the ability to host multiple, simultaneous client sessions on Windows
Server 2003. Terminal Services is capable of directly hosting compatible multi-user client desktops
running on a variety of Windows-based and non Windows-based computers.
19.	 Which editions of Windows 2008 server we will get Hyper-V role?
	 Ans:- Hyper-V is available in x64-based versions of Windows Server 2008—specifically, the x64-
based versions of Windows Server 2008 Standard, Windows Server 2008 Enterprise, and Windows
Server 2008 Datacenter.
3
20.	 What is use of Hyper-V role?
	Ans:- Hyper-V Server is a dedicated stand-alone product that contains the hypervisor, Windows
Server driver model, virtualization capabilities, and supporting components such as failover clustering.
21.	 Which role service is required for the Routing in Windows server 2008?
	 Ans:- RRAS role from Network policies and access services is required for Routing.
22.	 How to configure VPN server?
	 Ans:- – Server Manager ->Adding Roles -> Next -> Select Server Roles ->Network Policy andAccess
Services ->Next ->Routing and Remote Access Services ->Remote Access Service ->Routing ->
Next ->Confirm Installation Selection ->Install ->Configure and Enable Routing and Remote Access
->Next-> Routing and Remote Access Wizard ->Custom Configuration ->Next ->VPN access ->Next
->Finish ->Start Service These are the steps to add VPN at server side.
23.	 What are the different types of VPN?
	 Ans:- 	 Private VPN
	 Internal VPN
	 External VPN
24.	 What is mean by IP routing?
	 Ans:- IP rounting is the process of determining the route i.e. communication path and sending data
from the source computer to the destination computer in a network.
25.	 What is static routing?
	 Ans:- static routing is a routing mechanism is allows you to define a static route from the sourceto
destination while transmitting data from one computer to another.
26.	 What is mean by performance monitor?
	 Ans:- performance monitor is a tool to provide real time data of either a local computer or a network
computer.
27.	 What is reliability monitor?
	 Ans:- Reliability monitor is a tool that tracks the stability of a computer. Computer can achieve the
maximum stability index if new software is not installed and system failures do not occur.
28.	 What is use of MBSA?
	 Ans:-Microsoft Baseline Security Analyzer is a Microsoft utility used to scan the server for possible
security vulnerabilities.
29.	 What is WSUS?
	 Ans:- Microsoft provides the Windows Server Update Services(WSUS) to allow the computer
automatically download the Microsoft software updates.
30.	 Why computer groups are required in WSUS?
	 Ans:- Using computer groups we can allow specify computers to install the updates and there are
two types of groups All computers and Unassigned computers.
4
Windows Server 2008 Part II
Ques.1:- What is server?
	Ans.:- Server is a computer program that manages access to a centralized resource in a network.
Ques.2:- What is Domain?
	Ans.:- Domain made up of a group of client and servers under the control of one central security
database. Within a domain, user authenticates once to a centralized server known as domain
controller.
Ques.3:- What is the use of Domain Controller?
	Ans.:- Domain controller is a server, It is control or responsible of provide to host
access of all resource like printer, files, mail within the domain from the central point.
Ques.4:- What is the use of ADDS?
	Ans.:- ADDS stands for Active Directory Domain Services it is new feature of Windows Server
2008. ADDS provides a database which store the information of directory services and manage
communication between domains and users.
Ques.5:-What are functional levels in Server 2008?
	Ans.:- Functional level determine the features of Active Directory(AD) that a you can use within
the domain basically two type of functional levels are in Server 2008 1. Domain Functional Level 2.
Forest Functional Level
Ques.6:-what is DNS?
	Ans.:- DNS stands for Domain Name System, DNS use domain name resolution mechanism which
resolve host name to IP and IP to host name.
Ques.7:-What is DNS Zone?
	Ans.:-DNS zone is an entity that stores the object information in to the various records. Windows
Server 2008 supports three types of DNS Zones.
Ques.8:-Explain different type of DNS zones?
	Ans.:- The DNS server is the primary source for information about this zone, Server 2008 supports
three type of zones. 1. Primary Zone: - It stores the master copy of zone data in a local file
or in AD DS. It stores the information in text file and this file can be edited by an administrator.
2. Secondary Zone: - A secondary zone is merely a copy of a primary zone that is hosted on
another server; it cannot be stored in AD DS.
	 3. 	Stub zone: - A stub zone is a copy of a zone that contains only those resource records necessary
to identify the authoritative Domain Name System (DNS) servers for that zone. A stub zone is used
to resolve names between separate DNS namespaces. This type of resolution may be necessary
when a corporate merger requires that the DNS servers for two separate DNS namespaces resolve
names for clients in both namespaces.
Ques.9:- How many records in DNS server?
	Ans.:-Through records DNS Server perform name resolution process. Many type of records’ in DNS
server some commonly used records are
	 	 Host A & AAAA
	 	Alias
5
	MX
	PTR
	SRV
	 SOA Etc.
Ques.10:- What is WINS server?
Ans.:-WINS stands for Windows Internet Name Service It is similar DNS, who is use for resolved computer
name (NetBIOS) to the IP address and IP to NetBIOS name locally.
Ques.11:- What is DHCP?
Ans.:-DHCP stands for Dynamic Host Configuration Protocol which is used to assign automatic IP
address to DHCP client s.
Ques.12:- What is Dora process in DHCP and how it works?
	Ans.:-DHCP provide IP addresses through DORA process, the working of DORA are following
	 1)	Client makes a UDP Broadcast to the server with a DHCP Discover, or Discover packet.
2)	DHCP offers to the client.
	 The server sends a DHCP Offer including other configuration parameters (DHCP Options) for
the client per the server configuration file 3) In response to the offer Client requests the server.
The client replies DHCP Request, uncast to the server, requesting the offered address.
4) The server sends DHCP Ack acknowledging the request which is the clients final permission
to take the address as offered. Before sending the ack the server double checks that the offered
address is still available, that the parameters match the clients request and (if so) marks the address
taken.
Ques.13:- How to configure domain controller?
	Ans.:- Clik StartRun Type dcpromo.exe command  Click the next button Click next button
againSelect Create a new domain in a new forest Type the forest root domain name (Example
jetking.com)Select the Forest Functional Level from (Windows Server 2008) Click the next
button Click the next button Click the yes button  Click the next button again Click the next
button Enter directory services restore mode Admin passwordClick next button Click next
button Then reboot the PC.
Ques.14:- How to install DNS?
	Ans.:- Click Start Administrative tool  Server ManagerRight click the Role node and select the
Add Roles options from context menuClick the next button  Select the DNS Server from Roles
list Click the next Click next button againClick next buttonOnce role installation process
finish click the close button
Ques.15:-What is child domain?
	Ans.:- In DNS hierarchy, a child domain called as sub domain which is the portion of a larger domain
name and is a subordinate domain of the root domain, A DNS hierarchy contains the root domain
which is divided in to child domain. A child domain must contain the root domain namespace for
example the root domain name is Jetking.com then the child domain name is child.Jetking.com,
Child domain is a part of root domain tree therefore its shares the same AD schema and configuration
information.
6
16.	 What is Schema?
	 Ans : It represents the logical structure of AD.
17. 	What is Global Catalog?
	 Ans : It contains data related to the objects of own domain controllers and other domain controller
with in forest.
18.	 What is Site Link Bridges?
	 Ans: Site Link Bridge is an AD object that represents a set of site links through which the domain
controllers communicate with each other.
19.	 What is use of Bridgehead Server?
	 Ans: Bridgehead Server is used to receive and replicate data between sites .
20. 	What do you mean by Intersite Replication?
	 Ans: Replication that occurs between two sites is known as intersite replication.
21. 	What is use of Active Directory Service?
	 Ans: Active Directory Service is used to store all the information required to manage the use of the
AD objects, such as users, groups and computers.
22. 	What is use of CSVDE command?
	 Ans: The CSVDE command is used to import or export information from a .csv file to the AD database
to create new objects and modify or delete existing objects.
23. 	What is use of Dsadd command?
	 Ans: The Dsadd command is used to add a single computer, contact, group, user, or an OU.
24. 	What is use of LDIFDE command?
	 Ans: The LDIFDE command is used to import and export the AD information.
25. 	What are types of Group?
	 Ans: Security & Distribution
26. 	What is VPN?
	 Ans: VPN is virtual network of computers that uses a public telecommunication infrastructure and
provides a user with secure remote access to the network resources.
27. 	What is NAP?
	 Ans: It allows network administrators to specify one or more policies that define the condition to
permit the access to the network.
28.	 Which are different VPN technologies support to Windows Vista, Windows 7 and Windows
Server 2008?
	 Ans: Point-to-Point Tunneling Protocol, Layer 2 Tunneling Protocol, Secure Socket Tunneling
Protocol.
29.	 What are types of replication?
	 Ans: Intrasite & Intersite replication.
7
30.	 What are types of Operation Masters?
	 Ans: The schema master, domain naming master, RID master, PDC emulator master, and the
infrastructure master.
31.	 What is use of Computer Account?
	 Ans: Computer Account is used to identify a computer in a domain. It also used to force domain
permissions and group policies.
32. 	What are the pre-requisites to add computers to a domain?
	 Ans: The computer object must exist & need to specify the permissions that who can join a computer
with the same name in the domain.
33. 	What are the steps on client computer to add computers to a domain?
	 Ans: Log on to the client computer as an administrator
	 Right-click the Computer option in the start menu.
	 Select Property from the context menu.
	 Change setting in the computer name, domain, and workgroup setting group.
	 Select Domain radio button
	 Provide name of domain
	 Click OK.
34. 	What is use of Windows Power Shell?
	 Ans: Windows Power Shell is a command-line shell and scripting language that helps IT professionals
to easily create new user, groups, or computer.
35. 	What is Subnet?
	 Ans: Subnet is the smallest unit of network defined with a unique Internet Protocol address range. It
also defined as a logical IP block which is connected to other IP block through network devices such
as,swithches and routers.
	 Windows 2008 server Part III
1.	 Describe & Explore Group Policy Objects?
	 Ans: Group policy objects stores information related to group policy setting, which can be used or
implemented on users or computers in the network.GPO affects the user and computers located in
sites, domains and different Organization.
2.	 What is Domain-based GPO?
	 Ans: GPO available in the AD domain are Known as domain based GPO’s.
	 Domain based GPO’s created by default,
1.	 Default Domain Policy-Policies are linked to the AD Domain. It affects all the users, computers, and
domain controllers in Domain.
2.	 Default domain Controller Policy-Policies linked to the Domain Controller OU in the Domain. Policy
setting in this policy affect the Domain controllers in the current OU only.
8
3.	 How to Configure Group Policy settings?
	 Ans:Group Policy managed with help of Group Policy Management Editor(GPME).
	 Following Nodes are used to configure Policy settings.
	 1. 	 Computer configuration
	 2.	 User Configuration.
	 Both these nodes contains Sub-Nodes,
	 A.	Policy
	 B.	Preferences
	 A.	 Policy:Software settings,Windows Settings and Administrative template settings.
	 B.	 Preference Node contains Windows and Control panel settings.
4.	 What is Group Policy Scope?
	 Ans: The process of linking GPO’s to the AD Objects, like sites, domains and other Organizational
units(OU’s) is known as scoping of group policy.
5.	 What is Authentication?
	 Ans:When a user logs on a network or standalone computer he or she has to provide user name and
password for identification.
6.	 What is Account Lockout Policy?
	 Ans:Account lockout policy locks an account in a domain when user tries to logon with incorrect user
name and password beyond the number of time specified in the lockout policy.
7.	 What is Fine-Grained Policy?
	 Ans:Administrative accounts have high privilege and authority to change object in AD .These
accounts provided additional security policies which overrides policies defined in Domain password
and account lockout policy.
8.	 What is Password Setting Objects?
	 Ans:The fine-grained policies are defined with help of separate class of objects in AD that maintain
settings for fine-grained policies. These objects are called Password Setting Objects.
	 Password setting Objects cannot be applied directly to an OU. If apply on users of an OU must be
create global security group of users of OU and then apply PSOs.
9.	 Explain RODC?
	 Ans:Read only domain Controller introduced in windows server 2008 to solve problem related to
speed, security, and integrity in an enterprise. Domain controller is Read only. It contains all attributes
of the objects in domain except sensitive attributes like password’s as example when the users in
branch office logs on in domain, RODC accepts user credentials and transfer it to domain controller
in corporate office for authentication.
9
10.	 What is Audit Policy?
	 Ans:It is a set of configuration, Network administrator to record activities and changes made due to
those activities which performed in the network.
OR
	 It provides complete information about the activities performed on the Network resources and
changes made in the attributes of network objects.
11.	 What is Windows Management Instrumentation?
	 Ans:Windows Management Instrumentation is management infrastructure Technology used to filter
GPO.
12.	 How to Implement WMI Filters?
	 Ans:WMI base queries are used to filter the computers on Basis of RAM, Processor Speed, Disk
capacity, IP Address, Operating System version and service pack level.
13.	 Which type of the software need to install on the computers in the network to create software
deployment group policy?
	 Ans:.msi file of the software need to install on computers in network to create software deployment
group policy.
14.	 Write methods of Deploying softwares
	 Ans: A.	 Published
		B.	Assigned
		C.	Advanced
15.	 What is System state data?
	 Ans:System state data comprises the components on which the windows server 2008 Operating
System (OS) for various tasks.
	 It contains
	 1.	AD
	 2.	 Boot Files
	 3.	 COM+ Class Registration database
	 4.	Registry
	 5.	 Sysvol Directory.
16.	 How to take full server Backup by using wbadmin command?
	 Ans:wbadmin Start SystemStateBackup -backuptarget:(Any free Drive.) e.g:D
17.	 How to perform Restoring in AD environment?
	 Ans:Performing DSRM(Directory Services Restore Mode) Restore data in AD Environment.
10
18.	 Which precaution need to take when restoring system state Data?
	 Ans:Need to ensure that AD services are stopped because full access to system files and AD data
store is required.
19.	 What is Offline Maintenance?
	 Ans:These are System maintenance activities that performed when users are not using services
provided by a Server.
20.	 Which type of Backup should you perform when you want to save data that has changed
since the last full backup?
	 Ans:Incremental Backup.
21. 	What is the function of the Task Manager Tool ?
	 ANS : The main function of task manager is to monitor the applications and the tasks running in
the windows operating system. It provides information to users and administrator who is using the PC
& shows the application process, CPU usage, performance, networking, users and finally services.
With the help of this task manager you can end the running program or task which is extremely
complicated to end, switch to another task, although you can open new task, you can check the
usage of CPU, it portrays the user who is using the pc at the moment and finally, you can shut down
the pc as well.
22. 	What is the function of the MMC Tool in Windows 2008 server?
	 ANS : MMC stands for Microsoft Management console , it is used to enables in creating, saving and
opening administrative tools.
23. 	What is the function of the Dcdiag Tool in Windows 2008 server?
	 ANS : Dcdiag is used to enables in analyzing the state of domain controllers in a forest or enterprise
and also assits in troubleshooting by reporting any problems.
24. 	What is the function of the Netdom Tool in Windows 2008 server?
	 ANS : Netdom is used to enables batch management of trusts, connecting computers to domains
and validating trusts and secure channels.
25. 	What is the function of the Event viewer Tool in Windows 2008 server?
	 ANS : Event viewer is used to enables in monitoring events recorded in event logs.
26. 	What is Paging file in Windows 2008 server?
	 ANS : The paging file (Pagefile.sys) is a hidden file on your computer`s hard disk. By Default Windows
Stores the paging file on the boot partition i.e. the partition that contains the operating system and its
supported files. The default paging file size is equal to 1.5 times the total RAM.
27. 	What is Memory Dump in Windows 2008 server?
	 ANS : In the situation of malfunction of Windows server 2008 the operating system dumps the
content of the system memory to the file therefore while deciding the storage requirement you should
also consider this file. The maximum size of which is amount of memory installed in the computer
plus one megabyte.
28. 	What is SAN?
	 ANS : SAN refers to the separate network that helps you to attach remote storage device to the
servers and SAN stands for storage area network.
11
29. 	What is NAS?
	 ANS : NAS refers to the data storage technology which allows you to store the data on a network
storage location and provides data accessibility to multiple client.
30. 	What is Log Files?
	 ANS : Log files refers to the Event track on the system.
31. 	How many free disk space do you require to create shadow copy?
	 ANS : 300 MB minimum and maximum size can be set to all the space that is available on the
specified volume.
32. 	What is Firewall? 	
	 ANS : A firewall helps to protect your computer from accessed by unauthorized users or malicious
program.
33. 	What are advantages of Antivirus software?
	 ANS : Checking for malicious code and any unauthorized access,
	 Blocking any suspicious network activity,
	 Implimenting backup of server at regular intervals and checking logs at regular intervals.
34. 	What is WSUS in windows 2008 server? 	
	 ANS : WSUS forms a useful Platform, where the updates are downloaded and distributed centrally.
35.	 What is Bit locker in windows 2008 server?
	 ANS : Bit locker is a feature available in Windows 2008 server which protect data on a drive that has
been stolen or that can be accessed offline by bypassing file permissions.
36. 	What is rootkit?
	 ANS : Rootkit is a software that helps a hacker to access a computer without the knowledge of
administrator.
37. 	What is Diskpart?
	 Ans :Diskpart is a command line utility which is used to create, convert and delete the partition and
volume.
38. 	What is the Ntdsutil Tool in Windows 2008 server?
	 ANS : Ntdsutil is used to enables managing AD, Single Master Operations, and removing metadata.
39. 	What is the Terminal services in Windows 2008 server?
	 ANS : Terminal services is used to enables in remote access and management of computers.
40. 	What is the Regedit in Windows 2008 server?
	 ANS : Regedit is used to enables in viewing and altering registry setting.
12
INTERVIEW QUESTIONS AND ANSWERS
1.	 What is Domain?
	 Ans: The term domain can refer either to a local subnetwork or to descriptors for sites on the Internet
e.g. www.jetking.com
2.	 What is Workgroup?
	 Ans: A workgroup is a collection of computers on a local area network (LAN) that share common
resources and responsibilities. Being a peer-to-peer (P2P) network design, each workgroup computer
may both share and access resources if configured to do so.
3.	 What is use of domain controller?
	 Ans:- The primary function of domain controllers is to validate users to the network. However, domain
controllers also provide the catalog of Active Directory objects to users on the network.
4.	 What is DNS?
	 Ans: DNS stands for Domain Name System which provides for the local mapping of fully qualified
domain names to IP addresses
5.	 What is DHCP
	 Ans: Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that enables a server
to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope)
configured for a given network.
6.	 What is DNS & why we used ?
	 Ans: DNS is simply a database that links host names, such as http://www.jetking.com, to a specific
IP address, such as 192.168.124.1. Apart from this, DNS has many more features. The key features
of host name to IP mapping are as follows:
	 •	 Mappings of addresses to names and vice versa (known as records) are stored in a database.
	 •	 The DNS database is distributed.
	 •	 A DNS database also stores additional records.
7.	 Working process of DNS
	 Ans: When a DNS client needs to look up a name used in a program, it queries DNS servers to
resolve the name. For example, the name specified could be the FQDN for a computer, such as
“mumbai.jetking.com.”, DNS queries resolve in a number of different ways. A client can sometimes
answer a query locally using cached information obtained from a previous query. The DNS server
can use its own cache of resource record information to answer a query. A DNS server can also
query or contact other DNS servers on behalf of the requesting client to fully resolve the name, then
send an answer back to the client. This process is known as recursion.
	 In addition, the client itself can attempt to contact additional DNS servers to resolve a name. When a
client does so, it uses separate and additional nonrecursive queries based on referral answers from
servers. This process is known as iteration.
	 In general, the DNS query process occurs in two parts:
•	 A name query begins at a client computer and is passed to a resolver, the DNS Client service, for
resolution.
13
•	 When the query cannot be resolved locally, DNS servers can be queried as needed to resolve the
name.
8.	 How to configure DHCP?
	 Ans: From the Network Administration group, start DHCP Manager. Under DHCP Servers, select
*Local Machine*. From the Scope menu, choose Create. Complete the scope configuration. The
DHCP server cannot be a DHCP client. It must have a static IP address, subnet mask, and default
gateway address. You also have the option of assigning an exclusion range or specific excluded
addresses as well as lease duration and a name. Choose OK when done. Choose Yes to activate
the scope.
9.	 How to configure DNS?
	 Ans: Open the DNS console. Highlight your computer name and choose Action | Configure a DNS
Server… to launch the Configure DNS Server Wizard. Click Next and choose to configure the
following: forward lookup zone, forward and reverse lookup zone, root hints only. Click Next and
then click Yes to create a forward lookup zone. Click Next and type the name of the zone you are
creating. Click Next and then click Yes to create a reverse lookup zone. Choose whether you want
an IPv4 or IPv6 Reverse Lookup Zone. Click Next and enter the information to identify the reverse
lookup zone. You can choose to create a new file or use an existing DNS file On the Dynamic Update
window, specify how DNS accepts secure, nonsecure, or no dynamic updates. If you need to apply
a DNS forwarder, you can apply it on the Forwarders window. Click Finish
10.	 What is VPN
	 Ans: VPN stands for Virtual Private Network which is a virtual network of computers that uses a public
telecommunication infrastructure and provides a user with secure remote access to the network
resources.
11.	 What is database server
	 Ans: A database program such as MySQL or Oracle which is hosted on a server that provides
database services to other computer programs or computers, is known as database server. The term
may also refer to a computer dedicated to running such a program.
12.	 In printer password is required or not
	 Ans: Yes, required
13.	 How to share a printer in network?
	 Ans: If you currently have a printer already installed on the computer right-click the printer icon and
click Properties. Click the Sharing tab and make sure the printer is shared. Or by using a dedicated
print server or a network printer.
14.	 Types of server
	 Ans: E-mail server, database server, file server, mail server, print and web server
15.	 Dial up connection, explain it
	 Ans: It is a form of Internet access that uses public switched telephone network (PSTN) using
telephone line to connect to an Internet service provider (ISP)
14
16.	 What is mail server
	 Ans: A mail server also known as a mail transfer agent or MTA, is an application that receives
incoming e-mail from local users (people within the same domain) and remote senders and forwards
outgoing e-mail for delivery. A server dedicated to running such applications is also called a mail
server.
17.	 What is login script
	 Ans: A login script is a series of instructions that a workstation follows every time a user logs on.
These instructions are held on the server in a ‘script’ file, which is a batch file that workstations can
access and run.
18.	 How can create Domain member
	 Ans: Domain members can be created through the Active Directory Users and Computers snap-in.
You can also create client computer accounts via the client computer by joining it to the domain via
the System Properties dialog box. This requires a user account that has administrative privileges,
such as members of the Domain Administrator or Enterprise Administrator groups.
19.	 What is WINS and full form of Wins
	 Ans: WINS stands for Windows Internet Naming Service, supports name resolution, converts
NetBIOS names to IP addresses for Windows networks.
20.	 How to connect PC in server / Domain
	 Ans: You can join to the domain via the System Properties dialog box. This requires a user account
that has administrative privileges, such as members of the Domain Administrator or Enterprise
Administrator groups.
21.	 What is the use of Active directory
	 Ans: It is a directory service created by Microsoft for Windows domain networks. It is used to
authenticate and authorize all users and computers in a Windows domain type network—assigning
and enforcing security policies for all computers and installing or updating software.
22.	 What is ADDS and its use
	 Ans: ADDS stands for Active Directory Domain Services are the foundation for distributed networks
built on Windows 2000 Server, Windows Server 2003 and Microsoft Windows Server 2008 operating
systems that use domain controllers. It provides secure, structured, hierarchical data storage for
objects in a network such as users, computers, printers, and services.
23.	 Win. 2008 server installation steps.
	 Ans: 1. Insert the media into the DVD drive. 2. Reboot the computer. 3. When prompted for an
installation language and other regional options, make your selection and press Next. 4. Press
Install Now to begin the installation process. 5. Enter your Product ID in the next window, and click
Next. 6. Select the version and click Next. 7. Read and accept the license terms by clicking to select
the checkbox and pressing Next. 8. if you’re installing the server on a regular IDE hard disk, click to
select the first disk, usually Disk 0, and click Next.
24.	 How to share an internet connection.
	 Ans: using ICS, NAT, proxy etc.
25.	 How to make domain controller.
	 Ans: by using dcpromo command
15
Exam Questions and Answers
1.	 Which two types of GPO’s are used in Windows Server 2008.
	 a) 	 Group Policy object & Group policy management console
	 b) 	 Local & Domain -based GPO’s.
	 c) 	 Software & Script based.
	 d) 	 WinLogon & File System based
2. 	 Full form of GUID?
	 a) 	 Group Policy Unique Identifier.
	 b) 	 Group Policy Unified Identifier.
	 c) 	 Globally Unique Identifier.
	 d) 	 Group Policy unit Indicator.
3.	 The process of linking Group policy to the AD objects such as site, domains & OU is known as.
	 a) 	 Filtering Group Policy
	 b) 	 Group Policy Scope
	 c) 	 Group Policy software Installation
	 d) 	 Loopback policies
4.	 Which technology is used to filter GPO’s.
	 a) 	 Group policy management console
	 b) 	 Loopback policies
	 c) 	 Windows Management Instrumentation
	 d) 	 Group Policy processing
5.	 What are the two modes for processing Loopback policy.
	 a) 	 Enable & Disable
	 b) 	 Local & Domain -based
	 c) 	 Replace & Merge
	 d) 	 Domains & OU’s
6.	 which of the following event occurs in Implementing Auditing policies, when a user tries to log on in
a domain.
	 a) 	 Password & Account lockout policies
	 b) 	 Audit system event	
	 c) 	 Account Logon event & Logon event
	 d) 	 Audit Process tracking event
16
7.	 which policy defines the policy that determines which user credential are cached on the RODC.
	 A) 	 Password & Account lockout policies
	 b) 	 Password Replication Policy
	 c) 	 Fine-Grained policy
	 d) 	 Domain password policy
8.	 When a child domain is created in the domain tree, what type of trust relationship exists between the
new child domain and the trees root domain?
	 A) 	 Transitive trusts
	 B) 	 Non- transitive trusts
	 C) 	 Forest Trust
	 D) 	 None
9. 	 What is the primary function of domain controllers?
	 A) 	 Domain
	 B) 	 Validate users to the network
	 C) 	 Child Domain
	 D) 	 None
10. 	If system is not assigned resources, such as RAM, CPU and the performance of the system may
slow down. Which tools are provided by server 2008 to monitor performance? (Choose two)
	 A) 	 The Task Manager
	 B) 	 The control Panel
	 c) 	 The MMC
	 D) 	 The performance tool
11. 	 If System administrator or Users want to see system Events which tool is Helpful___________.
	 A) 	 Control Panel
	 B) 	 The Event Viewer Tool
	 c) 	 AD DS
	 D) 	 DNS
12.	 If Administrator wants to control the allocation of CPU Resources to Application. which Feature is
Helpful for administrator_____________.
	 A) 	 Removable Storage Manager
	 B) 	 Storage Manager for SANs
	 c) 	 Windows System Resource Manager
	 D) 	 WINS server
17
13.	 Which of the following tabs of the task manager windows displays the stastical data for each network
adapter available on the system?
	 A) 	 Applications
	 B) 	 Processes
	 c) 	 Performance
	 D) 	 Networking
14. Which of the following tabs of the windows Task manager windows dosplays a list of programs
currently running on the system?
	 A) 	 Application
	 B) 	 Processes
	 C) 	 Performance
	 D) 	 Networking
15.	 In which Disk volume the data is written to two disks simultaneously, if one disk fails the server can
automatically switch to the second disk without any loss of data.
	 A) 	 Simple Volume
	 B) 	 Spanned Volume
	 C) 	 Mirrored Volume
	 D) 	 Striped Volume
16.	 Which command is use for creating Shadow copy ?
	 A) 	 Wbadmin
	 B) 	 VSSadmin create shadow /for=( Drive Letter)
	 C) 	 vss
	 D) 	 None
17.	 Which Disk Volume is a fault-tolerant volume that collects the free disk space of three or more disks
into one volume?
	 A) 	 Stiped Volume
	 B) 	 Spanned Volume
	 C) 	 Mirrored Volume
	 D) 	 RAID-5
	 E)	 Simple Volume
18.	 Which of the following technology allows data transfer between a Server and Data center with the
help of TCP/IP? (Choose two)
	 A)	 DAS (Directed Attached Storage)
	B) 	 iSCSI ( Internet Small Computer System Interface) SAN
18
	 C) 	 Fiber Channel (FC) SAN
	 D) 	 NONE
19.	 Which server storage technology allows you to store data to the storage location, which is directly
attached to a server either as internal hard disks or a rack-mounted RAID?)
	 A) 	 The Direct-attached Storage
	 B) 	 The Network-attached Storage
	 C) 	 The Storage-attached Network
	 D) 	 ATA
20.	 Which windows server 2008 feature is a group of two or more computers to increase the availability
of applications and services?
	 A) 	 Desktop Experience
	 B) 	 Failover Clustering
	 C) 	 Remote Assistance
	 D) 	 Network Load-balancing
21.	 _______________ is a group of servers that provides the load balancing service by sharing multiple
client requests by using virtual IP addresses and a shared Name.
	 A) 	 Internet printing client
	 B) 	 Simple TCP/IP services
	 C) 	 SMTP Server
	 D) 	 Network Load Balancing
22.	 Which of the following is the minimum disk space required configuring shadow copy?
	 A) 	 300 MB
	 B) 	 200 MB
	 C) 	 150 MB
	 D) 	 100 MB
23.	 Amith is a system engineer in Jetking. He wants to configure storage for a two node failover cluster.
The storage device is of 4 terabytes (TB) volume, in which Amith decides to configure a storage
volume of 3 TB. Which of the following steps is firstly taken by Amith to accomplish the task?
	 A) 	 Create a NTFS partition on the disk
	 B) 	 Convert the storage disk to a Master Boot Record (MBR) disk
	 C) 	 Convert the storage disk to a GUID Partition Table.
	 D) 	 Convert the storage disk to a dynamic disk.
19
24.	 ________________ is a feature available in windows server 2008 is mainly concerned with protecting
data on a drive that has been stolen or that can be accessed offline by bypassing file permissions.
	 A) 	 Bit locker
	 B) 	 Password
	 C) 	 Local security
	 D) 	 VPN authentication
25.	 Explain the Characteristics of Windows Server Core Edition ?
	 a) 	 Server Core introduced in 2003,Minimum Resource requirement compared to other Editions,It
provides a GUI,Does not provide security,Preferrably installed in Head OFFICE where
administration is skilled
	 b) 	 Server Core introduced in 2008,Requires heavy Resourcing compared to other Editions,It
provides a GUI,Does provide security.Perferrably installed in Branch Office where administration
is unskilled.
	 c) 	 Server Core introduced in 2008,Requires minimum Resourcing compared to other
Editions,It provides a CLI,Does provide security.Perferrably installed in Branch Office
where administration is unskilled.
	 d) 	 Server Core introduced in 2003,Requires heavy Resourcing compared to other Editions,It
provides a CLI,Does provide security.Perferrably installed in Branch Office where administration
is skilled.
26.	 What is the command to install a role on Server 2008 Core edition ?
	 a) 	 Start /w ocsetup <Role Name>
	 b) 	 Start /install /role <Role Name>
	 c) 	 Install /w /ocsteup <Role Name>
	 d) 	 Start /w OcInstall <Role Name>
27. 	What utility is used to change the Hostname of a Windows Server 2008 ?
	 a)	 Netdom
	 b)	 Hostname /r
	 c)	 Chghost <newname>
	 d)	 None of the above
28.	 What is the command to enable Remote desktop on Windows Server Core with NLA Support ?
	 a)	 cscript C:WindowsSystem32Scregedit.wsf /ar 1
	 b)	 cscript C:WindowsSystem32Scregedit.wsf /ar 0
	 c)	 cscript C:WindowsSystem32Scregedit.wsf /cs 1
	 d)	 cscript C:WindowsSystem32Scregedit.wsf /cs 0
20
29.	 What is PXE ?
	 a)	 Preinstall Boot Execution
	 b)	 Preboot Execution Environment
	 c)	 Preinstall Boot Execution Environment
	 d)	 Preinstall Execution Environment
30.	 What is a discovery Image ?
	 a)	 A discover image is a type of boot image that you can use to install an operating system
on a computer that is not capable of network booting using the PXE
	 b)	 2) A discover image is a type of boot image that you can use to install an operating system on
a computer that is capable of network booting using the PXE
	 c)	 3) A discover image is a type of install image that you can use to boot an operating system on
a computer that is not capable of network booting using the PXE
	 d)	 4) None of the above
31.	 Whic tool can be used for successful deployment of Windows Operating Sytems in a Networking
Environment using Windows Server 2008 ?
	 a)	 WDS
	 b)	 WSUS
	 c)	 RIS
	 d)	 IIS
32.	 Which utility provided by WAIK can be used for creating answer file for Windows OS Deployment?
	 a)	 WSIM
	 b)	 MDT
	 c)	 Microsoft ACT
	 d)	 WDS
33.	 How to install Print Services on a Server running Windows Server 2008 Standard Edition? (Choose 2 )
	 a)	 Go to Start > Administrative Tools > Server Manager > Add Features > Print Services
	 b)	 Go to Start > Administrative Tools > Server Manager > Add Roles > Print Services
	 c)	 Go to Control Panel > Program and Features > Windows Components > Add Roles > Print
Services
	 d)	 Go to Control Panel > Program and Features > Windows Components > Add Features > Print
Services
34.	 What are the default permissions when sharing a printer?
	 a)	 Print,Manage Printers
	 b)	 Print,Manage Documents
	 c)	 Print
	 d)	 Print, Manage Documents, Mange Printers
21
35.	 In an Enterprise Environment, What tool can be used for Printer Deployment?
	 a)	 WSUS Console
	 b)	 Windows Deployment Services Console
	 c)	 Group Policy Management Console
	 d)	 Printer Deployment Tool
36.	 Which script can be used to enable publishing of Printers to Active Directory?
	 a)	 Pubprn.vbs
	 b)	 prnmgr.vbs
	 c)	 PrnPublish.vbs
	 d)	 pnrqctl.vbs
37.	 What do you mean by ABE?
	 a)	 Access-based enumeration allows users to see only files and folders on a file server to
which they have permission to access.
	 b)	 Access-based enumeration allows users to see files and folders on a file server to which they
have no permission to access.
	 c)	 Access-based enumeration allows users to see cache files and folders on a file server.
	 d)	 Access-based enumeration does not allows users to see cache files and folders on a file server.
38.	 What is the minimum Forest Functional Level for DFS Domain based Namespaces?
	 a)	 Windows Server 2003 or higher
	 b)	 Windows Server 2008 or higher
	 c)	 Windows Server 2000 or higher
	 d)	 Windows Server 2008 R2 or higher
39.	 Which Protocol is supported by DFS for namespace based File Hosting?
	 a)	 SMB
	 b)	 NFS
	 c)	 FATM
	 d)	 X.400
40.	 Which tool can be used to Filter files to be saved on a file server using Files based Extensions?
	 a)	 FSRM
	 b)	 DFS
	 c)	 Quota Based File Access.
	 d)	 Access Based Enumeration
22
41.	 Which command line tool can be used for qouta management on Files and Folders running Windows
Server 2008 ?
	 a)	 Quotadir
	 b)	 Dirquota
	 c)	 Quotamgmt
	 d)	 dirmgmt
42.	 While installing the File Server Role, which of the following role service should be added to use the
Quota Management console for creating notifications for storage utilization?
	 a)	 Distributed File System
	 b)	 Windows Server 2003 File Services
	 c)	 Services for Network File System
	 d)	 File Server Resource Manager
43.	 Your company is using FAT 32 as the system partition & now it is planning to move to NTFS. Which
of the following are advantages of NTFS? (Multiple Choice)
	 a)	 Disk Quotas
	 b) 	 Encryption
	 c) 	 Compression
	 d) 	 None of the above
44.	 Among the following which tool scans the server for possible security vulnerabilities?
	 a)	 Reliability Monitor
	 b) 	 Data Collector Set
	 c) 	 Microsoft Baseline Security Analyzer Utility
	 d) 	 WSUS
45.	 Out of the following, a minimum of how many characters a strong password must have?
	 a)	 8
	 b)	 10
	 c) 	 7
	 d) 	 15
46.	 While installing the Print Services role on Windows Server, which role enables installation of the Print
Management snap-in?
	 a)	 Print Server
	 b)	 LDP Server
	 c)	 Internet Printing
	 d)	 Web Server
23
47.	 The File Services role helps in performing which of the following tasks in windows server 2008?
(Multiple Choice)
	 a)	 Enabling DFS
	 b)	 Configuring disk quotas
	 c)	 Generating storage report
	 d)	 Installing any other server
48.	 Which of the following permissions should you set to reset user password while delegating tasks?
	 a)	 Read all user information.
	 b)	 Create,delete,manage user accounts
	 c)	 Reset user passwords & force password change at next logon
	 d)	 create ,delete , & manage groups
49.	 Imagine you are the System Administrator of Jetking . The users of Jetking are complaining about
the low system performance of the server during day time. However ,at night the server functions
properly. You plan to record data of the day & night to compare them for the server performance.
Which of the following tools are used to record the performance data & compare the two sets of
data?
	 a)	 Data Collector Sets
	 b)	 Reliability Monitor
	 c)	 Event Viewer
	 d)	 Network Monitor
50.	 What shared folder exists on all domain controllers and is used to store Group Policy objects, login
scripts, and other files that are replicated domain-wide?
	A. 	 SYSVOL
	 B. 	 AD
	 C. 	 C$
	 D. 	 VOLMGR
51. 	A Windows Server 2008 computer that has been configured with the Active Directory DS role is
referred to as a __________.
	A. 	 domain controller
	 B. 	 domain manager
	 C. 	 global catalog
	 D. 	 DNS server
24
52.	 What type of zone is necessary for computer hostname-to-IP address mappings, which are used for
name resolution by a variety of services?
	 A. 	 primary lookup
	 B. 	 secondary lookup
	 C. 	 forward lookup
	 D. 	 reverse lookup
53.	 What is the name resolution mechanism that computers use for all Internet communications and
for private networks that use the Active Directory domain services included with Microsoft Windows
Server 2008, Windows Server 2003, and Windows 2000 Server?
	A. 	 DNS
	 B. 	 DHCP
	 C. 	 NetBIOS
	 D. 	 ADFS
54.	 The two built-in user accounts that are created on a Windows Server 2008 computer are the
Administrator account and the __________ account.
	 A. 	 Network
	 B. 	 Interactive
	 C. 	 Power User
	 D. 	 Guest
55. 	What are the specific processes or events that you want to track in the Reliability and Performance
Monitor?
	 A. 	 performance objects
	 B. 	 performance counters
	 C. 	 performance items
	 D. 	 performance classes
56 .	 In what type of query does the server that receives the name resolution request immediately respond
to the requester with the best information it possesses?
	 A. 	 formative
	 B. 	 iterative
	 C. 	 recursive
	 D. 	 aligned
57.	 Select the features of ADDS. (Multiple Choice)
	A.	flexibility
	 B.	rigidity
	C.	scalability
	 D.	lengthy
25
58.	 What is command used to install ADDS
	 A.	DCinstall.exe
	B.	dcpromo.exe
	 C.	mmc.exe
	 D.	None
59.	 What is command to use remove ADDS forcefully?
	A.	dcpromo /forceremoval
	 B.	 dcpromo
	 C.	 dcpromo forceremoval
	 D.	None
60. 	When Directory Services Restore Mode Administrator Password is required?
	A.	During Restore of Directory Services
	 B.	 During Backup of Directory Services
	 C.	 During Domain Login
	 D.	None
61. 	New feature in server 2008 for ADDS?
	 A.	 Domain Controller
	 B.	 Read Only Domain Controller
	 C.	 Write only Domain Controller
	 D.	None
62. 	Which Zone is used for IP Address Resolution to Hostname
	A.	Reverse Lookup Zone
	 B.	 Forward Lookup Zone
	 C.	 Forward & Reverse Lookup Zone
	 D.	None
63.	 DNS service can be used as
	 A.	 Only as AD integrated service
	 B.	 Only as stand-alone service
	 C.	 AD integrated service & stand-alone service both
	 D.	None
26
64.	 select the records used by DNS(Multiple Choice)
	A.	Host Record
	B.	Pointer Record
	 C.	 E-Mail Record
	 D.	 Configuration Record
65. 	What is use of Secondary DNS Server
	A.	Backup of Primary DNS Server
	 B.	 Load balancing
	 C.	 User Data
	 D.	None
66.	 To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?
(Multiple Choice)
	 A. 	 Active Directory Restore
	 B. 	 Active Directory Maintenance
	 C. 	 Directory Services Maintenance
	 D. 	 Directory Services Restore
67.	 What allows businesses to define, manage, access, and secure network resources including files,
printers, people, and applications? (Multiple Choice)
	 A. 	 network service
	 B. 	 Directory service
	 C. 	 Directory Infrastructure
	 D. 	 NT directory
68.	 Select the options that can be configured with DHCP (Multiple Choice)
	A.	Reservations
	B.	IP Address Scope
	 C.	WDS
	 D.	None
69. If client on automatic IP Adresss configuration does not get DHCP Server’s IP what client PC will
obtain
	A.	APIPA
	 B.	 Public Address
	 C.	 DHCP Server IP
	 D.	None
27
70 .	How is a local print device attached to a computer?
	 A. 	 through the network
	 B. 	 through computer ports
	 C. 	 through another computer
	 D. 	 none of the above
71.	 What Windows Server 2008 feature enables you to maintain previous versions of files on a server?
	 A. 	 Backup Tape
	 B. 	 Shadow Copies
	 C. 	 Shadow Files
	 D. 	 Offline Files
72. The Windows Server 2008 paging file is __________ times the amount of memory installed in the
computer by default.
	 A. 	 1.5
	 B. 	 2
	 C. 	 2.5
	 D. 	 3
73.	 A __________ is a complete installation of an operating system that runs in a software environment
emulating a physical computer.
	 A. 	 virtual machine
	 B. 	 virtual server
	 C. 	 terminal machine
	 D. 	 terminal server
74.	 What is the only authentication method integrated into IIS7 that IIS7 enables by default?
	 A. 	 Basic Authentication
	 B. 	 Anonymous Authentication
	 C. 	 Digest Authentication
	 D. 	 Windows Authentication
75.	 The process of granting a user access to a file server share by reading their permissions is called
__________.
	 A. 	 authorization
	 B. 	 authentication
	 C. 	 ownership
	 D. 	 delegation
28
76.	 What is the only authentication method integrated into IIS7 that IIS7 enables by default?
	 A. 	 Basic Authentication
	 B. 	 Anonymous Authentication
	 C. 	 Digest Authentication
	 D. 	 Windows Authentication
77. 	What does RAID stand for?
	 A. 	 Redundant Array of Interoperative Disks
	 B. 	 Repetitive Array of Independent Disks
	 C. 	 Redundant Array of Interpretive Disks
	 D. 	 Redundant Array of Independent Disks
78.	 HTTP uses what well-known port number?
	 A. 	 80
	 B. 	 25
	 C. 	 12
	 D. 	 110
79.	 What Windows Server 2008 service can you use to protect sensitive data on a Windows network?
	 A. 	 AD FS
	 B. 	 AD FTP
	 C. 	 AD FSMO
	 D. 	 AD RMS
80.	 What enables network administrators and owners to configure access rights for users during the
users’ entire lifecycle within an organization?
	 A. 	 Identity Lifecycle Management
	 B. 	 General Lifecycle Management
	 C. 	 Microsoft Lifecycle Management
	 D. 	 Lifecycle of Software Management
81.	 What are small physical devices on which a digital certificate is installed that are usually the size of
a credit card or keychain fob?
	 A. 	 RSA SecureID
	 B. 	 digital certificates
	 C. 	 smart cards
	 D. 	 biometric devices
29
82.	 What service responds to requests from clients concerning the revocation status of a particular
certificate, returning a digitally signed response indicating the certificate’s current status?
	 A. 	 Web Enrollment
	 B. 	 Web Responder
	 C. 	 enterprise CA
	 D. 	 Online Responder
83.	 Windows Server 2008 computer that has been configured with the Active Directory DS role is referred
to as a __________.
	 A. 	 domain controller
	 B. 	 domain manager
	 C. 	 global catalog
	 D. 	 DNS server
84. What protocol has become an industry standard that enables data exchange between directory
services and applications?
	 A. 	 NTDS
	B. 	 LDAP
	 C. 	 NDIS
	 D. 	 AD
85.	 What locator records within DNS allow clients to locate an Active Directory domain controller or
global catalog?
	 A. 	 A records
	 B. 	 MX records
	 C. 	 SRV records
	 D. 	 SOA records
86.	 What is the process of replicating DNS information from one DNS server to another?
	 A. 	 replication
	 B. 	 DNS push
	 C. 	 zone transfer
	 D. 	 DNS update
87.	 What type of trust relationship allows you to create two-way transitive trusts between separate
forests?
	 A. 	 shortcut
	B. 	 cross-forest
	 C. 	 external
	 D. 	 real
30
90. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for
name resolution by a variety of services?
	 A. 	 primary lookup
	 B. 	 secondary lookup
	 C. 	 forward lookup
	 D. 	 reverse lookup
91. What DLL must be registered to use the Schema Management snap-in?
	 A. 	 schmmgnt32.dll
	 B. 	 schemamanagement.dll
	 C. 	 schmmgmt.dll
	 D. 	 adschm.dll
92.	 Replication within Active Directory will occur when which of the following conditions is met?
	 A. 	 An object is added or removed from Active Directory.
	 B. 	 The value of an attribute has changed.
	 C. 	 The name of an object has changed.
	 D. 	 All of the above
93.	 What command-line tool can be used to manually create a replication topology if site link bridging is
disabled if the network is not fully routed?
	 A. 	 Dcdiag
	 B. 	 Repdiag
	 C. 	 Repadmin
	 D. 	 Netstat
94.	 Certain operations, such as a password change or an account lockout, will be transmitted by using
__________ replication, which means that the change will be placed at the beginning of the line and
applied before any other changes that are waiting to be replicated.
	 A. 	 urgent
	 B. 	 immediate
	 C. 	 fast
	 D. 	 pushed
95.	 Which FSMO role has the authority to manage the creation and deletion of domains, domain trees,
and application data partitions in the forest?
	 A. 	 Relative Identifier Master
	 B. 	 Infrastructure Master
	 C. 	 Domain Naming Master
	 D. 	 Schema Master
31
96.	 What types of memberships are stored in the global catalog?
	 A. 	 domain local
	B. 	 universal
	 C. 	 global
	 D. 	 local workstation
97. What console must be used to move the Domain Naming Master FSMO role?
	 A. 	 Active Directory Users and Computers
	 B. 	 Active Directory Forests and Domains
	 C. 	 Active Directory Schema
	 D. 	 Active Directory Domains and Trusts
98.	 What command-line utility is used to import or export Active Directory information from a comma-
separated value (.csv) file?
	 A. 	 NETDIAG
	 B. 	 NSLOOKUP
	C. 	 CSVDE
	 D. 	 DCPROMO
99.	 What special identity group is used by the system to allow permission to protected system files for
services to function properly?
	 A. 	 Network Service
	 B. 	 Restricted
	 C. 	 Service
	 D. 	 Self
100. When using CSVDE, what is the first line of the text file that uses proper attribute names?
	 A. 	 header row
	 B. 	 header record
	 C. 	 name row
	 D. 	 name record
32

Mais conteúdo relacionado

Mais procurados (20)

Smps
SmpsSmps
Smps
 
Uefi and bios
Uefi and biosUefi and bios
Uefi and bios
 
Bios
BiosBios
Bios
 
booting steps of a computer
booting steps of a computerbooting steps of a computer
booting steps of a computer
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Step for installing linux server
Step for installing linux serverStep for installing linux server
Step for installing linux server
 
IP Address
IP AddressIP Address
IP Address
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Bios vs uefi
Bios vs uefiBios vs uefi
Bios vs uefi
 
DBMS unit-1.pdf
DBMS unit-1.pdfDBMS unit-1.pdf
DBMS unit-1.pdf
 
Networking in Windows Operating System
Networking in Windows Operating SystemNetworking in Windows Operating System
Networking in Windows Operating System
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Bios
Bios Bios
Bios
 
Ubuntu-Overview
Ubuntu-OverviewUbuntu-Overview
Ubuntu-Overview
 
BOOTABLE OPERATING SYSTEM PPT
BOOTABLE OPERATING SYSTEM PPTBOOTABLE OPERATING SYSTEM PPT
BOOTABLE OPERATING SYSTEM PPT
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 

Semelhante a Jetking questions and answers 8.5x11

introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptxMugabo4
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active DirectoryTammy Moncrief
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]sourav nanda
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxAyeCS11
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationwebhostingguy
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating SystemsSinbad Konick
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationAvinash Kumar
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)rosu555
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptxMohamedAbdi347025
 
Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriartewebhostingguy
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks accordingMicrobiology
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to securityMicrobiology
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active DirectoryJessica Myers
 

Semelhante a Jetking questions and answers 8.5x11 (20)

introduction on server.pptx
introduction on server.pptxintroduction on server.pptx
introduction on server.pptx
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]
 
O.s. lab all_experimets
O.s. lab all_experimetsO.s. lab all_experimets
O.s. lab all_experimets
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptx
 
Technolo Report
Technolo ReportTechnolo Report
Technolo Report
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server Administration
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
Windows nt
Windows ntWindows nt
Windows nt
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
 
Web Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris UriarteWeb Technology – Web Server Setup : Chris Uriarte
Web Technology – Web Server Setup : Chris Uriarte
 
Types of networks according
Types of networks accordingTypes of networks according
Types of networks according
 
Types of networks according to security
Types of networks according to securityTypes of networks according to security
Types of networks according to security
 
Resume
ResumeResume
Resume
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 

Mais de sunil kumar

Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously sunil kumar
 
Best ways to loose weight Naturaly
Best ways to loose weight NaturalyBest ways to loose weight Naturaly
Best ways to loose weight Naturalysunil kumar
 
how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000sunil kumar
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005sunil kumar
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectivessunil kumar
 
Comp tia a_220-801_objectives
Comp tia a_220-801_objectivesComp tia a_220-801_objectives
Comp tia a_220-801_objectivessunil kumar
 
Types of optical device
Types of optical deviceTypes of optical device
Types of optical devicesunil kumar
 
Classification of computers
Classification of computersClassification of computers
Classification of computerssunil kumar
 
Not bridge south bridge archexture
Not bridge  south bridge archextureNot bridge  south bridge archexture
Not bridge south bridge archexturesunil kumar
 
Dns introduction
Dns   introduction Dns   introduction
Dns introduction sunil kumar
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazysunil kumar
 

Mais de sunil kumar (20)

Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously Best Ways to loose weight by Keto diet Deliciously
Best Ways to loose weight by Keto diet Deliciously
 
Best ways to loose weight Naturaly
Best ways to loose weight NaturalyBest ways to loose weight Naturaly
Best ways to loose weight Naturaly
 
Gam ks egnfk
Gam ks egnfkGam ks egnfk
Gam ks egnfk
 
how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000how to invest in shares with only ₹ 5000
how to invest in shares with only ₹ 5000
 
Ping
PingPing
Ping
 
Comp tia network_n10-005
Comp tia network_n10-005Comp tia network_n10-005
Comp tia network_n10-005
 
Comp tia a_220-802_objectives
Comp tia a_220-802_objectivesComp tia a_220-802_objectives
Comp tia a_220-802_objectives
 
Comp tia a_220-801_objectives
Comp tia a_220-801_objectivesComp tia a_220-801_objectives
Comp tia a_220-801_objectives
 
App b
App bApp b
App b
 
Smps
SmpsSmps
Smps
 
Types of optical device
Types of optical deviceTypes of optical device
Types of optical device
 
Memoryhierarchy
MemoryhierarchyMemoryhierarchy
Memoryhierarchy
 
Wi fi copy
Wi fi   copyWi fi   copy
Wi fi copy
 
Classification of computers
Classification of computersClassification of computers
Classification of computers
 
Osi model
Osi modelOsi model
Osi model
 
Not bridge south bridge archexture
Not bridge  south bridge archextureNot bridge  south bridge archexture
Not bridge south bridge archexture
 
Dns introduction
Dns   introduction Dns   introduction
Dns introduction
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy4 owasp egypt_12_4_2014_ebrahim_hegazy
4 owasp egypt_12_4_2014_ebrahim_hegazy
 
Adeex
AdeexAdeex
Adeex
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Jetking questions and answers 8.5x11

  • 1. 1 ASSIGNMENTS Windows 2008 server Part I 1. What are some of the new tools and features provided by Windows Server 2008? Ans:- Windows Server 2008 now provides a desktop environment similar to Microsoft Windows Vista and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive encryption feature. Windows Server 2008 also provides the new IIS7 web server and the Windows Deployment Service. 2. What are the different editions of Windows Server 2008? Ans:- The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition provides a platform for large enterprisewide networks. The Datacenter Edition provides support for unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a scaled- down version of Windows Server 2008 intended for use as a dedicated web server. The Standard, Enterprise, and Datacenter Editions can be purchased with or without the Hyper-V virtualization technology. 3. When a child domain is created in the domain tree, what type of trust relationship exists between the new child domain and the trees root domain? Ans:- Child domains and the root domain of a tree are assigned transitive trusts. This means that the root domain and child domain trust each other and allow resources in any domain in the tree to be accessed by users in any domain in the tree. 4. What is the primary function of domain controllers? Ans:- The primary function of domain controllers is to validate users to the network. However, domain controllers also provide the catalog of Active Directory objects to users on the network. 5. What are two command-line utilities that can be used to check TCP/IP configurations and IP connectivity, respectively? Ans:- The ipconfig command can be used to check a computer’s IP configuration and also renew the client’s IP address if it is provided by a DHCP server. ping can be used to check the connection between the local computer and any computer on the network, using the destination computer’s IP address. 6. What term is used to refer to the first domain created in a new Active Directory tree? Ans:- The first domain created in a tree is referred to as the root domain. Child domains created in the tree share the same namespace as the root domain. 7. What type of Active Directory objects can be contained in a group? Ans:- A group can contain users, computers, contacts, and other nested groups. 8. What types of Active Directory objects can be contained in an Organizational Unit? Ans:- Organizational Units can hold users, groups, computers, contacts, and other OUs. The Organizational Unit provides you with a container directly below the domain level that enables you to refine the logical hierarchy of how your users and other resources are arranged in the Active Directory.
  • 2. 2 9. How can client computer accounts be added to the Active Directory? Ans:- Client computer accounts can be added through the Active Directory Users and Computers snap-in. You can also create client computer accounts via the client computer by joining it to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups. 10. What is the purpose of deploying local DNS servers? Ans:- A domain DNS server provides for the local mapping of fully qualified domain names to IP addresses. Because the DNS is a distributed database, the local DNS servers can provide record information to remote DNS servers to help resolve remote requests related to fully qualified domain names on your network. 11. What is LPD? Ans:-It enables Printing using the line printer daemom protocol, which is used by UNIX clients. 12. What is printer pooling? Ans:- Printer pooling is used for load balancing. When an end user puts a print job in the queue, the first available printer is the pool will take the job.  13. What is HARD quota? Ans:- It prevents users from saving a file after the volume or folder has reached the specified space limit and generates notification. 14. What is the use of OFFLINE file features? Ans:- Mobile users might need access to shared folders even when they’re disconnected from your internal network. Offline Files makes this possible by allowing client computers to automatically cache a copy of files on shared folders and by providing transparent access to the files when the user is disconnected from the network. 15. What is Quotas? Ans:- disk quotas allow Windows administrators to monitor and control the use of disk space by users. Disk quotas can be deployed in a number of different ways. 16. What is the primary and extended partition? Ans:- Primary and extended partitions are the main disk divisions; one hard disk may contain up to four primary partitions, or three primary partitions and one extended partition. 17. Which File system is supported by windows 2008 server to secure file and folder? Ans:- NT file system(NTFS) and Encrypting file system (EFS). 18. What is use of terminal services? Ans:- Terminal Services provides the ability to host multiple, simultaneous client sessions on Windows Server 2003. Terminal Services is capable of directly hosting compatible multi-user client desktops running on a variety of Windows-based and non Windows-based computers. 19. Which editions of Windows 2008 server we will get Hyper-V role? Ans:- Hyper-V is available in x64-based versions of Windows Server 2008—specifically, the x64- based versions of Windows Server 2008 Standard, Windows Server 2008 Enterprise, and Windows Server 2008 Datacenter.
  • 3. 3 20. What is use of Hyper-V role? Ans:- Hyper-V Server is a dedicated stand-alone product that contains the hypervisor, Windows Server driver model, virtualization capabilities, and supporting components such as failover clustering. 21. Which role service is required for the Routing in Windows server 2008? Ans:- RRAS role from Network policies and access services is required for Routing. 22. How to configure VPN server? Ans:- – Server Manager ->Adding Roles -> Next -> Select Server Roles ->Network Policy andAccess Services ->Next ->Routing and Remote Access Services ->Remote Access Service ->Routing -> Next ->Confirm Installation Selection ->Install ->Configure and Enable Routing and Remote Access ->Next-> Routing and Remote Access Wizard ->Custom Configuration ->Next ->VPN access ->Next ->Finish ->Start Service These are the steps to add VPN at server side. 23. What are the different types of VPN? Ans:- Private VPN Internal VPN External VPN 24. What is mean by IP routing? Ans:- IP rounting is the process of determining the route i.e. communication path and sending data from the source computer to the destination computer in a network. 25. What is static routing? Ans:- static routing is a routing mechanism is allows you to define a static route from the sourceto destination while transmitting data from one computer to another. 26. What is mean by performance monitor? Ans:- performance monitor is a tool to provide real time data of either a local computer or a network computer. 27. What is reliability monitor? Ans:- Reliability monitor is a tool that tracks the stability of a computer. Computer can achieve the maximum stability index if new software is not installed and system failures do not occur. 28. What is use of MBSA? Ans:-Microsoft Baseline Security Analyzer is a Microsoft utility used to scan the server for possible security vulnerabilities. 29. What is WSUS? Ans:- Microsoft provides the Windows Server Update Services(WSUS) to allow the computer automatically download the Microsoft software updates. 30. Why computer groups are required in WSUS? Ans:- Using computer groups we can allow specify computers to install the updates and there are two types of groups All computers and Unassigned computers.
  • 4. 4 Windows Server 2008 Part II Ques.1:- What is server? Ans.:- Server is a computer program that manages access to a centralized resource in a network. Ques.2:- What is Domain? Ans.:- Domain made up of a group of client and servers under the control of one central security database. Within a domain, user authenticates once to a centralized server known as domain controller. Ques.3:- What is the use of Domain Controller? Ans.:- Domain controller is a server, It is control or responsible of provide to host access of all resource like printer, files, mail within the domain from the central point. Ques.4:- What is the use of ADDS? Ans.:- ADDS stands for Active Directory Domain Services it is new feature of Windows Server 2008. ADDS provides a database which store the information of directory services and manage communication between domains and users. Ques.5:-What are functional levels in Server 2008? Ans.:- Functional level determine the features of Active Directory(AD) that a you can use within the domain basically two type of functional levels are in Server 2008 1. Domain Functional Level 2. Forest Functional Level Ques.6:-what is DNS? Ans.:- DNS stands for Domain Name System, DNS use domain name resolution mechanism which resolve host name to IP and IP to host name. Ques.7:-What is DNS Zone? Ans.:-DNS zone is an entity that stores the object information in to the various records. Windows Server 2008 supports three types of DNS Zones. Ques.8:-Explain different type of DNS zones? Ans.:- The DNS server is the primary source for information about this zone, Server 2008 supports three type of zones. 1. Primary Zone: - It stores the master copy of zone data in a local file or in AD DS. It stores the information in text file and this file can be edited by an administrator. 2. Secondary Zone: - A secondary zone is merely a copy of a primary zone that is hosted on another server; it cannot be stored in AD DS. 3. Stub zone: - A stub zone is a copy of a zone that contains only those resource records necessary to identify the authoritative Domain Name System (DNS) servers for that zone. A stub zone is used to resolve names between separate DNS namespaces. This type of resolution may be necessary when a corporate merger requires that the DNS servers for two separate DNS namespaces resolve names for clients in both namespaces. Ques.9:- How many records in DNS server? Ans.:-Through records DNS Server perform name resolution process. Many type of records’ in DNS server some commonly used records are  Host A & AAAA  Alias
  • 5. 5  MX  PTR  SRV  SOA Etc. Ques.10:- What is WINS server? Ans.:-WINS stands for Windows Internet Name Service It is similar DNS, who is use for resolved computer name (NetBIOS) to the IP address and IP to NetBIOS name locally. Ques.11:- What is DHCP? Ans.:-DHCP stands for Dynamic Host Configuration Protocol which is used to assign automatic IP address to DHCP client s. Ques.12:- What is Dora process in DHCP and how it works? Ans.:-DHCP provide IP addresses through DORA process, the working of DORA are following 1) Client makes a UDP Broadcast to the server with a DHCP Discover, or Discover packet. 2) DHCP offers to the client. The server sends a DHCP Offer including other configuration parameters (DHCP Options) for the client per the server configuration file 3) In response to the offer Client requests the server. The client replies DHCP Request, uncast to the server, requesting the offered address. 4) The server sends DHCP Ack acknowledging the request which is the clients final permission to take the address as offered. Before sending the ack the server double checks that the offered address is still available, that the parameters match the clients request and (if so) marks the address taken. Ques.13:- How to configure domain controller? Ans.:- Clik StartRun Type dcpromo.exe command  Click the next button Click next button againSelect Create a new domain in a new forest Type the forest root domain name (Example jetking.com)Select the Forest Functional Level from (Windows Server 2008) Click the next button Click the next button Click the yes button  Click the next button again Click the next button Enter directory services restore mode Admin passwordClick next button Click next button Then reboot the PC. Ques.14:- How to install DNS? Ans.:- Click Start Administrative tool  Server ManagerRight click the Role node and select the Add Roles options from context menuClick the next button  Select the DNS Server from Roles list Click the next Click next button againClick next buttonOnce role installation process finish click the close button Ques.15:-What is child domain? Ans.:- In DNS hierarchy, a child domain called as sub domain which is the portion of a larger domain name and is a subordinate domain of the root domain, A DNS hierarchy contains the root domain which is divided in to child domain. A child domain must contain the root domain namespace for example the root domain name is Jetking.com then the child domain name is child.Jetking.com, Child domain is a part of root domain tree therefore its shares the same AD schema and configuration information.
  • 6. 6 16. What is Schema? Ans : It represents the logical structure of AD. 17. What is Global Catalog? Ans : It contains data related to the objects of own domain controllers and other domain controller with in forest. 18. What is Site Link Bridges? Ans: Site Link Bridge is an AD object that represents a set of site links through which the domain controllers communicate with each other. 19. What is use of Bridgehead Server? Ans: Bridgehead Server is used to receive and replicate data between sites . 20. What do you mean by Intersite Replication? Ans: Replication that occurs between two sites is known as intersite replication. 21. What is use of Active Directory Service? Ans: Active Directory Service is used to store all the information required to manage the use of the AD objects, such as users, groups and computers. 22. What is use of CSVDE command? Ans: The CSVDE command is used to import or export information from a .csv file to the AD database to create new objects and modify or delete existing objects. 23. What is use of Dsadd command? Ans: The Dsadd command is used to add a single computer, contact, group, user, or an OU. 24. What is use of LDIFDE command? Ans: The LDIFDE command is used to import and export the AD information. 25. What are types of Group? Ans: Security & Distribution 26. What is VPN? Ans: VPN is virtual network of computers that uses a public telecommunication infrastructure and provides a user with secure remote access to the network resources. 27. What is NAP? Ans: It allows network administrators to specify one or more policies that define the condition to permit the access to the network. 28. Which are different VPN technologies support to Windows Vista, Windows 7 and Windows Server 2008? Ans: Point-to-Point Tunneling Protocol, Layer 2 Tunneling Protocol, Secure Socket Tunneling Protocol. 29. What are types of replication? Ans: Intrasite & Intersite replication.
  • 7. 7 30. What are types of Operation Masters? Ans: The schema master, domain naming master, RID master, PDC emulator master, and the infrastructure master. 31. What is use of Computer Account? Ans: Computer Account is used to identify a computer in a domain. It also used to force domain permissions and group policies. 32. What are the pre-requisites to add computers to a domain? Ans: The computer object must exist & need to specify the permissions that who can join a computer with the same name in the domain. 33. What are the steps on client computer to add computers to a domain? Ans: Log on to the client computer as an administrator Right-click the Computer option in the start menu. Select Property from the context menu. Change setting in the computer name, domain, and workgroup setting group. Select Domain radio button Provide name of domain Click OK. 34. What is use of Windows Power Shell? Ans: Windows Power Shell is a command-line shell and scripting language that helps IT professionals to easily create new user, groups, or computer. 35. What is Subnet? Ans: Subnet is the smallest unit of network defined with a unique Internet Protocol address range. It also defined as a logical IP block which is connected to other IP block through network devices such as,swithches and routers. Windows 2008 server Part III 1. Describe & Explore Group Policy Objects? Ans: Group policy objects stores information related to group policy setting, which can be used or implemented on users or computers in the network.GPO affects the user and computers located in sites, domains and different Organization. 2. What is Domain-based GPO? Ans: GPO available in the AD domain are Known as domain based GPO’s. Domain based GPO’s created by default, 1. Default Domain Policy-Policies are linked to the AD Domain. It affects all the users, computers, and domain controllers in Domain. 2. Default domain Controller Policy-Policies linked to the Domain Controller OU in the Domain. Policy setting in this policy affect the Domain controllers in the current OU only.
  • 8. 8 3. How to Configure Group Policy settings? Ans:Group Policy managed with help of Group Policy Management Editor(GPME). Following Nodes are used to configure Policy settings. 1. Computer configuration 2. User Configuration. Both these nodes contains Sub-Nodes, A. Policy B. Preferences A. Policy:Software settings,Windows Settings and Administrative template settings. B. Preference Node contains Windows and Control panel settings. 4. What is Group Policy Scope? Ans: The process of linking GPO’s to the AD Objects, like sites, domains and other Organizational units(OU’s) is known as scoping of group policy. 5. What is Authentication? Ans:When a user logs on a network or standalone computer he or she has to provide user name and password for identification. 6. What is Account Lockout Policy? Ans:Account lockout policy locks an account in a domain when user tries to logon with incorrect user name and password beyond the number of time specified in the lockout policy. 7. What is Fine-Grained Policy? Ans:Administrative accounts have high privilege and authority to change object in AD .These accounts provided additional security policies which overrides policies defined in Domain password and account lockout policy. 8. What is Password Setting Objects? Ans:The fine-grained policies are defined with help of separate class of objects in AD that maintain settings for fine-grained policies. These objects are called Password Setting Objects. Password setting Objects cannot be applied directly to an OU. If apply on users of an OU must be create global security group of users of OU and then apply PSOs. 9. Explain RODC? Ans:Read only domain Controller introduced in windows server 2008 to solve problem related to speed, security, and integrity in an enterprise. Domain controller is Read only. It contains all attributes of the objects in domain except sensitive attributes like password’s as example when the users in branch office logs on in domain, RODC accepts user credentials and transfer it to domain controller in corporate office for authentication.
  • 9. 9 10. What is Audit Policy? Ans:It is a set of configuration, Network administrator to record activities and changes made due to those activities which performed in the network. OR It provides complete information about the activities performed on the Network resources and changes made in the attributes of network objects. 11. What is Windows Management Instrumentation? Ans:Windows Management Instrumentation is management infrastructure Technology used to filter GPO. 12. How to Implement WMI Filters? Ans:WMI base queries are used to filter the computers on Basis of RAM, Processor Speed, Disk capacity, IP Address, Operating System version and service pack level. 13. Which type of the software need to install on the computers in the network to create software deployment group policy? Ans:.msi file of the software need to install on computers in network to create software deployment group policy. 14. Write methods of Deploying softwares Ans: A. Published B. Assigned C. Advanced 15. What is System state data? Ans:System state data comprises the components on which the windows server 2008 Operating System (OS) for various tasks. It contains 1. AD 2. Boot Files 3. COM+ Class Registration database 4. Registry 5. Sysvol Directory. 16. How to take full server Backup by using wbadmin command? Ans:wbadmin Start SystemStateBackup -backuptarget:(Any free Drive.) e.g:D 17. How to perform Restoring in AD environment? Ans:Performing DSRM(Directory Services Restore Mode) Restore data in AD Environment.
  • 10. 10 18. Which precaution need to take when restoring system state Data? Ans:Need to ensure that AD services are stopped because full access to system files and AD data store is required. 19. What is Offline Maintenance? Ans:These are System maintenance activities that performed when users are not using services provided by a Server. 20. Which type of Backup should you perform when you want to save data that has changed since the last full backup? Ans:Incremental Backup. 21. What is the function of the Task Manager Tool ? ANS : The main function of task manager is to monitor the applications and the tasks running in the windows operating system. It provides information to users and administrator who is using the PC & shows the application process, CPU usage, performance, networking, users and finally services. With the help of this task manager you can end the running program or task which is extremely complicated to end, switch to another task, although you can open new task, you can check the usage of CPU, it portrays the user who is using the pc at the moment and finally, you can shut down the pc as well. 22. What is the function of the MMC Tool in Windows 2008 server? ANS : MMC stands for Microsoft Management console , it is used to enables in creating, saving and opening administrative tools. 23. What is the function of the Dcdiag Tool in Windows 2008 server? ANS : Dcdiag is used to enables in analyzing the state of domain controllers in a forest or enterprise and also assits in troubleshooting by reporting any problems. 24. What is the function of the Netdom Tool in Windows 2008 server? ANS : Netdom is used to enables batch management of trusts, connecting computers to domains and validating trusts and secure channels. 25. What is the function of the Event viewer Tool in Windows 2008 server? ANS : Event viewer is used to enables in monitoring events recorded in event logs. 26. What is Paging file in Windows 2008 server? ANS : The paging file (Pagefile.sys) is a hidden file on your computer`s hard disk. By Default Windows Stores the paging file on the boot partition i.e. the partition that contains the operating system and its supported files. The default paging file size is equal to 1.5 times the total RAM. 27. What is Memory Dump in Windows 2008 server? ANS : In the situation of malfunction of Windows server 2008 the operating system dumps the content of the system memory to the file therefore while deciding the storage requirement you should also consider this file. The maximum size of which is amount of memory installed in the computer plus one megabyte. 28. What is SAN? ANS : SAN refers to the separate network that helps you to attach remote storage device to the servers and SAN stands for storage area network.
  • 11. 11 29. What is NAS? ANS : NAS refers to the data storage technology which allows you to store the data on a network storage location and provides data accessibility to multiple client. 30. What is Log Files? ANS : Log files refers to the Event track on the system. 31. How many free disk space do you require to create shadow copy? ANS : 300 MB minimum and maximum size can be set to all the space that is available on the specified volume. 32. What is Firewall? ANS : A firewall helps to protect your computer from accessed by unauthorized users or malicious program. 33. What are advantages of Antivirus software? ANS : Checking for malicious code and any unauthorized access, Blocking any suspicious network activity, Implimenting backup of server at regular intervals and checking logs at regular intervals. 34. What is WSUS in windows 2008 server? ANS : WSUS forms a useful Platform, where the updates are downloaded and distributed centrally. 35. What is Bit locker in windows 2008 server? ANS : Bit locker is a feature available in Windows 2008 server which protect data on a drive that has been stolen or that can be accessed offline by bypassing file permissions. 36. What is rootkit? ANS : Rootkit is a software that helps a hacker to access a computer without the knowledge of administrator. 37. What is Diskpart? Ans :Diskpart is a command line utility which is used to create, convert and delete the partition and volume. 38. What is the Ntdsutil Tool in Windows 2008 server? ANS : Ntdsutil is used to enables managing AD, Single Master Operations, and removing metadata. 39. What is the Terminal services in Windows 2008 server? ANS : Terminal services is used to enables in remote access and management of computers. 40. What is the Regedit in Windows 2008 server? ANS : Regedit is used to enables in viewing and altering registry setting.
  • 12. 12 INTERVIEW QUESTIONS AND ANSWERS 1. What is Domain? Ans: The term domain can refer either to a local subnetwork or to descriptors for sites on the Internet e.g. www.jetking.com 2. What is Workgroup? Ans: A workgroup is a collection of computers on a local area network (LAN) that share common resources and responsibilities. Being a peer-to-peer (P2P) network design, each workgroup computer may both share and access resources if configured to do so. 3. What is use of domain controller? Ans:- The primary function of domain controllers is to validate users to the network. However, domain controllers also provide the catalog of Active Directory objects to users on the network. 4. What is DNS? Ans: DNS stands for Domain Name System which provides for the local mapping of fully qualified domain names to IP addresses 5. What is DHCP Ans: Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network. 6. What is DNS & why we used ? Ans: DNS is simply a database that links host names, such as http://www.jetking.com, to a specific IP address, such as 192.168.124.1. Apart from this, DNS has many more features. The key features of host name to IP mapping are as follows: • Mappings of addresses to names and vice versa (known as records) are stored in a database. • The DNS database is distributed. • A DNS database also stores additional records. 7. Working process of DNS Ans: When a DNS client needs to look up a name used in a program, it queries DNS servers to resolve the name. For example, the name specified could be the FQDN for a computer, such as “mumbai.jetking.com.”, DNS queries resolve in a number of different ways. A client can sometimes answer a query locally using cached information obtained from a previous query. The DNS server can use its own cache of resource record information to answer a query. A DNS server can also query or contact other DNS servers on behalf of the requesting client to fully resolve the name, then send an answer back to the client. This process is known as recursion. In addition, the client itself can attempt to contact additional DNS servers to resolve a name. When a client does so, it uses separate and additional nonrecursive queries based on referral answers from servers. This process is known as iteration. In general, the DNS query process occurs in two parts: • A name query begins at a client computer and is passed to a resolver, the DNS Client service, for resolution.
  • 13. 13 • When the query cannot be resolved locally, DNS servers can be queried as needed to resolve the name. 8. How to configure DHCP? Ans: From the Network Administration group, start DHCP Manager. Under DHCP Servers, select *Local Machine*. From the Scope menu, choose Create. Complete the scope configuration. The DHCP server cannot be a DHCP client. It must have a static IP address, subnet mask, and default gateway address. You also have the option of assigning an exclusion range or specific excluded addresses as well as lease duration and a name. Choose OK when done. Choose Yes to activate the scope. 9. How to configure DNS? Ans: Open the DNS console. Highlight your computer name and choose Action | Configure a DNS Server… to launch the Configure DNS Server Wizard. Click Next and choose to configure the following: forward lookup zone, forward and reverse lookup zone, root hints only. Click Next and then click Yes to create a forward lookup zone. Click Next and type the name of the zone you are creating. Click Next and then click Yes to create a reverse lookup zone. Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone. Click Next and enter the information to identify the reverse lookup zone. You can choose to create a new file or use an existing DNS file On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic updates. If you need to apply a DNS forwarder, you can apply it on the Forwarders window. Click Finish 10. What is VPN Ans: VPN stands for Virtual Private Network which is a virtual network of computers that uses a public telecommunication infrastructure and provides a user with secure remote access to the network resources. 11. What is database server Ans: A database program such as MySQL or Oracle which is hosted on a server that provides database services to other computer programs or computers, is known as database server. The term may also refer to a computer dedicated to running such a program. 12. In printer password is required or not Ans: Yes, required 13. How to share a printer in network? Ans: If you currently have a printer already installed on the computer right-click the printer icon and click Properties. Click the Sharing tab and make sure the printer is shared. Or by using a dedicated print server or a network printer. 14. Types of server Ans: E-mail server, database server, file server, mail server, print and web server 15. Dial up connection, explain it Ans: It is a form of Internet access that uses public switched telephone network (PSTN) using telephone line to connect to an Internet service provider (ISP)
  • 14. 14 16. What is mail server Ans: A mail server also known as a mail transfer agent or MTA, is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery. A server dedicated to running such applications is also called a mail server. 17. What is login script Ans: A login script is a series of instructions that a workstation follows every time a user logs on. These instructions are held on the server in a ‘script’ file, which is a batch file that workstations can access and run. 18. How can create Domain member Ans: Domain members can be created through the Active Directory Users and Computers snap-in. You can also create client computer accounts via the client computer by joining it to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups. 19. What is WINS and full form of Wins Ans: WINS stands for Windows Internet Naming Service, supports name resolution, converts NetBIOS names to IP addresses for Windows networks. 20. How to connect PC in server / Domain Ans: You can join to the domain via the System Properties dialog box. This requires a user account that has administrative privileges, such as members of the Domain Administrator or Enterprise Administrator groups. 21. What is the use of Active directory Ans: It is a directory service created by Microsoft for Windows domain networks. It is used to authenticate and authorize all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software. 22. What is ADDS and its use Ans: ADDS stands for Active Directory Domain Services are the foundation for distributed networks built on Windows 2000 Server, Windows Server 2003 and Microsoft Windows Server 2008 operating systems that use domain controllers. It provides secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services. 23. Win. 2008 server installation steps. Ans: 1. Insert the media into the DVD drive. 2. Reboot the computer. 3. When prompted for an installation language and other regional options, make your selection and press Next. 4. Press Install Now to begin the installation process. 5. Enter your Product ID in the next window, and click Next. 6. Select the version and click Next. 7. Read and accept the license terms by clicking to select the checkbox and pressing Next. 8. if you’re installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click Next. 24. How to share an internet connection. Ans: using ICS, NAT, proxy etc. 25. How to make domain controller. Ans: by using dcpromo command
  • 15. 15 Exam Questions and Answers 1. Which two types of GPO’s are used in Windows Server 2008. a) Group Policy object & Group policy management console b) Local & Domain -based GPO’s. c) Software & Script based. d) WinLogon & File System based 2. Full form of GUID? a) Group Policy Unique Identifier. b) Group Policy Unified Identifier. c) Globally Unique Identifier. d) Group Policy unit Indicator. 3. The process of linking Group policy to the AD objects such as site, domains & OU is known as. a) Filtering Group Policy b) Group Policy Scope c) Group Policy software Installation d) Loopback policies 4. Which technology is used to filter GPO’s. a) Group policy management console b) Loopback policies c) Windows Management Instrumentation d) Group Policy processing 5. What are the two modes for processing Loopback policy. a) Enable & Disable b) Local & Domain -based c) Replace & Merge d) Domains & OU’s 6. which of the following event occurs in Implementing Auditing policies, when a user tries to log on in a domain. a) Password & Account lockout policies b) Audit system event c) Account Logon event & Logon event d) Audit Process tracking event
  • 16. 16 7. which policy defines the policy that determines which user credential are cached on the RODC. A) Password & Account lockout policies b) Password Replication Policy c) Fine-Grained policy d) Domain password policy 8. When a child domain is created in the domain tree, what type of trust relationship exists between the new child domain and the trees root domain? A) Transitive trusts B) Non- transitive trusts C) Forest Trust D) None 9. What is the primary function of domain controllers? A) Domain B) Validate users to the network C) Child Domain D) None 10. If system is not assigned resources, such as RAM, CPU and the performance of the system may slow down. Which tools are provided by server 2008 to monitor performance? (Choose two) A) The Task Manager B) The control Panel c) The MMC D) The performance tool 11. If System administrator or Users want to see system Events which tool is Helpful___________. A) Control Panel B) The Event Viewer Tool c) AD DS D) DNS 12. If Administrator wants to control the allocation of CPU Resources to Application. which Feature is Helpful for administrator_____________. A) Removable Storage Manager B) Storage Manager for SANs c) Windows System Resource Manager D) WINS server
  • 17. 17 13. Which of the following tabs of the task manager windows displays the stastical data for each network adapter available on the system? A) Applications B) Processes c) Performance D) Networking 14. Which of the following tabs of the windows Task manager windows dosplays a list of programs currently running on the system? A) Application B) Processes C) Performance D) Networking 15. In which Disk volume the data is written to two disks simultaneously, if one disk fails the server can automatically switch to the second disk without any loss of data. A) Simple Volume B) Spanned Volume C) Mirrored Volume D) Striped Volume 16. Which command is use for creating Shadow copy ? A) Wbadmin B) VSSadmin create shadow /for=( Drive Letter) C) vss D) None 17. Which Disk Volume is a fault-tolerant volume that collects the free disk space of three or more disks into one volume? A) Stiped Volume B) Spanned Volume C) Mirrored Volume D) RAID-5 E) Simple Volume 18. Which of the following technology allows data transfer between a Server and Data center with the help of TCP/IP? (Choose two) A) DAS (Directed Attached Storage) B) iSCSI ( Internet Small Computer System Interface) SAN
  • 18. 18 C) Fiber Channel (FC) SAN D) NONE 19. Which server storage technology allows you to store data to the storage location, which is directly attached to a server either as internal hard disks or a rack-mounted RAID?) A) The Direct-attached Storage B) The Network-attached Storage C) The Storage-attached Network D) ATA 20. Which windows server 2008 feature is a group of two or more computers to increase the availability of applications and services? A) Desktop Experience B) Failover Clustering C) Remote Assistance D) Network Load-balancing 21. _______________ is a group of servers that provides the load balancing service by sharing multiple client requests by using virtual IP addresses and a shared Name. A) Internet printing client B) Simple TCP/IP services C) SMTP Server D) Network Load Balancing 22. Which of the following is the minimum disk space required configuring shadow copy? A) 300 MB B) 200 MB C) 150 MB D) 100 MB 23. Amith is a system engineer in Jetking. He wants to configure storage for a two node failover cluster. The storage device is of 4 terabytes (TB) volume, in which Amith decides to configure a storage volume of 3 TB. Which of the following steps is firstly taken by Amith to accomplish the task? A) Create a NTFS partition on the disk B) Convert the storage disk to a Master Boot Record (MBR) disk C) Convert the storage disk to a GUID Partition Table. D) Convert the storage disk to a dynamic disk.
  • 19. 19 24. ________________ is a feature available in windows server 2008 is mainly concerned with protecting data on a drive that has been stolen or that can be accessed offline by bypassing file permissions. A) Bit locker B) Password C) Local security D) VPN authentication 25. Explain the Characteristics of Windows Server Core Edition ? a) Server Core introduced in 2003,Minimum Resource requirement compared to other Editions,It provides a GUI,Does not provide security,Preferrably installed in Head OFFICE where administration is skilled b) Server Core introduced in 2008,Requires heavy Resourcing compared to other Editions,It provides a GUI,Does provide security.Perferrably installed in Branch Office where administration is unskilled. c) Server Core introduced in 2008,Requires minimum Resourcing compared to other Editions,It provides a CLI,Does provide security.Perferrably installed in Branch Office where administration is unskilled. d) Server Core introduced in 2003,Requires heavy Resourcing compared to other Editions,It provides a CLI,Does provide security.Perferrably installed in Branch Office where administration is skilled. 26. What is the command to install a role on Server 2008 Core edition ? a) Start /w ocsetup <Role Name> b) Start /install /role <Role Name> c) Install /w /ocsteup <Role Name> d) Start /w OcInstall <Role Name> 27. What utility is used to change the Hostname of a Windows Server 2008 ? a) Netdom b) Hostname /r c) Chghost <newname> d) None of the above 28. What is the command to enable Remote desktop on Windows Server Core with NLA Support ? a) cscript C:WindowsSystem32Scregedit.wsf /ar 1 b) cscript C:WindowsSystem32Scregedit.wsf /ar 0 c) cscript C:WindowsSystem32Scregedit.wsf /cs 1 d) cscript C:WindowsSystem32Scregedit.wsf /cs 0
  • 20. 20 29. What is PXE ? a) Preinstall Boot Execution b) Preboot Execution Environment c) Preinstall Boot Execution Environment d) Preinstall Execution Environment 30. What is a discovery Image ? a) A discover image is a type of boot image that you can use to install an operating system on a computer that is not capable of network booting using the PXE b) 2) A discover image is a type of boot image that you can use to install an operating system on a computer that is capable of network booting using the PXE c) 3) A discover image is a type of install image that you can use to boot an operating system on a computer that is not capable of network booting using the PXE d) 4) None of the above 31. Whic tool can be used for successful deployment of Windows Operating Sytems in a Networking Environment using Windows Server 2008 ? a) WDS b) WSUS c) RIS d) IIS 32. Which utility provided by WAIK can be used for creating answer file for Windows OS Deployment? a) WSIM b) MDT c) Microsoft ACT d) WDS 33. How to install Print Services on a Server running Windows Server 2008 Standard Edition? (Choose 2 ) a) Go to Start > Administrative Tools > Server Manager > Add Features > Print Services b) Go to Start > Administrative Tools > Server Manager > Add Roles > Print Services c) Go to Control Panel > Program and Features > Windows Components > Add Roles > Print Services d) Go to Control Panel > Program and Features > Windows Components > Add Features > Print Services 34. What are the default permissions when sharing a printer? a) Print,Manage Printers b) Print,Manage Documents c) Print d) Print, Manage Documents, Mange Printers
  • 21. 21 35. In an Enterprise Environment, What tool can be used for Printer Deployment? a) WSUS Console b) Windows Deployment Services Console c) Group Policy Management Console d) Printer Deployment Tool 36. Which script can be used to enable publishing of Printers to Active Directory? a) Pubprn.vbs b) prnmgr.vbs c) PrnPublish.vbs d) pnrqctl.vbs 37. What do you mean by ABE? a) Access-based enumeration allows users to see only files and folders on a file server to which they have permission to access. b) Access-based enumeration allows users to see files and folders on a file server to which they have no permission to access. c) Access-based enumeration allows users to see cache files and folders on a file server. d) Access-based enumeration does not allows users to see cache files and folders on a file server. 38. What is the minimum Forest Functional Level for DFS Domain based Namespaces? a) Windows Server 2003 or higher b) Windows Server 2008 or higher c) Windows Server 2000 or higher d) Windows Server 2008 R2 or higher 39. Which Protocol is supported by DFS for namespace based File Hosting? a) SMB b) NFS c) FATM d) X.400 40. Which tool can be used to Filter files to be saved on a file server using Files based Extensions? a) FSRM b) DFS c) Quota Based File Access. d) Access Based Enumeration
  • 22. 22 41. Which command line tool can be used for qouta management on Files and Folders running Windows Server 2008 ? a) Quotadir b) Dirquota c) Quotamgmt d) dirmgmt 42. While installing the File Server Role, which of the following role service should be added to use the Quota Management console for creating notifications for storage utilization? a) Distributed File System b) Windows Server 2003 File Services c) Services for Network File System d) File Server Resource Manager 43. Your company is using FAT 32 as the system partition & now it is planning to move to NTFS. Which of the following are advantages of NTFS? (Multiple Choice) a) Disk Quotas b) Encryption c) Compression d) None of the above 44. Among the following which tool scans the server for possible security vulnerabilities? a) Reliability Monitor b) Data Collector Set c) Microsoft Baseline Security Analyzer Utility d) WSUS 45. Out of the following, a minimum of how many characters a strong password must have? a) 8 b) 10 c) 7 d) 15 46. While installing the Print Services role on Windows Server, which role enables installation of the Print Management snap-in? a) Print Server b) LDP Server c) Internet Printing d) Web Server
  • 23. 23 47. The File Services role helps in performing which of the following tasks in windows server 2008? (Multiple Choice) a) Enabling DFS b) Configuring disk quotas c) Generating storage report d) Installing any other server 48. Which of the following permissions should you set to reset user password while delegating tasks? a) Read all user information. b) Create,delete,manage user accounts c) Reset user passwords & force password change at next logon d) create ,delete , & manage groups 49. Imagine you are the System Administrator of Jetking . The users of Jetking are complaining about the low system performance of the server during day time. However ,at night the server functions properly. You plan to record data of the day & night to compare them for the server performance. Which of the following tools are used to record the performance data & compare the two sets of data? a) Data Collector Sets b) Reliability Monitor c) Event Viewer d) Network Monitor 50. What shared folder exists on all domain controllers and is used to store Group Policy objects, login scripts, and other files that are replicated domain-wide? A. SYSVOL B. AD C. C$ D. VOLMGR 51. A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________. A. domain controller B. domain manager C. global catalog D. DNS server
  • 24. 24 52. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services? A. primary lookup B. secondary lookup C. forward lookup D. reverse lookup 53. What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server? A. DNS B. DHCP C. NetBIOS D. ADFS 54. The two built-in user accounts that are created on a Windows Server 2008 computer are the Administrator account and the __________ account. A. Network B. Interactive C. Power User D. Guest 55. What are the specific processes or events that you want to track in the Reliability and Performance Monitor? A. performance objects B. performance counters C. performance items D. performance classes 56 . In what type of query does the server that receives the name resolution request immediately respond to the requester with the best information it possesses? A. formative B. iterative C. recursive D. aligned 57. Select the features of ADDS. (Multiple Choice) A. flexibility B. rigidity C. scalability D. lengthy
  • 25. 25 58. What is command used to install ADDS A. DCinstall.exe B. dcpromo.exe C. mmc.exe D. None 59. What is command to use remove ADDS forcefully? A. dcpromo /forceremoval B. dcpromo C. dcpromo forceremoval D. None 60. When Directory Services Restore Mode Administrator Password is required? A. During Restore of Directory Services B. During Backup of Directory Services C. During Domain Login D. None 61. New feature in server 2008 for ADDS? A. Domain Controller B. Read Only Domain Controller C. Write only Domain Controller D. None 62. Which Zone is used for IP Address Resolution to Hostname A. Reverse Lookup Zone B. Forward Lookup Zone C. Forward & Reverse Lookup Zone D. None 63. DNS service can be used as A. Only as AD integrated service B. Only as stand-alone service C. AD integrated service & stand-alone service both D. None
  • 26. 26 64. select the records used by DNS(Multiple Choice) A. Host Record B. Pointer Record C. E-Mail Record D. Configuration Record 65. What is use of Secondary DNS Server A. Backup of Primary DNS Server B. Load balancing C. User Data D. None 66. To perform a System State restore in Windows Server 2008, you will boot the DC into what mode? (Multiple Choice) A. Active Directory Restore B. Active Directory Maintenance C. Directory Services Maintenance D. Directory Services Restore 67. What allows businesses to define, manage, access, and secure network resources including files, printers, people, and applications? (Multiple Choice) A. network service B. Directory service C. Directory Infrastructure D. NT directory 68. Select the options that can be configured with DHCP (Multiple Choice) A. Reservations B. IP Address Scope C. WDS D. None 69. If client on automatic IP Adresss configuration does not get DHCP Server’s IP what client PC will obtain A. APIPA B. Public Address C. DHCP Server IP D. None
  • 27. 27 70 . How is a local print device attached to a computer? A. through the network B. through computer ports C. through another computer D. none of the above 71. What Windows Server 2008 feature enables you to maintain previous versions of files on a server? A. Backup Tape B. Shadow Copies C. Shadow Files D. Offline Files 72. The Windows Server 2008 paging file is __________ times the amount of memory installed in the computer by default. A. 1.5 B. 2 C. 2.5 D. 3 73. A __________ is a complete installation of an operating system that runs in a software environment emulating a physical computer. A. virtual machine B. virtual server C. terminal machine D. terminal server 74. What is the only authentication method integrated into IIS7 that IIS7 enables by default? A. Basic Authentication B. Anonymous Authentication C. Digest Authentication D. Windows Authentication 75. The process of granting a user access to a file server share by reading their permissions is called __________. A. authorization B. authentication C. ownership D. delegation
  • 28. 28 76. What is the only authentication method integrated into IIS7 that IIS7 enables by default? A. Basic Authentication B. Anonymous Authentication C. Digest Authentication D. Windows Authentication 77. What does RAID stand for? A. Redundant Array of Interoperative Disks B. Repetitive Array of Independent Disks C. Redundant Array of Interpretive Disks D. Redundant Array of Independent Disks 78. HTTP uses what well-known port number? A. 80 B. 25 C. 12 D. 110 79. What Windows Server 2008 service can you use to protect sensitive data on a Windows network? A. AD FS B. AD FTP C. AD FSMO D. AD RMS 80. What enables network administrators and owners to configure access rights for users during the users’ entire lifecycle within an organization? A. Identity Lifecycle Management B. General Lifecycle Management C. Microsoft Lifecycle Management D. Lifecycle of Software Management 81. What are small physical devices on which a digital certificate is installed that are usually the size of a credit card or keychain fob? A. RSA SecureID B. digital certificates C. smart cards D. biometric devices
  • 29. 29 82. What service responds to requests from clients concerning the revocation status of a particular certificate, returning a digitally signed response indicating the certificate’s current status? A. Web Enrollment B. Web Responder C. enterprise CA D. Online Responder 83. Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________. A. domain controller B. domain manager C. global catalog D. DNS server 84. What protocol has become an industry standard that enables data exchange between directory services and applications? A. NTDS B. LDAP C. NDIS D. AD 85. What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog? A. A records B. MX records C. SRV records D. SOA records 86. What is the process of replicating DNS information from one DNS server to another? A. replication B. DNS push C. zone transfer D. DNS update 87. What type of trust relationship allows you to create two-way transitive trusts between separate forests? A. shortcut B. cross-forest C. external D. real
  • 30. 30 90. What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services? A. primary lookup B. secondary lookup C. forward lookup D. reverse lookup 91. What DLL must be registered to use the Schema Management snap-in? A. schmmgnt32.dll B. schemamanagement.dll C. schmmgmt.dll D. adschm.dll 92. Replication within Active Directory will occur when which of the following conditions is met? A. An object is added or removed from Active Directory. B. The value of an attribute has changed. C. The name of an object has changed. D. All of the above 93. What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed? A. Dcdiag B. Repdiag C. Repadmin D. Netstat 94. Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the beginning of the line and applied before any other changes that are waiting to be replicated. A. urgent B. immediate C. fast D. pushed 95. Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest? A. Relative Identifier Master B. Infrastructure Master C. Domain Naming Master D. Schema Master
  • 31. 31 96. What types of memberships are stored in the global catalog? A. domain local B. universal C. global D. local workstation 97. What console must be used to move the Domain Naming Master FSMO role? A. Active Directory Users and Computers B. Active Directory Forests and Domains C. Active Directory Schema D. Active Directory Domains and Trusts 98. What command-line utility is used to import or export Active Directory information from a comma- separated value (.csv) file? A. NETDIAG B. NSLOOKUP C. CSVDE D. DCPROMO 99. What special identity group is used by the system to allow permission to protected system files for services to function properly? A. Network Service B. Restricted C. Service D. Self 100. When using CSVDE, what is the first line of the text file that uses proper attribute names? A. header row B. header record C. name row D. name record
  • 32. 32