Practice Quiz 2

  1. Active Directory is a ____ that houses information about all
    network resources such as servers, printers, user accounts, groups of user accounts, security policies, and other information.



    A.  directory service
  2. A ____ usually is a higher-level representation of how a business, government, or school is organized, for example reflecting a geographical location or major division of that organization.



    D.  domain
  3. Every resource in a domain is called a(n) ____.



    B.  object
  4. If information on one DC changes, such as the creation of an
    account, it is replicated to all other DCs in a process called ____.



    C.  multimaster replication
  5. If information on one DC changes, such as the creation of an account, it is replicated to all other DCs in a process called ____.



    D.  schema
  6. The ____ stores information about every object within a forest.



    D.  global catalog
  7. DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addresses and vice versa, through a process called ____.



    C.  name resolution
  8. A ____ is one in which every child object contains the name of the parent object.



    D.  contiguous namespace
  9. The forest ____ refers to the Active Directory functions supported forest-wide.



    D.  functional level
  10. A ____ contains one or more domains that are in a common
    relationship.



    B.  tree
  11. A(n) ____ means that if A and B have a trust and B and C have a trust, A and C automatically have a trust as well.



    D.  transitive trust
  12. A(n) ____ is a grouping of related objects within a domain,
    similar to the idea of having subfolders within a folder, and can be used to reflect the structure of the organization without having to completely restructure the domain(s) when that structure changes.



    B.  OU
  13. A ____ is a TCP/IP-based concept (container) within Active
    Directory that is linked to IP subnets.



    C.  site
  14. A ____ is typically used to enable one- or two-way access between a Windows Server domain within a forest and a realm of UNIX/Linux computers.



    B.  realm trust
  15. A ____ is intended to contain user accounts from a single domain and can also be set up as a member of a domain local group in the same or another domain.



    B.  global security group
  16. In an Active Directory context in which there are multiple
    hierarchies of domains, trees, and forests, ____ provide a means to span domains and trees.



    D.  universal security groups
  17. ____ are used in Microsoft operating systems to provide a
    consistent working environment for one or more users.



    D.  Profiles
  18. In a ____, the user does not have permission to update the folder containing his profile.



    C.  mandatory user profile
  19. A ____ is different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.



    A.  Read-Only Domain Controller
  20. ____ password policies mean that you can now create more than one set of account policies within a domain.



    D.  Fine-grained
  21. ____ are stored as header information with each folder and file, along with other characteristics including volume label, designation as a subfolder, date of creation, and time of creation.



    B.  Attributes
  22. The ____ attribute is checked to indicate that the folder or file
    needs to be backed up because it is new or changed.



    B.  archive
  23. The ____ attribute protects folders and files so that only the
    user who encrypts the folder or file is able to read it.



    A.  NTFS encrypt
  24. An encrypted folder or file uses the Microsoft ____, which sets up a unique, private encryption key associated with the user account that encrypted the folder or file.



    C.  Encrypting File System
  25. The ____ portion of EFS uses a single key to encrypt the file or
    folder.



    D.  symmetric
  26. When configuring folder and file permissions, use the ____ button on the folder properties Security tab to change which groups and users have permissions to a folder.



    D.  Edit
  27. ____ mean that the same permissions on a parent object apply to the child objects, such as files and subfolders within the parent folder.



    B.  Inherited permissions
  28. Accessing folders and files can be tracked by setting up ____,
    which in Windows Server 2008 enables you to track activity on a folder or file, such as read or write activity.



    C.  auditing
  29. Taking ____ is the only way to shift control from one account to another.



    A.  ownership
  30. The share permission ____ permits groups or users to read and
    execute files, but cannot add or delete files and folders and cannot modify files.



    A.  reader
  31. The share permission ____ enables groups and users to read,
    execute, and add files, but can only modify and delete files provided by them.



    A.  contributor
  32. The share permission ____ permits groups or users to read,
    execute, add, delete, and modify files, and to create and delete subfolders and manage share permissions.



    B.  co-owner
  33. To ____ an object means to make it available for users to access when they view Active Directory contents.



    B.  publish
  34. The ____ enables you to simplify access to the shared folders on a network by setting up folders to appear as though they are accessed from only one place.



    A.  Distributed File System
  35. In DFS, access to shared folders can be distributed across many servers, resulting in the ability to perform ____, so that one server does not experience more load than others.



    D.  load balancing
  36. The hierarchical structure of DFS in the domain-based model is
    called the DFS ____.



    D.  topology
  37. ____ is a naming convention that designates network servers,
    computers, and shared resources.



    C.  Universal Naming Convention
  38. The ____ provides interoperability between Windows Server 2008 and UNIX and Linux systems.



    D.  Subsystem for UNIX-based Applications
  39. UNIX/Linux server administrators and programmers rely on the
    popular UNIX/Linux ____ editor for creating scripts, writing program source code, editing data files, and many more functions.



    D.  vi
  40. When using SUA in ____, every process that is run is treated as a Windows process.



    C.  mixed mode
  41. The workstation or application that initially generates the print
    job is the ____.



    D.  network print client
  42. The computer or print server device offering the printer share is
    the ____.



    B.  network print server
  43. In the Windows environment, a ____ is a group of DLLs, information files, and programs that processes print jobs for printing.



    A.  spooler
  44. When a print job is processed over the Internet or an intranet,
    ____ must be installed and running in Windows Server 2008.



    A.  Internet Information Services (IIS)
  45. The XPS drive path uses the ____ Driver Model.



    A.  XPSDrv
  46. To take full advantage of Windows Server 2008 to manage shared printers for one location, install the ____ .



    B.  Print Services
  47. In the right pane in the Printers window, the ____ heading lists the names of printers managed through the Printers window.



    A.  name
  48. In the right pane in the Printers window, the ____ heading lists
    descriptions of printers or other information about printers.



    B.  comments
  49. Turning on network printer sharing enables printer sharing through the ____ so that shared printers appear when users view network resources.



    A.  Windows Firewall
  50. The title bar and top portion of the ____ tab in a printer’s
    properties show the name of the printer.



    D.  General
  51. The ____ boxes are used to store special notes about the printer that can help distinguish it from other printers, particularly for the sake of users if the printer is shared on the network.



    A.  Location and Comment
  52. The ____ tab is used to enable or disable a printer for sharing as well as to specify the name of the share.



    B.  Sharing
  53. In the ____ data type, the FF is a form-feed code placed at the
    end of the print file.



    B.  RAW (FF appended)
  54. In the ____ data type, the print processor checks the print file
    for a form feed as the last character set, before appending a form feed at the end.



    B.  RAW (FF auto)
  55. Windows 95, 98, Me, NT, 2000, XP, Vista, 7, Server 2003, and Server 2008 clients use the ____ data type.



    B.  enhanced metafile (EMF)
  56. A ____ is one that has special firmware or cartridges to print
    using a page-description language (PDL).



    B.  PostScript printer
  57. The ____ tab enables you to specify printer settings that are
    specific to the printer you have installed, such as printer trays, memory, paper size, fonts, duplexing, and installable options.



    C.  Device Settings
  58. When a PostScript-formatted document is sent to a non-PostScript printer, if you do not have ____ enabled, the printer might print tens or hundreds of pages with a single control code on each page.



    C.  Hold mismatched documents
  59. You can pause, resume, restart, or view the properties of one or more documents in the ____ of a printer.



    B.  print queue
  60. A(n) ____ is like a stack of print jobs, with the first job
    submitted at the top of the stack and the last job submitted at the bottom, and all of the jobs waiting to be sent from the spooler to the printer.



    A.  print queue
Author
rcpantoni
ID
185800
Card Set
Practice Quiz 2
Description
Practice Quiz 2
Updated