Servers Test 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Where is a GPT stored?

In a folder with the same name as the GPO in the SYSVOL share

In a folder with the same name as the GUID of the GPO in Active Directory

In a folder with the same name as the GUID of the GPO in the SYSVOL share

In a folder with the same name as the GPO in Active Directory

Answer: c. In a folder with the same name as the GUID of the GPO in the SYSVOL share

Group Policy Template (GPT) files are stored in the SYSVOL share of domain controllers in a folder

with the same name as the GUID of the GPO.

2
New cards

Which of the following are methods for linking a GPO to a container? (Choose all that apply.)

a. b. c. d. In ADUC, right-click the container and then select “Create a GPO in this domain and link it here.”

In the GPMC, right-click the container and then select “Create a GPO in this domain and link it

here.”

In the GPMC, right-click a container and select Link an Existing GPO.

In ADAC, right-click a container and select Link an Existing GPO.

Answer: b. In the GPMC, right-click the container and then select “Create a GPO in this domain and

link it here.”, c. In the GPMC, right-click a container and select Link an Existing GPO.

You use the GPMC to manage and link GPOs to containers. You can create a GPO and link it at the

same time by right-clicking the container and selecting “Create a GPO in this domain and link it here.”

You can link an existing GPO by right-clicking the container and clicking Link an Existing GPO.

3
New cards

You want to deploy a software package that’s available to all users in the domain if they want to use it, but

you don’t want the package to be installed unless a user needs it. How should you configure the software

installation policy?

a. b. c. d. Publish the package under the Computer Configuration node.

Assign the package under the Computer Configuration node.

Publish the package under the User Configuration node.

Assign the package under the User Configuration node

Answer: c. Publish the package under the User Configuration node.

Publishing an application under the User Configuration node makes the application available to install

by all users in the scope of the GPO. Assigning it in the User or Computer Configuration node

automatically installs the application.

4
New cards

You want to deploy a logon script by using Group Policy. You have several sites connected via a WAN

with a DC at each site. You want to make sure the script is always available when users log on from any

computer at any location. What should you do?

a. b. c. d. Create a share on the fastest DC in the network and save the script there.

Send the script via email to all users and have them save it locally.

Save the script in the SYSVOL share.

Copy the script to cloud storage.

Answer: c. Save the script in the SYSVOL share.

The SYSVOL share is replicated to all domain controllers, so the script will be available to all users at

each site.

5
New cards

Which of the following represents the correct order in which GPOs are applied to an object that falls within

the GPO’s scope?

a. b. c. d. Site, domain, OU, local GPOs

Local GPOs, domain, site, OU

Domain, site, OU, local GPOs

Local GPOs, site, domain, OU

Answer: d. Local GPOs, site, domain, OU

GPOs are applied in the following order: Local GPOs, site-linked GPOs, domain-linked GPOs, and the

OU-linked GPOs. The acronym LSDOU can be used to remember the order.

6
New cards

An OU structure in your domain has one OU per department, and all the computer and user accounts are in

their respective OUs. You have configured several GPOs defining computer and user policies and linked

the GPOs to the domain. A group of managers in the Marketing Department need different policies from

the rest of the Marketing Department users and computers, but you don’t want to change the top-level OU

structure. Which of the following GPO processing features are you most likely to use?

a. Block inheritance

b. GPO enforcement

c. WMI filtering

d. Loopback processing

Answer: a. Block inheritance

Blocking inheritance prevents settings in a GPO linked to a higher-level container from affecting

objects nested in the higher-level container.

7
New cards

You have created a GPO that sets certain security settings on computers. You need to make sure these

settings are applied to all computers in the domain. Which of the following GPO processing features are

you most likely to use?

a. Block inheritance

b. GPO enforcement

c. WMI filtering

d. Loopback processing

Answer: b. GPO enforcement

GPO enforcement ensures that settings in a GPO linked to a container affect objects in nested

containers, even if there are conflicts from other GPOs or inheritance blocking is configured.

8
New cards

You have just finished configuring a GPO that modifies several settings on computers in the Operations

OU and linked the GPO to the OU. You check on a few computers in the Operations Department and find

that the policies haven’t been applied. On one computer, you run gpupdate, and the policies are applied

correctly. What’s a likely reason the policies weren’t applied to all computers when you tried to update

them remotely?

a. b. c. d. The Computer Configuration node of the GPO is disabled.

A security filter that blocks the computer accounts has been set.

The Operations OU has Block Inheritance set.

Computers only apply GPO settings every 90 minutes or when the computer reboots.

Answer: d. Computers only apply GPO settings every 90 minutes or when the computer reboots.

Computer settings are only applied every 90 minutes or when the computer reboots. The settings are

also applied if you run gpupdate on the computer.

9
New cards

You have an Active Directory forest of two trees and eight domains. You haven’t changed any of the

operations master domain controllers. On which domain controller is the schema master?

a. All domain controllers

b. c. d. The last domain controller installed

The first domain controller in the forest root domain

The first domain controller in each tree

Answer: c. The first domain controller in the forest root domain

If you create a new forest, the first DC installed performs all five FSMO roles. The first domain in a

new forest is called the forest root domain.

10
New cards

Which of the following is a reason for establishing multiple sites? (Choose all that apply.)

a. Improving authentication efficiency

b. Enabling more frequent replication

c. d. Reducing traffic on the WAN

Having only one IP subnet

Answer: a. Improving authentication efficiency, c. Reducing traffic on the WAN

There are three main reasons for establishing multiple sites: authentication efficiency, replication

efficiency, and application efficiency. Replication efficiency can help reduce traffic on the WAN.

11
New cards

User authentications are taking a long time. The domain controller performing which FSMO role will most

likely decrease authentication times if it’s upgraded?

a. RID master

b. PDC emulator

c. Infrastructure master

d. Domain naming master

Answer: b. PDC emulator

The PDC emulator processes password changes for older Windows clients and is used during sign-in

authentication. The DC performing this role should be centrally located where there’s a high

concentration of users to facilitate logons. The PDC emulator is the most heavily used of the FSMO

roles and should be placed on a suitable DC.

12
New cards

An older server that's performing the RID master role is being taken out of service, and you will be

replacing it with a new server configured as a domain controller. What should you do to ensure the

smoothest transition?

a. b. c. d. Transfer the RID master role to the new domain controller, and then shut down the old server.

Shut down the current RID master and seize the RID master role from the new domain controller.

Back up the domain controller that’s currently the RID master, restore it to the new domain

controller, and then shut down the old RID master.

Shut down the current RID master, and then transfer the RID master role to the new domain

controller.

Answer: a. Transfer the RID master role to the new domain controller, and then shut down the old

server.

Transferring an operations master role means moving the role’s function from one DC to another while

the original DC is still in operation. Because the RID master should be highly available, transferring

the role is preferable to shutting down the original server and seizing the role.

13
New cards

You maintain an RODC running Windows Server 2022 at a branch office, and you want one employee

with solid computer knowledge to perform administrative tasks, such as driver and software updates and

device management. How can you do this without giving the employee broader domain rights?

a. Assign the employee’s account as a delegated administrator in the RODC’s computer account

b. c. d. settings.

Create a local user on the RODC and add it to the Administrators group. Have the user log on with

this account when necessary.

Create a script that adds the user to the Domain Admins group each day at a certain time and then

removes the user from the group one hour later. Tell the user to log on and perform the necessary

tasks during the specified period.

Send the user to extensive Windows Server 2022 training, and then add the user to the Domain

Admins group.

Answer: a. Assign the employee’s account as a delegated administrator in the RODC’s computer

account settings.

A delegated administrator account for an RODC doesn’t have domain administrative rights and

permissions, so the scope of the delegated permissions is limited to just the RODC computer.

14
New cards

Where would you find files related to logon and logoff scripts in an Active Directory environment?

a. C:\Windows\NTDS

b. %systemroot%\SYSVOL

c. %Windir%\ntds.dit

d. C:\Windows\edb.log

Answer: b. %systemroot%\SYSVOL

Some crucial information for domain operation is stored as files in the SYSVOL share on domain

controllers, including group policy template files, the ADMX central store, and logon scripts.

15
New cards

Which of the following best describes the first domain installed in a forest?

a. Forest root

b. Global catalog

c. Master domain

d. Primary tree

Answer: a. Forest root

The first domain installed in a new forest is referred to as the forest root domain.

16
New cards

Which of the following is responsible for facilitating forest-wide Active Directory searches?

a. Knowledge Consistency Checker

b. Infrastructure master

c. Domain naming master

d. Global catalog server

Answer: d. Global catalog server

A global catalog (GC) server is a DC configured to hold the global catalog. Every forest must have at

least one GC server. GC servers facilitate domain-wide and forest-wide searches and logons across

domains, and they hold universal group membership information.

17
New cards

Your company has merged with another company that also uses Windows Server 2022 and Active

Directory. You want to give the other company’s users access to your company’s forest resources and vice versa without duplicating account information and with the least administrative effort. How can you

achieve this goal?

a. b. Transfer your global catalog to one of their servers.

Create a two-way forest trust.

c. Configure an external trust.

d. Configure selective authentication.

Answer: b. Create a two-way forest trust.

A forest trust allows users in one forest to be granted access to permissions in another forest. If users in

each forest need access to resources in the other forest, a two-way forest trust should be created.

18
New cards

You have three sites: Boston, Chicago, and Los Angeles (LA). You have created site links between Boston

and Chicago and between Chicago and LA with the default site link settings. What do you need to do to

make sure replication occurs between Boston and LA?

a. b. c. d. Do nothing; replication will occur between Boston and LA with the current configuration.

Create a new connection object between Boston and LA.

Create a site link bridge between Boston and LA.

Configure a site link between Boston and LA with SMTP.

Answer: a. Do nothing; replication will occur between Boston and LA with the current configuration.

Site links are transitive by default, which means if a site link exists between Site A and Site B, between

Site A and Site C, and between Site C and Site D, Site A can replicate directly with Site D and Site C

can replicate directly with Site B without creating an explicit link between the two sites.

19
New cards

Which of the following is a valid reason for using multiple forests?

a. Centralized management

b. Need for different schemas

c. d. Easy access to all domain resources

Need for a single global catalog

Answer: b. Need for different schemas

Business units in a large organization might require different schemas because of differences in

language, culture, and applications. The schema controls the objects you can create in Active Directory

and the attributes of these objects. The schema is forest-wide, so if you need different schemas, you

must have additional forests.

20
New cards

Which of the following is a task you should perform before installing server roles and features? (Choose all

that apply.)

a. b. d. Set a strong Administrator password.

Make the server a domain member.

c. Configure static IP addresses.

Make sure security updates are current.

Answer: a. Set a strong Administrator password., c. Configure static IP addresses., d. Make sure

security updates are current.

A strong Administrator password and static IP address should be set on a server immediately after

Windows Server is installed. In addition, security updates should be made current. Making the server a

domain member is dependent on what role the server will play in your organization and is not

necessarily a required task.

21
New cards

You add a server to Server Manager but see the error message “WinRM Negotiate authentication error.”

What should you do?

a. b. Add the server with different credentials.

Add the server to the TrustedHosts list.

c. Install .NET Framework 4.5.

d. Enter the Configure-SMRemoting command.

Answer: b. Add the server to the TrustedHosts list.

If you try to manage a server that is not an Active Directory member, you must add the server to the

TrustedHosts list. Otherwise, you will get an WinRM Negotiate authentication error.

22
New cards

You’re managing 75 servers from a single Server Manager console and find you’re wasting a lot of time

scrolling through the list of servers to find the one you want to manage. You have five locations with about

15 servers in each location. What can you do to make it easier to manage these servers in Server Manager?

a. Create a group in Active Directory.

b. Use WinRM.

c. Enable PowerShell remoting.

d. Create server groups.

Answer: d. Create server groups.

If you have dozens or even hundreds of servers to manage, you might want to organize them in server

groups, such as by department, location, or function. For example, you can group all servers related to

the Operations Department, all servers in the Phoenix office, or all DNS servers.

23
New cards

In Windows Server, what must be running to allow PowerShell remoting?

a. Windows Firewall

LBFO

c. Telnet

d. WinRM

Answer: d. WinRM

By default, Windows Server remote management is enabled via Windows Remote Management

(WinRM). WinRM provides a command-line interface for performing a variety of remote management

tasks.

24
New cards

11. Which method of allowing PowerShell remote administration best leverages the principle of least

privilege?

a. Credential Security Support Provider

b. Kerberos unconstrained delegation

c. Kerberos resource-based constrained delegation

d. Just Enough Administration

Answer: d. Just Enough Administration

Just Enough Administration (JEA) is a technology that allows administrators to delegate administrative

tasks to other personnel without granting excessive privileges. JEA leverages the principle of least

privilege, which states that users and administrators should be given sufficient rights and permissions

to perform their jobs, but no more than that.

25
New cards

With which Windows Admin Center installation option do you access the tool using the loopback address

of the installation computer, typically when you are managing a small number of servers?

a. Local client

b. Gateway server

c. Managed server

d. Failover cluster

Answer: a. Local client

After you install Windows Admin Center using the local client method, you can start it from a shortcut

on the desktop or from the Start menu. Windows Admin Center will open in a browser window with

the address https://localhost:6516.