Term
Files that are replicated throughout the domain, such as GPO's, are stored in the _____ file, which is a shared file that exists on all domain controllers. |
|
Definition
|
|
Term
T/F Transaction logs (which need at least 50 MB of free space [fact]) should be stored on a separate hard disk from the OS to fulfill maximum performance. |
|
Definition
True; Storing the trans log files on separate disks achieves optimal performance because it does not have to compete with I/O requests with the Main disk |
|
|
Term
____ ______ partitions are used to separate forest-wide DNS info from domain-wide DNS info. |
|
Definition
Application Directory; This is what controls the scope of replication for different types of DNS data, keeping replication narrowed down to where it is supposed to take place only. |
|
|
Term
What group do you need to belong to in order to create or modify Application Directory partitions? |
|
Definition
|
|
Term
T/F Aging and scavenging of DNS records is a setting that is enabled by default. |
|
Definition
False; you must enable them manually |
|
|
Term
How can you configure DNS records to be cleaned up after they have become "stale"? |
|
Definition
|
|
Term
What kind of zone enables host name to ip address lookup? |
|
Definition
|
|
Term
_____ is the process of removing DNS records that have not been refreshed or updated, which is normal when you, for example, remove a machine from the network. |
|
Definition
|
|
Term
This resource record maps services to the computer that performs them |
|
Definition
|
|
Term
SRV records can be verified from the command line by using this CL utility |
|
Definition
|
|
Term
Active Directory integrated zones have which kind of DNS updates? DDNS SDDNS Manual |
|
Definition
SDDNS - Secure Dynamic DNS |
|
|
Term
T/F When configuring updates and you check the box "allow both secure and non secure updates", you are essentially configuring the zone to allow nonsecure updates. |
|
Definition
True; Windows clients will always attempt to use non secure DNS updates before using secure updates, therefore no one will ever use secure updates. |
|
|
Term
In order to raise the domain functional level, you must be logged on as a member of the ____ ____ group. |
|
Definition
|
|
Term
In order to raise the forest functional level, you must be logged on as a member of the ____ ____ group. |
|
Definition
|
|
Term
To raise the forest or domain functional level, what snap-in would be used? AD Sites and Services AD Users and Computers AD Domains and Trusts |
|
Definition
|
|
Term
To implement a Server Core server as a DC, you need to run dcpromo from the command line and have an ____ ____ ready. |
|
Definition
answer file or unattended installation; Server Core does not support a graphical interface for AD's installation wizard, therefore this component is a requirement. |
|
|
Term
This type of DC only accepts replication. It does not perform outbound replication of any type. |
|
Definition
|
|
Term
T/F RODC's can be configured to allow or deny password caching in their domain. |
|
Definition
True; Passwords may be cached on RODC's for members of the Allowed RODC Password Replication Group. This group has no members by default. |
|
|
Term
T/F On RODC's, administrators can be configured as "local administrator" as opposed to being made a member of the Domain Admins Group. |
|
Definition
True; this feature is new to Server 2008 |
|
|
Term
What is the effect of typing regsvr32 schmmgmt.dll into a command line? |
|
Definition
It installs the Schema Management Snap-in |
|
|
Term
T/F AD LDS is considered lightweight because it does not need the components of AD DS (such as domain controllers, GPO's, or global catalogs). |
|
Definition
True; AD LDS is similar to AD DS in that they both support multimaster replication, ADSI / API (Active Directory Service Interface / Application Programming Interface), Application Directory Partitions, and LDAP over SSL |
|
|
Term
In order to create a cross forest trust, each forest must be able to resolve the DNS names and SRV records within the other forest. What three ways can this be done? |
|
Definition
This is done by using either secondary zones, stub zones, or conditional forwarders. |
|
|
Term
This type of trust is used when the other forest is a UNIX MIT Kerberos "domain" |
|
Definition
|
|
Term
To shorten the "tree-walking" process, you should conrfigure this kind of trust. |
|
Definition
|
|
Term
To configure a one way, non transitive trust, you would use a(n) _______ trust |
|
Definition
|
|
Term
You can use this command line tool to reset, create, delete, and verify forest trusts. |
|
Definition
|
|