File and Print
Configuring Group Policy
Intro Windows Networking
Configuring DNS
AD Infrastructure
100
In Windows Server 2008, the default limit for the number of simultaneous users is set to...
What is 16,777,216
100
This is use to prevent GPOs linked to parent containers from affecting child containers
What is Inheritance blocking
100
What is a network device that forwards communication packets from one network to another
What is a router
100
What creates a load sharing / balancing mechanism for servers that have identical services, such as two servers that host the same website
What is Round Robin
100
When enabled, this option causes the trusting domain to ignore any SIDs that aren’t from the trusted domain
What is SID filtering
200
In a Windows environment, the physical printer containing paper and ink or toner to which print jobs are sent is called...
What is print device
200
Under Password policies, what is the default maximum password age
What is 42 days
200
With this tool, you can create network connections, view the status of existing connections, and troubleshoot network problems.
What is Network and Sharing Center
200
You will want to use a forward lookup zone when you need a zone that...
What is contains records to translate names to IP addresses
200
A property of a forest trust in which all users in a trusted forest can be authenticated to the trusting forest
What is forest wide authentication
300
This is the maximum partition size that FAT16 supports
What is 2 Gb
300
What is a major drawback to enabling the auditing of object access
What is involves considerable overhead
300
A 32-bit dotted decimal number consisting of an unbroken series of binary 1s followed by an unbroken series of binary 0s
What is a subnet mask
300
True or False...Using a stub zone can result in faster recursive queries
What is True
300
A default property of a site link that makes it transitive
What is site link bridging
400
These are Jeremy's permissions Share permissions: Everyone - Full control NTFS Permissions: HRdept - Modify Jeremy - Deny Full Control What are his effective permissions
What is Deny Full Control
400
What subnode under Security Settings applies to wireless network policies
What is 802.11
400
The current implementation of IPv6 in Windows Vista and Server 2008
What is dual-IP layer architecture
400
A resource record containing an alias for another record is..
What is a CNAME
400
Which MMC is used to transfer the domain naming master operations role?
What is Active Directory Domains and Trusts
500
What is a reason to use volume mount points
What is Consolidate frequently accessed volumes, or Consolidate several shared volumes, or To avoid using a drive letter for a volume
500
What command can be used to perform tasks similar to those in Group Policy Results Wizard and the Resultant Set of Policy snap-in
What is gpresults
500
An 8-bit value; a number from 0 to 255 that’s one of the four numbers found in a dotted decimal IP address
What is an octet
500
What Best describes DNS
What is Hierarchical and distributed database
500
If you’re creating a shortcut trust between domains in different forests, this must exist first
What is forest trust