Searching for "domain."

Q:

You are preparing to install Certificate Services for the first time on your Windows 2000 network. You plan to install Certificate Services on a Windows 2000 Server computer that is a member of the domain. You want the certification authority (CA) to be able to use Active Directory. Which CA type should you select when you install Certificate Services? 

A) Enterprise root CA B) Enterprise subordinate CA
C) Stand-alone root CA D) Stand-alone subordinate CA
 
Answer & Explanation Answer: A) Enterprise root CA

Explanation:

Select Enterprise root CA if you're installing the first certificate server in the forest. This type of CA requires the use of Active Directory.

Report Error

View Answer Report Error Discuss

Q:

You want to move the Philadelphia OU from the acme1.com domain to the acme2.com domain. Which tool should you use?

A) MoveTree.exe B) The move command -line utility
C) Server Extensions Administrator D) Active Directory Domains and Trusts
 
Answer & Explanation Answer: A) MoveTree.exe

Explanation:

Use MoveTree.exe to move Active Directory objects from one domain to another.

Report Error

View Answer Report Error Discuss

Q:

You want to create a Group Policy Object (GPO) that will be associated with a specific domain. Which tool should you use?

A) Domain Security Policy B) Domain Controller Security Policy
C) Active Directory Users and Computers D) Active Directory Sites and Services
 
Answer & Explanation Answer: C) Active Directory Users and Computers

Explanation:

You can use Active Directory Users and Computers to create a GPO that will be associated with a specific domain or OU. If you are creating a GPO that will be associated with a site, you should use Active Directory Sites and Services.

Report Error

View Answer Report Error Discuss

Q:

You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?

A) When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database. B) When you rename the root domain server you will simply rename the child domain also.
C) When you rename the root domain server you will lose the entire network orphaning the child domains. D) When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name.
 
Answer & Explanation Answer: C) When you rename the root domain server you will lose the entire network orphaning the child domains.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You share a folder named Research. A user named User1 reports that he cannot access files in the Research share. You confirm that the Domain Users group is granted the Change permission for the Research share. You run the Cacls command as shown in the exhibit:

You need to ensure that User1 can modify files in the Research share. You must prevent User1 from modifying permissions for the Research folder. To which group should you add User1?

A) Administrators B) IT
C) Research D) ResearchManagers
 
Answer & Explanation Answer: D) ResearchManagers

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). You install and configure Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy Object named GPO1 that enables automatic updating. You link GPO1 to the domain. You need to ensure that each client computer obtains software updates from Server1. What should you do?

A) On each client computer, run Gpupdate /Force. B) On each client computer, run wuauclt /detectnow.
C) From GPO1, configure the Enable client side targeting setting. D) From GPO1, configure the Specify intranet Microsoft update service location setting.
 
Answer & Explanation Answer: D) From GPO1, configure the Specify intranet Microsoft update service location setting.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do?

A) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type. B) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
C) On each Web server, open the Security Configuration and Analysis snap in, analyze the computer, and then export the settings. D) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
 
Answer & Explanation Answer: B) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?

A) Examine the System Event Log on the user's computer. B) Examine the System Event Log on both domain controllers.
C) Examine the Security Event Log on both domain controllers. D) Examine the Application Event Log on the user's computer.
 
Answer & Explanation Answer: C) Examine the Security Event Log on both domain controllers.

Explanation:
Report Error

View Answer Report Error Discuss