Correct Answer
verified
View Answer
Multiple Choice
A) Changes to a domain partition on a domain controller are only replicated to domain controllers within the same domain.
B) The largest section of the Active Directory database is the configuration partition.
C) Schema partitions store the structure and layout of the forest, including the names of each domain and their trust relationships.
D) If any change is made to a configuration partition, the change is also replicated in the schema partition.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) An organization that subscribes to Office 365 services
B) An organization that has a substantially onsite workforce
C) An organization that uses IIS as a web server
D) An organization that deploys Internet accessible services, such as FTP or DNS
Correct Answer
verified
Multiple Choice
A) He can restrict the number of domain controllers to one per site.
B) He can increase the number of domain controllers to spread the replication load.
C) He change the bridgehead server to one with a faster network interface.
D) He can use SMTP instead of IP to improve performance.
Correct Answer
verified
Multiple Choice
A) When new domain controllers are added to this network, they will be added to NewYorkSite by default.
B) Assigning an IP address to a site indicates that domain controllers within this site contain the global catalog.
C) Anahira will not be able to install or use Simple Mail Transfer Protocol (SMTP) to perform Active Directory replication.
D) This restricts the creation of bridgehead servers, and only NewYorkSite will contain bridgehead servers.
Correct Answer
verified
Multiple Choice
A) She should create the Domain Naming Master role on DC2.
B) She should create the Infrastructure Master role on DC1.
C) She does not need to create the Domain Master role because DC1 contains a copy of the global catalog.
D) She does not need to create the Infrastructure Master role because the forest contains multiple domains.
Correct Answer
verified
Multiple Choice
A) Zero
B) One
C) Two
D) Three
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Universal Group Membership Caching
B) User Principle Name
C) Selective authentication
D) Distribution groups
Correct Answer
verified
Multiple Choice
A) Shut down all RODCs
B) Create a new RODC
C) Disable user accounts in the branch office
D) Delete the RODC computer account
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) Unlike forest functional levels, you can revert to a previous domain functional level after it has been raised.
B) It represents the oldest Windows Server version that can be used on a domain controller.
C) A server containing Windows Server 2016 cannot run on a domain at the Windows Server 2019 functional level.
D) It applies to domain controllers, clients, and other servers that are present in the domain.
Correct Answer
verified
Multiple Choice
A) Universal Group Membership Caching
B) Flexible Single Master Operations
C) Role seizure
D) User Principle Name
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Update the clients that are running Windows 7 to Windows 10
B) Update the servers running Windows Server 2008 R2 to Windows Server 2019
C) Update all the domain controllers running Windows Sever 2012 to Windows Server 2016
D) Revert the domain functional level of each domain in the forest to Windows Server 2016
Correct Answer
verified
Multiple Choice
A) The stolen computers can rejoin the domain after resetting their passwords.
B) Any computers that were not stolen will need to rejoin the domain.
C) Shania does not need to delete the stolen RODC computer account if the other computer accounts are reset.
D) The Active Directory database on the stolen RODC is deleted automatically.
Correct Answer
verified
Multiple Choice
A) Petra.T will not be allowed to log in to the system because the global catalog server is not available.
B) Petra.T will be allowed to log in and access resources across the domain.
C) Petra.T will be locked out of their account until the domain controller can access the global catalog.
D) Petra.T will be allowed to log in to the system with cached credentials.
Correct Answer
verified
Showing 1 - 20 of 36
Related Exams