Sei sulla pagina 1di 2

IT222 Microsoft Network Operating System II

EX2 1

Examination Task EX2.0


Review Sheet

Instructions
1. 2. 3. 4. 5. 6. These questions are designed to reinforce the concepts discussed in this course. The examination will consist of 25 multiple-choice and true/false questions. Each question will be worth 2 points. Total value of the examination is 50 points. You will have 30 minutes to complete the examination. Good luck!

Questions
Chapter 7 1. 2. _________________ GPOs do not support folder redirection or Group Policy software installation. ____________ and ___________ are two domain GPOs created automatically when Active Directory is installed. In which order are group policies processed? Which setting on an individual GPO link will force a particular GPOs settings to flow down through the Active Directory without being blocked by any child OUs? What will block all policies from parent containers from flowing onto a designated container object, such as a site domain? _____________ and __________ are the two options available to Loopback processing when it is set to Enabled. Which managed setting cannot be defined or changed through Group Policies?

3. 4.

5.

6.

7.

Chapter 8 8. The final key component in defining Local Policies is planning and configuring __________ Policy for a Windows Server 2008 Active Directory network. The ______________ policy is set to audit successes in the Default DCs GPO.

9.

10. Which folder is not subject to a folder redirection policy? 11. Which command-line tool is used to manually refresh Group Policy? 12. What is not a subcategory of Local Policies that pertain to the local computer?

Examination review questions continue on the next page

EX2 2

Examination Two Review Sheet

Chapter 9 13. The __________________ tab in the package Properties window enables you to change the default name of a package. 14. ____________ and ___________ are two methods available in a Group Policy to deploy software packages. 15. Which of the four rule types can be defined within a software restriction policy? Chapter 10 16. When the _____________ tab is activated, an HTML report is generated, which enables administrators to view GPO settings that do not have the original default values. 17. WMI filtering method uses filters written in the _______________. 18. Which command-line tool provides comprehensive information about the operating system, the user, and the computer? Chapter 11 19. Which command-line utility enables you use to perform an authoritative restore after performing a nonauthoritative restore? 20. Which command-line tool can check replication consistency between replication partners and controllers? 21. ___________________ is a manual process that defragments the Active Directory database in addition to reducing its size. 22. Active Directory writes transaction data to a log file called __________ before it is written to the NTDS.dat database. 23. To restore an accidently deleted object or container within Active Directory, you need to perform ___________________ restore. 24. __________________ is a new command-line and task-based scripting technology included with Windows Server 2008. 25. An authoritative restore will mark the object or container as the authoritative source and will, by default, increment the versionID of the object or container by _____________.

Potrebbero piacerti anche