Dovetail Dumps Latest Phase2
Dovetail Dumps Latest Phase2
Dovetail Dumps Latest Phase2
24.How many classes of IP addresses are in use?No – Three class of IP was in use Class A,B & C
25.Abbreviate IMAP?Internet message access protocol
26.Which network topology provides multiple, redundant links?Mesh Topology
27.What is the default protocol used on the Internet?TCP/IP
28.Which network device has the capability of amplifying and regenerating network signals but has no capability of
routing or segmenting?Transciever
29.You are upgrading from a peer-to-peer network running NetBEUI to a client-server server network running
TCP/IP.Remove NetBEUI from all stations
30.Which of the following is used pass the packets between networks?Bridges
31.Digital signatures for email messages are encrypted hash values that digitally sign the email to verify the sender
What is the signing part of the process?---Encrypting the message digest with someones private key
32.What is the signing part of the process?By certifying the SSL while accessing the URL.
33.Specify the characteristics (For example: speed, length, topology and cable type) of the following cable
standards:1000BASE-SX and 1000BASE-LX
34.Which of the following can be used to print % to the screen?printf("\\%")
35.In an 802.11 wireless LAN, what term is used to describe the wireless network name?? SSID
36.Which wireless technology supports both line-of-sight (LoS) and non-LoS connectivity?WiMAX
37.The IEEE 802.16e standard supports frequencies in what range?2-11 GHz (3.5 GHz in Europe)
38.What is the most effective technique of minimizing battery drain by a laptop's wireless Mini-PCI.?A. Remove
the Mini-PCI card when you do not require network access
39.Which of the following describes the number of pins Associated with Dual Inline Memory Modules (DIMM)-
Select Two---3 ( 168 and 184 pin )
40.Which of the following could be used for connecting a mouse to a computer- (Select Any Three)PS/2, Serial
port ( com port)
41.Which of the following are the windows configuration files?INI Files & System Registry
42.Which of the following is used to Automate IP configuration of Network hosts?DHCP
43.Which of the following provides the name resolution on the Internet? DNS
44.If you want to prevent users from using access points on your wireless network?WEP (Wired Equivalent
Privacy)
45.You suspect that someone is connected to your computer without authorization. Which utility may give an
indication of what is going on? NETSTAT
46.Which of the following devices is used to connect a T1 line? CSU/ DSU
47.What is the default port number for Telnet connections? 23
48.Which of the following allow NETBIOS to IP address resolution? LM-Hosts amd Wins
49.Which of the following technologies is used to dynamically assign IP addresses to a client?DHCP
50.Which of the following uses a public key to encrypt and a PKI
51.Which will convert the hostname to the IP address??? –DNS
52.When you give a document to print and remove the printer cable, will the
printer still print?? Yes because the file will go the printer spool.
53.Which of these will refresh at regular intervals?? DDRAM
54. How many bits does IPv6 address contain? 128 Bits
55.Which of the following is the correct boot sequence?
POST->MBR->……..->LSASS.EXE->WINLOGON.EXE
56.Which of these profiles cannot change the desktop settings?Mandatory
Profile
57.. What is 802.11 series standard representing?? Wi-Fi
59.If NTLDR corrupts, whether the boot sector will be corrupted or not? yes
60.Which user can login and shut down a client machine? Guest
61.You play a game and after it, your icons larger in size than before. What is the
1st step you will do to resolve it?change screen resolution
62.Which of the below options are used to open display properties? All
2. Unguided Media/unbounded---wireless(802.11)
MAGNIFICATION DECREASE(CTRL-)
Tracking: Follw mouse cursor, follow keyboard focus, follow text editing
73.Which options do not you find in the Driver Digital Signing menu?Prompt
75.In which generation of computer you will use transistors and magnifiers?2nd
Generation
76.When you are accessing mails through OWA, what is the folder that you can’t
access?Public Folder, PST
77.When you switch on the PC ,if you get 2 beep sounds what will be the fault?
79.In the transport layer what are the steps performed to transfer the packets.
91.Is it possible to change the icon display in the home screen of BB? - Yes
92.When the system restarts there is continuous beep sounds, in which module
could be the fault? – Memory
111.A small hand held device which is used to move the cursor on the screen?
Mouse
117.Where is " enable hibernation " option present in Display option? Screensaver
Ans %systemroot%\NTDS
Ans 802.11n
135.. Driver roll back could not be done if u try to replace a new driver to fix the
issue. True/false
Ans true
138..What is the general term used for keyboard , mouse , scanner etc?
Ans : Input
Ans: keyboard
Laptop
a. Handheld device
b. Desktop
c. PDA
142. You get the error “ hardware not found “ despite the fact that it is connected.
What you will do?
143.When you power off the computer which memory is not affected?
Ans: ROM
d. Etc
146..If you delete a mail from the mailbox of lotus notes. How long it will remain in
the trash folder?
a. 24 hrs
b. 48 hrs
c. 2 min
Ans: 32 bits
a. Ctrl+O
b. Ctrl+A
c. Ctrl+F
d. Ctrl+M
e. Ctrl + I
149.What is BSOD?
Ans: RJ- 45
a. Microsoft wizard
b. Windows wizard
a) Network layer
b) Session
c) Data Link
155.The size of IP address?: 32 bits for ipv4 and 128 bits for ipv6
159.If a particular driver is suspect you should roll back to the original driver before
u try to install a new one.Is it True or False ans: True
160.If u are a power user and u want to view the devices that are not connected to
the computer what should u do?
161.If the user should not want to change password, what option is selected?
Ans: User cannot change password
163. What are the steps to rename user accounts in Windows Exchange Server
2003? – Go to ADRight click on user accountpropertiesaccount profile
(change the name there)
168.To read and write information on the disk what is used? Disk drive
174.What access can be given to modify the account in Exchange server 2003?
176. What is the primary function of DNS server? Primary source for Domain
Name to IP Address resolution
177 The most basic tasks of DNS is to translate hostnames to IP address – True or
False
178.Which layer in the Active directory is present according to the OSI reference
model? Network layer
180 Can FAT 32 be converted to FAT 16?- Yes Using tools like Partition Magic
(Again FAT32 – can have max disk size as 32 GB but FAT 16 Cant – You
will loose disk space – Personal experience – I lost my Ipod shuffle
because of this)
181.What are the steps to convert FAT 32 to FAT 16? - Start > run > type
"Format I: /FS:FAT" without quotes >I< for your drive :)
183. Is the create password reset disk available in Win XP? Yes – But it can be
used only on the computer it was created
184.Type of trust which allows the users to access resources in unidirectional way
to create a forest root domain? - a one-way trust
187.Which info contains in system state backup info stored in Public folder? AD,
IIS Metabase, System Registry
190 Which domain functional level support only win2003? – Windows 2003
Mode
196.In which hierarchy AD forest is built?a. Down top b. Top Down c.Forest
197.Which of the following in exchange server 2003 allows you to create a public
folder?
b. OWA
c. ESM
d. None
a. Forward look up
b. Dummy DNS
c. Naming Schema
d. Reverse look up
c. Mixed mode
d. Native mode
200.If there is no boot in PC? First what will you check. – Power Supply
205.DSL/Cable handle
c. Installation of firewall
d. Installation of routers.
a. Ipconfig/All
b. Ipconfig/ Show
c. IP config
d. none
a) 10
b) 9
c) 2
d) 1
a. Harddisk of DC
b. forest
c. tree
d. local system
a. Hide all
c. none
d. Hide me.
215.What are the 3 common types of virus? – Virus, Trojan Horse, Worm
216.What is the default backup tool used for back up exchange server data?
- NTBACKUP
220.For a user the system is not working for a particular days at specified
time. What could be the troubleshooting step? - Parental Control
Option is used in Windows Vista (Enabling and disabling work
time of the computer)
Add appropriate accounts, and then clear or select the Allow check
box for create top-level public folder permission
226.What is the logical component that lets you to link together multiple
domain trees in a hierarchical arrangements Forest
227.what is the first domain in any enterprise and it shall be the most
important domain to your forest structure Forest Root
228.what is the first domain created in a logical hierachyThe root of an AD
forest
233.what are the relevant levels of domain functionalities mark them all
Win server 2000 Native Win server 2003 Win server 2003 Interim
Win server 2003
254.which is the default domain functional level and most flexible in terms
of adding domain controllers Mixed mode
255.which domain function level allows the addition of Win2000 and win
2003 domain controllers? Windows 2000 native
260.What type of trust provides users in the currect domain and users in
the target domain can access resources in both domainsTwo way trust
261.what type of trust provides users in target domain will not be able to
access any resources in this domain but users in the current domain will
be able to access resources in the target domain one way trust
264.When the mouse does not work what is the first step you take to resolve the
issue?
a) Power cord.
b) Air conditioning
c) UPS
D) CPU
269.You use an Ethernet card which is not a plug and play device and you are not
able to use it because of resource clash what will u reset in order that the card
works ?
a) MAC address
B) Communication protocol
C) Memory
d) Mother board settings
270.What are the protocols supported by VPN? – PPTP, L2TP and IPSec
271.How will u create a mail store policy? - System manger > Admin Group >
System Policies > Rt Click > New Mail store Policy
A service pack (in short SP) is a collection of updates, fixes and/or enhancements
to a software program delivered in the form of a single installable package. Many
companies, such as Microsoft or Autodesk, typically release a service pack when the
number of individual patches to a given program reaches a certain (arbitrary) limit.
Installing a service pack is easier and less error-prone than installing a high number
of patches individually, even more so when updating multiple computers over a
network.
274..How will u raise the domain functional levels? – Rt Click on the domain ->
Raise Domain Functional level
A) normal
b) Incremental
c) Differential
d) Copy
278.in which domain controller functional level can windows server 2000 and
windows server 2003 work - Win server 2000 native
279.What are the steps to verify that Exchange server recognizes that an online
back has been done? – Check the database tab and find when the last
backup took place.
280.What are the steps to configure the ESM to display the administrative groups?
– System Manager > Rt Click on Your exchange server > Properties >
Display Administrative Groups.
281.What is the reverse look up process? – IP address to Hostname
283.. File system that allows File and Folder level permission?
a. Fat 16
b. Fat 32
c. NTFS
d. Fat
284.What type of trust configured between 2 domains provides a one way access?
i) 2 way external
ii) Internal
iii) Simple
A. database logs
B. transactions logs
A. .mdb files
B. .edb files
c. .ist files
A. 650
b. 1000
c.1024
d. 500
290.28. What is DSL..?Ans. Digital subscriber line
293.I’m running Windows 2000 and am getting disconnected when trying to log on
to the VPN. What is most important step I need to perform..?
Note: (Also check Port 1723 and 47 are open for PPTP (Pont to Pont
tunneling protocol) Port 1701 is open for L2TP (Layer 2 Tunneling
Protocol)).
Ans. The lowest layer at which a firewall can work is layer three.
Ans. Star
Ans. TCP/IP
299. Which network device has the capability of amplifying and regenerating
network signals but has no capability of routing or segmenting?
Ans. Repeaters
303.If you want to prevent users from using access points on your wireless network?
Ans. WEP (Wired Equivalent Privacy)
304. Which of the following devices is used to connect a T1 line? Ans. CSU/DSU
305.What is the default port number for Telnet connections?Ans. 23
306.Which of the following allow NETBIOS to IP address resolution?
Ans. LM Hosts and WINS.
307.What of the following file system for file and folder level permission? NTFS
308.Choose one of the following steps to resolve the Winsock error? - Netsh Winsock
Reset command and Restart computer for changes to take effect.
309.VPN connections provide end – end security and doesn’t provide security
between the client and VPN server – True or False - True
310.Exchange server 2003 routing groups can be connected to another.
b. Using SMTP ( if you want the routing groups to use only SMTP
protocol)
311.Domain function level s/p only win NT 4.0 & win 2003 server DC
a. Mixed mode
b. Win 2003
313.Domain function level allows addition of win 2000 and win 2003
DC’s
315.What will you do when you get an error message “Invalid media type”
a. Chkdsk
b. Command.com
c. Format
d. Diagnostic
a. Forests
b. Servers
c. Domain Controllers
d. WAN link
317.You are about to install second IPE which has only one adaptor. Your first
hard drive will still be boot drive.
a. As a secondary
b. As a master
c. As a slave
d. As a primary
a. General
c. Logon
d. Recovery
b) In the result pane, select the server from which you want to
remove the storage group.
c) In the work pane, select the storage group that you want to
remove, and then click Remove
321.What hardware and software will support plug and play concept?-
Peripheral motherboard device
a. Wirelessly
b. Coaxial
c. Ring cable
d. Twisted pair
329.The system shows less memory than actual memory. How to fix it? ADD RAM to it
a. 16
b. 64
c. 32
d. 8
331.What is the usage of chkdsk command? - In Windows XP you can perform error checking
on hard drives by using the chkdsk.exe command line utility.
335.Packet filtering is needed in order to enhance security of VPN server – True or False
a. None
d. Installation cd
337. How do you create a public folder?
a. None
d. Installation cd
338.Which of the following in exchange server 2003 allows you to create a public folder?
b. OWA
c. ESM
d. None
339. If there is no boot in PC? First what will you check. – Power Supply
a. Hide all
c. none
d. Hide me.
a. Deletion limit
b. Age ( But remember the age by default is 0 days unless you specify it in the
Information Store level)
c. Detail section
d. None
344. Normal size of hard drive sector? - A sector is the smallest physical storage unit on
a disk, and is almost always 512 bytes (0.5 kB) in size.
Ans: B and C
349 The possible reasons for Fan working inside the CPU, when system boots
Ans: System manger > Admin Group > System Policies > Rt Click > New
Mail store Policy
Ans: Right Click on the domain -> Raise Domain Functional level
356.19. What are the steps to configure the ESM to display the administrative
groups?
Ans: System Manager > Rt Click on Your exchange server > Properties >
Display Administrative Groups
360You are about to install second IPE which has only one adaptor. Your first hard
drive will still be boot drive.
a. As a secondary
b. As a master
c. As a slave
d. As a primary
361. What hardware and software will support plug and play concept?-
Peripheral motherboard device
b. Using SMTP
d. X.400 connections
364.1. Which is the correct step for 2000 perform AD restore operation?
365.1. Which of the following are new facilities included in Win SP3 that are not
included in SP2?
Dmadmin.exe
a. 16
b. 64
c. 32
To clean the Bad sector of the disk and replace with new blocks and
clear orphan files and folder.
369.1. How to create users account in Win XP?In Computer Management (i.)
Right Click the user and groups(ii.) Create New user
a. Down top
b. Top Down
c. Forest
d. Tree
371.1. Which of the following will connect a cable modem to a wireless router?
a. Coaxial
b. Wirelessly
c. Cat5 cable
d. Serial
372..1. What type of trust configured between 2 domains provides a one way
access?
a. 2 way external
b. Internal
c. Simple
a. None
d. Installation cd
374.Default domain functional & most functional interim of DC
b. win 2003
c. Mixed mode
d. Native mode.
376. Mouse stops working even after restarting the machine. ? What will you check
first?
Connection at rear side of the system for PS/2 and the driver will be
updated
c. Installation of firewall
d. Installation of routers.
a. Hardware of DC
b. forest
c. tree
d. local system
a. Deletion limit
b. Age
c. Detail section
d. None
Authoritative restore – Running NTDSUTIL after the restore updates the USN (Updated Sequence Numbers) to
be greater than any other member domain controller to which the machine formerly replicated. This will cause the
restored domain controller to replicate its Active Directory information to all other domain controllers.
Non-Authoritative restore – A restore overwriting the System State to the point at which it was backed up. A Non-
Authoritative System State restore is usually done when there are other domain controllers on the network
responsible for replicating the Active Directory changes to systems with older Updated Sequence Numbers.
Primary restore – A Primary restore is performed when no other domain controllers are present on the network.
This type of restore can also be used when the machine is the only functioning server in a replicated data set
What all should you check when you install Exchange Server?
• Make sure all domain controllers in the forest are Global Catalog servers and
are running current service packs and patches.
• Before beginning installation or migration make sure there are no existing
Exchange organizations or ADC CAs have been created. The easiest way to
check this is by installing Windows 2000/3 Support Tools and looking at the
properties of the Administrators of the domain using the ADSIEdit tool. If one
of them has the property "proxy addresses" then ADC or Exchange setup has
been run before.
IP spoofing?
A technique used to gain unauthorized access to computers, whereby
the intruder sends messages to a computer with an IP address indicating
that the message is coming from a trusted host. To engage in IP spoofing, a
hacker must first use a variety of techniques to find an IP address of a
trusted host and then modify the packet headers so that it appears that the
packets are coming from that host.
Adam Tech PCA Series Flexible Printed Circuit (FPC) and Flexible
Flat Cable (FFC) connectors are ZIF (zero insertion force) designed to
be a fast easy method to make a reliable connection of flexible printed
circuits to a PCB
(To verify that Exchange recognizes that an online backup was performed follow these steps:
1. In Exchange System Manager, browse to Administrative Groups\First Administrative
Group\Servers\servername\First Storage Group\Mailbox Store (servername) (as always,
use your own path...)
2. In the console tree, right-click either the Mailbox Store or the Public Store, and then click
Properties.
3. In the store properties dialog box, click the Database tab.
4. On the Database tab, in the Time of last full backup box, verify that the time of the backup
you just performed is recorded, and then click OK.)
1. Difference between Window SP and SP1 (Service Pack 1)? In SP1 – USB 2.0, .NET
framework, default programs and access rights etc
Microsoft occasionally releases service packs for its windows OS to fix problems and
add features. Each service pack is a superset of all previous service packs and patches
so that only the latest service pack needs to be installed, and also include new revisions.
Older patches need not be removed before application of the most recent one
Windows XP Service Pack 2 provides tools to easily view, understand, and control the
security aspects of the computer. It includes changes in the operating system related to
computer and network security
BLACKBERRY
1.How to soft reset a black berry?? -– ALT + CAP + DEL.
a. D
b. W etc
9.Which Primary tool is used to access alternative characters and functionality in the
BlackBerry keyboard? Alt
10.Begin Call and End call keys are available only in 7100 Series
11.Which are the five main components that can appear in a BlackBerry application?
Menu,List,Button,Choice,Edit.
14.How do you make a phone call?1.By SendButton Phone 2. Icon on Home screen
(BY USING 1 and 2)
1.what is the logical component that lets you to link togeather multiple domain trees in a heirachial
arrangements Forest.
2.what is the first domain in any enterprise and it shall be the most important domain to your forest
structureForest Root.
3.what hierachy does the Active directory Forest is built TOP DOWN
5.what option is selected to create a child domain is initially created theough the wizardChild domain in an
existing domain tree
6.what option has to be selectd to create a forest root domain domain in a new forest
7.Steps to create application Data partitionopen command prompt -> type NTDSUTIL -> at the prompt typre
DOMAIN MANAGEMENT -> type CONNECTION -> type CONNECT TO SERVER < SERVER NAME >
after confirmation type QUIT
9.what are the relevant levels of domain functionalities mark them all
1. Win server 2000 Native 2.Win server 2003 3.Win server 2003 4.Interim Win server 2003
10.which is the default domain functional level and most flexible in terms of adding domain
controllers.Windows 2000 mixed mode
11.which domain function level allows the addition of Win2000 and win 2003 domain controllers Win server
2000 Native
12.which domain function level supports only win NT 4.0 and win 2003 server domain controllers Win
server 2003 Interim
13.the domain functional level supports only windows 2003 domain controllers?Win server 2003
15.how do we change the forest functional level?admin tools -> open active directory domain and
trust -> rightclick the root level active directory domain and trust node and chose raise forest
functional level from the context menu .
16.what is used to establish a trust relationship between two domains in different forest od between 2
win2k domains and an external windows 2000 or NT4 domain?two ways for an External trust two way
trust
17.What type of trust provides users in the currect domain and users in the target domain can access
resources in both domains? Two way external trust
18.what type of trust provides users in target domain will not be able to access any resources in this
domain but users in the current domain will be able to access resources in the target domain?
oneway incoming for external trust
19.what type of users in the current domain will not be able to access any resources in the specified
domain but the taret domain will be able to access resources in the current domain?
oneway outgoing to trust uses from other domains
20.Steps to install DNS?Start-> Control panel -> Add remove programs -> add components -> select
n/w series -> select DNS -> complete the wizard
21.what way is the DNS server configured if it resolves Ipaddress from NetBios Name
Forward Lookup
23.what does the Active directory consists select all that is applicable?
Domain Data Cofiguration Data Schema Data Applicable Data
24.what are the ways you can posibly implement & configure DNS select them all
Forward Lookup Reverse Lookup
25.what way is the DNS server configured if it resolves NetBios Name from Ipaddress Reverse Lookup
26.What s recommended method of restoring and backing up Active directory Data base?System State
Data
27.steps to perform Active Directory restore operation ?Open backup utility -> advance mode link on the
backup restore -> start restore button- > click OK
NORMAL
MS WINDOWS 2003 ACTIVE DIRECTORY
1. What is the name of the File used to store Active directory data on the hard disk?
2. What is the file system used on which active directory can be installed?
3. What is the protocol used for communication between clients and directory
services?
6. What are the 2 shared folders that are created automatically after the installation
of Active Directory
7. Which of the following component of Active Directory is not shared by all domain
in an Active Directory Enterprise
9. Which is not the way to uninstall Active Directory from Domain Controller
10. Which of the full group can administer any and all domain in a forest enterprise
11. You want to implement a (GPO) Group Policy Object that will distribute the latest
service pack you are thinking about distributing the GPO to an active directory
object what are your choices ( Choose all that applies )
12. You have several branch office connected by slow WAN links what should you do
to reduce the Actrive Directory Replication traffic between sites.
C. place only one domain controller at the main office so that there will be no
replication traffic
13. To combact random password hacking you decide to implement a GPO that will
be used to set an Account Lockout Policy to lockout access after 5 successful
attempts on which active Directory Object will you link this policy
D. The forest no matter how many domain every logon to active directory
access in the context to the forest
15. The components making up Active Directory can be Broken in to 2 what are
they
C. Trees & OU
16. What are the uses of Physical componects used in Active Directory
A. Provides General purpose command line tool can perform variety of functions form
managing Active Directory.
A. Local & Domain B. Local & Server C. Administrator & Power D. Guest & Back Up
C. human identify
A. User name & Password B. Firstname lastname password C. first name & password
21. What kind of rights you need to create a local user account
A. Admin rights for the local machine B. Backup operator C. power users D. guest
B. rightclick on the group and add new user account name verify details
24. Which group users will have complete control over the computer
25. Which group users can access the server from the network log on locally and shutdown the system
26. Which group members can make changes to TCP/IP and can release renew ip address
B. Right click mycomputer -> hardware ->computer management -> expand the system tools
node and select local users & groups -> rightclick group folder & create new group
C. Start-> all programs->Administrator tools ->Active directory wizard and follow the instructions
A. Right click on the group and select add user B. write a script in pearl C. it is done
automatically
29. How do you modify membership of a group after it has been created
A. open group folder -> right click group -> select add to group -> click add button below
the member section and select users to the group and click OK
30. What option you select to force the user to change his pasword the next time they log on
A. User muct change password at next logon B. Tell the user verbally
31. What option you select to not allow the users to change their password
A. User cannot change password B. Tell the user verbally C. send him a official mail
D. tell him in the induction
32. What option do you select to enable or disable users account? ANS Account is Disabled
33. When "Password never expires " is selected what is the option that is automatically enabled
A. Smartcard is required for interactive logonB. No options are enabled C. password expiry date
34. If the user access more than one computers on the network what profile should be created
35. If the user sees their personal desktop settings any where he logs on to the network what kind of
profile does he have
36. What profile will be created when the user is not allowed to save any setting on the desktop?
A. Start -> all programs -> admin tools -> active directory users and computers -> user
folder to display the user in AD -> right click user -> select properties -> open properties
dialog box -> click on profile tab and enter c:\profiles %username% in the profile path->
click apply and close -> restart
C. Start-> all programs->Administrator tools ->computer management -> expand the system tools
node and select local users & groups -> right click user and type change
D. 1 & 3
A. Navigate to the user subdirectory of the documents fna settings and rightclick on the
NTUSER.DAT file and rename the file to NTUSER.MAN
39. Users are able to do the changes to their desktops settings and preferences but the changes are lost
when the user logs off from the machine what kind of profile does the use have
40. How do you set mandatory profile to a group of users so that they would get the same settings
A. Apply mandatory profile to the group B. write a script in pearl C. cannot be done
D. change all user profile individually
A. right click user name in AD users and Computers -> Select Rename
B. right click user name in AD users and Computers -> delete and recreate
C. right click user name in AD users and Computers and move the existing user to thrash before
renaming and rename D. all the 3
A. Settings for password history B. user cannot change password C. password never
expires
43. What does "Maximum password Age” mean ANS : Defines how long a user can use certain
password untill needs a change
44. How are computers identified in the domain controller ANS : Computer accounts
A. Right click on the computer folder -> select new computer -> enter name of the computer ->
finish
B. write a script in pearl C. Follow the server maintenance wizard D. should be done at
the time of AD installation
47. The tool utility that is used to perform a wide range of admin tasks mostly related to managing
computer accounts
A. launch AD users and computer -> select user u wish to move -> right click on account
and choose move from the context menu -> choose folder or OU that will be the new
resident and click Ok
B. Rightclick on the computer folder -> select new location for computer -> enter name of the
computer -> finish
50. which of the following are the logical component of AD mark them all
D. Numerology
53. Which of the following objects are stored in a domain mark them all
54. What is the logical component that lets you to link togeather multiple domain trees in a heirachial
arrangements
55. What is the first domain in any enterprise and it shall be the most important domain to your forest
structure
58. What option is selected to create a child domain is initially created through the wizard
D. none of these
A. open command prompt -> type NTDSUTIL -> at the prompt type DOMAIN
MANAGEMENT -> type CONNECTION -> type CONNECT TO SERVER < SERVER NAME >
after confirmation type QUIT
62. What are the relevant levels of domain functionalities mark them all
63. Which is the default domain functional level and most flexible in terms of adding domain controllers.
64. Which domain function level allows the addition of Win2000 and win 2003 domain controllers
65. Which domain function level supports only win NT 4.0 and win 2003 server domain controllers
A. Admin tools-> open AD domain trust MMC-> select the domain in your forest for which
you have to raise functionality -> right click select raise domain functionality -> and click
Raise
B. cannot be done
A. admin tools -> open active directory domain and trust -> right click the root level active
directory domain and trust node and chose raise forest functional level from the context
menu.
B. cannot be done
69. What is used to establish a trust relationship between two domains in different forest od between 2
win2k domains and an external windows 2000 or NT4 domain
A. External trust
B. Simple Trust
C. Internal Trust
D. Do not Trust