Chapter 35. Practice Tests

Comprehensive Test

  1. Which of the following are the three basic roles of Windows 2000 Server computers? (Select two answers.)

    1. Primary domain controller

    2. Backup domain controller

    3. Domain controller

    4. Member server

  2. You have just installed a new Windows 2000 Server computer as a domain controller for a new domain in an existing Active Directory forest. Which of the following roles will be assigned to this server by default? (Select all that apply.)

    1. Schema master

    2. Domain naming master

    3. Relative ID master

    4. PDC emulator

    5. Infrastructure master

  3. Which of the following services use clear-text authentication? (Select all that apply.)

    1. Telnet

    2. FTP

    3. PPTP

    4. SLIP

  4. Which of the following is a dial-up service designed for high volume and centralized accounting?

    1. RAS

    2. RRAS

    3. RADIUS

    4. PPP

  5. Which of the following certificate authorities require Active Directory? (Select all that apply.)

    1. Standalone root CA

    2. Standalone subordinate CA

    3. Enterprise root CA

    4. Enterprise subordinate CA

  6. Which of the following is used by clients to request a certificate from a CA?

    1. Certificate Authority Manager

    2. MMC

    3. A web browser

    4. An email program

  7. Which of the following Windows 2000 features is incompatible with EFS?

    1. NTFS

    2. File compression

    3. File sharing

    4. Certificate Services

  8. Which of the following are the two modes Windows 2000 Terminal Services can operate in? (Select two.)

    1. Remote administration mode

    2. RIS mode

    3. Application sharing mode

    4. Thin client mode

  9. Which of the following are Windows 2000 VPN protocols? (Select all that apply.)

    1. PPTP

    2. SMB

    3. PPP

    4. L2TP

  10. Which of the following refers to Microsoft’s implementation of RADIUS?

    1. RAS

    2. IAS

    3. SMB

    4. PPTP

  11. Which of the following is Windows 2000’s standard authentication method?

    1. LM

    2. NTLM

    3. Kerberos

    4. Certificate authority

  12. Which of the following operating systems support NTLM? (Select all that apply.)

    1. Windows 3.1

    2. Windows 98

    3. Windows NT 4.0

    4. Windows 2000

  13. Which of the following is required to allow a new Macintosh computer to access shares on a Windows 2000 server?

    1. File Services for Macintosh

    2. AppleTalk protocol

    3. Both of the above

    4. None of the above

  14. Which of the following protocols is used for encryption between web servers and clients?

    1. NTLM

    2. SSL

    3. IAS

    4. EFS

  15. Which of the following certificate types are used to authenticate outside organizations or individuals? (Select all that apply.)

    1. Standalone root CA

    2. Standalone subordinate CA

    3. Enterprise root CA

    4. Enterprise subordinate CA

  16. Which of the following operating systems use case-sensitive passwords by default? (Select all that apply.)

    1. Windows 3.11

    2. Windows 98

    3. Windows NT

    4. Windows 2000

  17. You are designing a smart card login solution for your Windows 2000 network. You have already bought the smart cards and the readers and installed Certificate Services. What else must you do before you can begin using smart card logins?

    1. Make sure the Enable Ctrl-Alt-Del policy is set

    2. Make sure the Disable Ctrl-Alt-Del policy is set

    3. Make sure the Require Ctrl-Alt-Del policy is set

    4. None of the above

  18. What is RADIUS commonly used for?

    1. Dial-up authentication with an ISP

    2. Dedicated T1 or cable authentication with an ISP

    3. Storing the IP addresses of all computers behind a firewall

    4. Storing the IP addresses of domain controllers behind a firewall

  19. What is Microsoft’s implementation of RADIUS called?

    1. MS-RADIUS

    2. Kerberos

    3. Active Directory Authentication Service (ADAS)

    4. Internet Authentication Service (IAS)

  20. Which two objects are combined to make a certificate?

    1. A password and a private key

    2. A root key and a user’s public key

    3. A root key and a user’s private key

    4. A user’s public and private keys

  21. Which functions can a standalone subordinate certificate authority perform?

    1. Issue certificates to users

    2. Issue certificates to authorize other standalone subordinate certificate authorities

    3. Accept certificates from users

    4. Accept certificates from other standalone subordinate certificate authorities

    5. All of the above

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.80.100