Saturday, March 9, 2019
70-640 Lesson 11
Lesson 11 active agent Directory Maintenance, Troubleshooting, and Disaster Rec constantlyyplacey familiarity Assessment Matching a. authoritative bear uponf. LDP b. checkpoint fileg. frame al-Quran c. Directory Services fix Modeh. tombst integrity d. fragmentationi. transaction buffer e. garbage collectionj. Windows PowerShell __h__ 1. This heading is created when an object is deleted inside sprightly Directory. __i__ 2. active Directory changes atomic number 18 written here forwards they are committed to disk. __j__ 3. This is a new advanced command-line and scripting larboard included in Windows Server 2008. __g__ 4.This volume houses the conjure files for a Windows Server 2008 ready reckoner. __e__ 5. This describes the process of removing tombstoned objects from the NTDS. point file. __a__ 6. You willing need to perform this operation if you have inadvertently deleted one or more Active Directory objects. __f__ 7. This is a graphical user interface that will all ow you to query Active Directory as part of the troubleshooting process. __b__ 8. This is apply as a reference file in case the Active Directory database needs to be recovered from a system failure to break that no transactions are lost. _c__ 9. To perform many Active Directory bread and scarceter operations, you will need to restart your sector controller in this inauguration mode. __d__ 10. This hatful decrease database performance because updates are made to the Active Directory over time. Multiple Choice 1. Which of the pursuit rest types fag be initiated by a phallus of the local anaesthetic anaesthetic Administrators group or a member of the local Backup Operators group on a Windows Server 2008 computer? a. Manual replacement b. Scheduled relievo c. Full backup d. divers(prenominal)ial gear backupA manual backup can be rescheduled by a local administrator or member of the local Backup Operators group. Scheduled backups can only be created by members of the loca l Administrators group. 2. The NTDS. DIT file is ground on which database technology? a. Structured Query Language (SQL) b. Oracle c. extensible Storage Engine (ESE) d. My*SQL The NTDS. DIT file is based on the extensile Storage Engine (ESE) data storage format, not Microsoft SQL as somewhat people believe. 3. Which of the following commands can be employ to configure Active Directory permissions from the command line? . LDP b. Dsacls c. Dcdiag d. ADSI Edit The dsacls. exe command-line utility can be used to list and modify Active Directory permissions for a particular object or container. 4. What runs automatically on a domain controller every 12 hours by default during the garbage collection process? a. Offline defragmentation b. Authoritative restore c. Nonauthoritative restore d. Online defragmentation Online defragmentation on an Active Directory domain controller is also know as the garbage collection process. 5.Which tool can you use to repulse a domain controller to sta rt in Directory Services remodel Mode on its next reboot? a. cmd. exe b. bootmgr. exe c. bcdedit. exe d. dcpromo. exe Apart from pressing F8 during the system boot, you can configure a Windows Server 2008 computer to automatically boot into Directory Services Restore Mode by using the bcdedit. exe command-line utility before rebooting the server. 6. Which operation requires the Active Directory Domain Service to be taken offline? a. Offline defragmentation b. Online defragmentation c. refuse Collection d. Transaction BufferingOf the operations listed, only an offline defragmentation requires you to take the Active Directory database offline, whether through rebooting into DSRM or by using the new restartable Active Directory feature. 7. Which of the following backup types can be initiated only by a member of the local Administrators group on a Windows Server 2008 computer? a. Manual backup b. Scheduled backup c. Full backup d. Differential backup unconnected manual backups, sche duled backups can only be created by members of the local Administrators group on a Windows Server 2008 computer. 8.Which backup type will empty the Application log on the server that is cosmos endorse up? a. Copy backup b. Differential backup c. Normal backup d. VSS full backup VSS full backup will update individually files backup history and clear the Application pound files. 9. Which of the following volumes hosts the Windows operating(a) system? a. Boot volume b. Shared volume c. System volume d. Host volume The boot volume holds the Windows operating system and the Registry. 10. When performing an authoritative restore of a user object that belongs to four-fold Active Directory groups, what is restored by the LDF file that is generated by Ntdsutil? . Optional attributes b. needful attributes c. Back-links d. Security Identifier (SID) In a multi-domain environment, back-links need to be manually create after an authoritative restore by using the LDIF files generated autom atically by ntdsutil. CASE SCENARIOS Scenario 11-1 Consulting for Margies Travel You are a computer consultant for Margie Shoop, the owner of Margies Travel. Margie has a single Active Directory domain anatomical structure with the domain margiestravel. com. Margie has travel agencies worldwide, at 50 locations in 7 countries. only locations are connected to a satellite array.Margie has signed a 10-year charter to provide satellite access to her 50 locations. Connectivity to the satellite array varies from 57 Kbps to 128 Kbps. Although her locations vary greatly in the number of computer and user accounts, to each one location with more than 15 users has its own domain controller, global catalogue server, and DNS server, all typically configured on the same computer. The margiestravel. com Active Directory radix has nine sites. Given this information about Margies Travel, answer the following questions 1. You discuss performance monitoring with Margie.During your conversation , you learn no one has ever used Replication and capital punishment Monitor to check the performance of her domain controllers. Margie wants to know why anyone would even bother. What do you say to her? Replication and Performance Monitor is used to provide one-time and ongoing reports of Active Directory performance counters, which can be used to proactively monitor Active Directory for potential hardware and software package issues that might impact client authentication. 2. Margie tells you that some of her domain controllers have multiple hard disks. She tells you that the additional physical hard disks are not being used.She wants to know if they can be used to improve the performance of Active Directory. What would you tell her? The Active Directory database and log files can be moved to different hard disks within a server to improve performance. 3. Margie sends you to Cairo, Egypt, to troubleshoot a few domain controllers in her Egypt location. You find some event messages concerning replication events, but you would like to see more detailed information than the data in the log now. What can you do? Modify the debugging levels in the Registry to increment the number of events that are logged to the Event Viewer.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment