.

Wednesday, January 23, 2019

70-640 Lesson 11

Lesson 11 dynamic Directory Maintenance, Troubleshooting, and Disaster Recovery Knowledge Assessment coordinated a. determinate restoref. LDP b. checkpoint fileg. system mass c. Directory Services rejuvenate Modeh. tombstone d. fragmentationi. effect buffer e. slobber collectionj. Windows PowerShell __h__ 1. This object is created when an object is deleted at bottom dynamical Directory. __i__ 2. ready Directory changes are written here before they are committed to disk. __j__ 3. This is a new advanced command- task and scripting interface included in Windows Server 2008. __g__ 4.This flock houses the boot files for a Windows Server 2008 computer. __e__ 5. This describes the process of removing tombstoned objects from the NTDS. DIT file. __a__ 6. You will select to perform this operation if you have inadvertently deleted one or to a greater extent progressive Directory objects. __f__ 7. This is a graphical user interface that will allow in you to query Active Directory as part of the troubleshooting process. __b__ 8. This is apply as a reference file in case the Active Directory database affects to be recovered from a system failure to ensure that no proceedings are lost. _c__ 9. To perform many Active Directory maintenance operations, you will need to restart your reality controller in this startup mode. __d__ 10. This ass reduction database achievement because updates are made to the Active Directory over time. Multiple excerption 1. Which of the adjacent assuagement types sess be initiated by a fellow member of the local Administrators group or a member of the local accompaniment Operators group on a Windows Server 2008 computer? a. Manual reenforcement b. Scheduled support c. Full co-occurrence d. Differential backupA manual backup can be re plan by a local administrator or member of the local Backup Operators group. Scheduled backups can only be created by members of the local Administrators group. 2. The NTDS. DIT file is bas ed on which database engineering? a. Structured Query Language (SQL) b. Oracle c. Extensible Storage railway locomotive (ESE) d. My*SQL The NTDS. DIT file is based on the Extensible Storage engine (ESE) data storage format, not Microsoft SQL as some people believe. 3. Which of the following commands can be use to configure Active Directory permissions from the command line? . LDP b. Dsacls c. Dcdiag d. ADSI Edit The dsacls. exe command-line utility can be used to list and restrict Active Directory permissions for a particular object or container. 4. What runs automatically on a domain controller every 12 hours by indifference during the garbage collection process? a. Offline defragmentation b. Authoritative restore c. Nonauthoritative restore d. Online defragmentation Online defragmentation on an Active Directory domain controller is also known as the garbage collection process. 5.Which tool can you use to force a domain controller to start in Directory Services Restore Mode on i ts next reboot? a. cmd. exe b. bootmgr. exe c. bcdedit. exe d. dcpromo. exe Apart from pressing F8 during the system boot, you can configure a Windows Server 2008 computer to automatically boot into Directory Services Restore Mode by using the bcdedit. exe command-line utility before rebooting the server. 6. Which operation requires the Active Directory Domain Service to be taken offline? a. Offline defragmentation b. Online defragmentation c. Garbage Collection d. execution BufferingOf the operations listed, only an offline defragmentation requires you to take the Active Directory database offline, whether through rebooting into DSRM or by using the new restartable Active Directory feature. 7. Which of the following backup types can be initiated only by a member of the local Administrators group on a Windows Server 2008 computer? a. Manual backup b. Scheduled backup c. Full backup d. Differential backup Unlike manual backups, scheduled backups can only be created by members of the local Administrators group on a Windows Server 2008 computer. 8.Which backup type will empty the operation log on the server that is being backed up? a. imitate backup b. Differential backup c. Normal backup d. VSS full backup VSS full backup will update each files backup history and clear the Application Log files. 9. Which of the following volumes hosts the Windows operating(a) system? a. Boot volume b. Shared volume c. System volume d. Host volume The boot volume holds the Windows operating system and the Registry. 10. When acting an authoritative restore of a user object that belongs to multiple Active Directory groups, what is restored by the LDF file that is generated by Ntdsutil? . Optional attributes b. Mandatory attributes c. Back-links d. Security Identifier (SID) In a multi-domain environment, back-links need to be manually re-created after an authoritative restore by using the LDIF files generated automatically by ntdsutil. CASE SCENARIOS Scenario 11-1 Consulting for Margies Travel You are a computer consultant for Margie Shoop, the owner of Margies Travel. Margie has a single Active Directory domain structure with the domain margies give way. com. Margie has travel agencies worldwide, at 50 locations in 7 countries. All locations are connected to a transmit array.Margie has signed a 10-year contract to provide satellite access to her 50 locations. Connectivity to the satellite array varies from 57 Kbps to 128 Kbps. Although her locations vary greatly in the number of computer and user accounts, each location with to a greater extent than 15 users has its own domain controller, global catalog server, and DNS server, all typically configured on the same computer. The margiestravel. com Active Directory infrastructure has nine sites. given(p) this information about Margies Travel, answer the following questions 1. You discuss performance monitoring with Margie.During your conversation, you learn no one has ever used comeback and Performance Mo nitor to check the performance of her domain controllers. Margie wants to know why anyone would even bother. What do you say to her? Replication and Performance Monitor is used to provide one-time and ongoing reports of Active Directory performance counters, which can be used to proactively monitor Active Directory for potential hardware and software issues that might conflict client authentication. 2. Margie tells you that some of her domain controllers have multiple hard disks. She tells you that the supernumerary physical hard disks are not being used.She wants to know if they can be used to improve the performance of Active Directory. What would you tell her? The Active Directory database and log files can be moved to different hard disks within a server to improve performance. 3. Margie sends you to Cairo, Egypt, to troubleshoot a few domain controllers in her Egypt location. You find some event messages concerning replication events, but you would like to foregather more de tailed information than the data in the log now. What can you do? Modify the debugging levels in the Registry to increase the number of events that are logged to the Event Viewer.

No comments:

Post a Comment