AZ-800 Microsoft Practice Test Questions and Exam Dumps

Question No 1:

Your organization’s network uses an Active Directory Domain Services (AD DS) domain named contoso. As part of your network management tasks, you need to identify which server in the domain is the Primary Domain Controller (PDC) Emulator.

You are tasked with identifying the PDC emulator for the contoso.com domain. Your approach is to use the Active Directory Domains and Trusts tool, right-click Active Directory Domains and Trusts in the console tree, and then select Operations Master.

Does this solution meet the goal of identifying the PDC emulator?

  • A. Yes

  • B. No

Answer 1: B. No

Explanation:

The Active Directory Domains and Trusts tool and the Operations Master option within the console provide information related to FSMO (Flexible Single Master Operation) roles, but it is not the correct way to identify the PDC Emulator.

In Active Directory, the PDC Emulator is one of the five FSMO roles and is responsible for certain domain-related operations, including password changes, time synchronization, and handling certain legacy compatibility tasks. However, when using the Active Directory Domains and Trusts console, you are presented with information about roles such as the Domain Naming Master, Schema Master, and RID Master, but not the PDC Emulator.

To identify the PDC Emulator, you would typically use the Active Directory Users and Computers console or run specific commands. The Operations Master option within the Active Directory Domains and Trusts tool is not the appropriate method for identifying the PDC Emulator. Therefore, the solution does not meet the goal.

Question No 2:

You are tasked with identifying the PDC emulator for the contoso domain. Your solution is to open a command prompt and run the netdom.exe query fsmo command.

Does this solution meet the goal of identifying the PDC emulator?

  • A. Yes

  • B. No

Answer 2: A. Yes

Explanation:

The netdom exe query fsmo command is a correct and efficient way to identify the PDC Emulator in an Active Directory domain. When you run the netdom.exe query fsmo command, it queries the FSMO roles within your domain and displays which server holds each role, including the PDC Emulator.

This command is commonly used by administrators to quickly determine the distribution of FSMO roles across domain controllers. It provides a list of all five FSMO roles in a domain and identifies the server currently holding the PDC Emulator role. Specifically, the command will output the name of the server that is assigned the PDC Emulator role, which is exactly what is needed in this scenario.

The output will list all the FSMO roles and the corresponding server names. This method is direct, reliable, and widely used by network administrators.

Conclusion:

  • Question 1 is a No because using the Active Directory Domains and Trusts tool does not provide the correct way to identify the PDC Emulator role.

  • Question 2 is a Yes because the netdom query fsmo command provides the necessary information to identify the PDC Emulator correctly.

Question No 3:

You have an on-premises Active Directory Domain Services (AD DS) environment that is synchronized with an Azure Active Directory (Azure AD) tenant. You are planning to implement Self-Service Password Reset (SSPR) for Azure AD users. After a user resets their password using SSPR, you need to ensure that the new password can be used seamlessly in the on-premises AD DS environment as well.

Which of the following actions should you take to achieve this goal?

A. Deploy the Azure AD Password Protection proxy service to the on-premises network.
B. Run the Microsoft Azure Active Directory Connect wizard and select Password writeback.
C. Grant the Change password permission for the domain to the Azure AD Connect service account.
D. Grant the impersonate a client after authentication user right to the Azure AD Connect service account.

Answer: B. Run the Microsoft Azure Active Directory Connect wizard and select Password writeback.

Explanation:

In a hybrid Active Directory environment where on-premises Active Directory Domain Services (AD DS) is synchronized with Azure Active Directory (Azure AD), implementing Self-Service Password Reset (SSPR) in Azure AD has certain prerequisites to ensure that password changes or resets are consistent across both environments.

When a user resets their password via Azure AD's Self-Service Password Reset (SSPR) feature, this change needs to be propagated to the on-premises AD DS environment to maintain consistency and allow users to use their new password for both cloud and on-premises resources. Azure AD provides a solution for this through a feature called Password Writeback.

Why Option B is Correct:

To enable users to reset their passwords in Azure AD and have these changes reflected in the on-premises AD DS, Password Writeback must be configured. Password Writeback is a feature of Azure AD Connect, which ensures that when a password is reset in Azure AD, it is also written back to the on-premises Active Directory. This synchronization enables users to use the same password across both environments (Azure AD and AD DS), ensuring a seamless experience.

When setting up Azure AD Connect, you can select the Password Writeback option during the configuration process. This allows Azure AD to securely synchronize the new password to the on-premises AD DS. Without this configuration, passwords reset through Azure AD's SSPR will not be written back to the on-premises AD DS, and users will not be able to use their new password for on-premises resources.

Explanation of Other Options:

This option is related to Azure AD Password Protection, which is designed to help prevent weak passwords by applying additional password policies both in Azure AD and on-premises AD. While this can help improve password security by blocking weak passwords, it does not address the issue of synchronizing password resets between Azure AD and on-premises AD DS. Therefore, this option does not solve the problem described in the question.
This option is incorrect because the Azure AD Connect service account does not need explicit "Change password" permissions for this scenario. The Azure AD Connect tool does not require these permissions for synchronizing passwords between Azure AD and on-premises AD DS. Rather, it uses the Password Writeback feature to handle password synchronization. This permission is typically required for other administrative tasks in Active Directory but is irrelevant for enabling password resets through Azure AD.
This option is not directly relevant to the task of enabling password writeback. The "Impersonate a client after authentication" user right is typically used in scenarios involving delegation of authentication rights or service accounts that need to impersonate users in certain contexts. While this may be a consideration for other configurations, it does not address the need to synchronize passwords between Azure AD and on-premises AD DS.

Conclusion:

To ensure that users who reset their passwords via Azure AD's Self-Service Password Reset (SSPR) can use the new password in both Azure AD and on-premises AD DS environments, the correct action is to configure Password Writeback in Azure AD Connect. This ensures that password changes in Azure AD are reflected in the on-premises AD DS, allowing a consistent user experience. Thus, the correct answer is Option B.

Question No 4:

Your organization has a single domain Active Directory Domain Services (AD DS) forest named contoso.com. The forest consists of a single Active Directory site. You are planning to deploy a Read-Only Domain Controller (RODC) in a new datacenter using a server named Server1. A user named User1 is a member of the local Administrators group on Server1.

You are required to recommend a deployment plan that meets the following criteria:

  • Ensures that User1 can perform the RODC installation on Server1.

  • Provides the ability to control the AD DS replication schedule for Server1.

  • Places Server1 in a newly created site named RemoteSite1.

  • Adheres to the principle of least privilege, ensuring minimal necessary permissions are granted.

What three actions should you recommend performing in sequence to meet the above requirements?

A. Configure the site RemoteSite1 in Active Directory Sites and Services. 

B. Grant User1 the necessary permissions to install an RODC by adding them to the RODC Administrators group. 

C. Configure Active Directory Sites and Services to specify the replication schedule for the new RODC server.

D. Create a new Active Directory site link for RemoteSite1 to control the replication schedule.

E. Install the Read-Only Domain Controller (RODC) role on Server1. 

F. Move Server1 to RemoteSite1 in Active Directory Sites and Services.

Answer:

  1. Action A: Configure the site RemoteSite1 in Active Directory Sites and Services.

  2. Action B: Grant User1 the necessary permissions to install an RODC by adding them to the RODC Administrators group.

  3. Action C: Configure Active Directory Sites and Services to specify the replication schedule for the new RODC server.

Explanation:

To meet the requirements of deploying an RODC in a new datacenter with minimal privileges and control over replication schedules, the following sequence of actions should be taken:

The first step is to ensure that the new site, RemoteSite1, is created in Active Directory Sites and Services. A site in Active Directory defines the physical topology of the network and is used to control replication between domain controllers. By setting up RemoteSite1, you define where the new RODC (Server1) will reside, which will later allow you to manage replication schedules and control traffic flow between different sites effectively.

User1 needs specific permissions to perform the RODC installation. While User1 is already a member of the local Administrators group on Server1, they still require the additional rights granted by being added to the RODC Administrators group in Active Directory. This action ensures that User1 has the required permissions to install the RODC role on Server1. The principle of least privilege is respected here since only the specific permissions needed for installing the RODC are granted to User1.

Once the new site is created, you can configure the replication schedule for the new RODC server (Server1) within Active Directory Sites and Services. This allows administrators to define when and how often replication should occur between domain controllers in different sites. By controlling the replication schedule, you ensure efficient use of network resources and can adjust replication intervals according to the needs of your organization. This also ensures that Server1 is updated with the necessary Active Directory changes, while giving you control over the bandwidth usage.
Conclusion:

The sequence above ensures that you meet all the requirements: proper placement of Server1 in the new site (RemoteSite1), ensuring User1 has the least privilege necessary to install the RODC, and providing control over the AD DS replication schedule. By following this sequence, you ensure a secure, efficient, and well-structured deployment of the RODC in your organization’s infrastructure.

Question No 5:

You are managing an Active Directory Domain Services (AD DS) domain with the following infrastructure:

  • 20 domain controllers

  • 100 member servers

  • 100 client computers

You have a Group Policy Object (GPO) named GPO1, which contains several Group Policy preferences. You plan to link GPO1 to the domain, but you need to ensure that only the member servers apply the Group Policy preferences contained within the GPO. The Group Policy preferences in GPO1 should NOT apply to domain controllers or client computers. However, all the other Group Policy settings within GPO1 (those not related to preferences) must still apply to all the computers in the domain.

Your goal is to achieve this configuration while minimizing administrative effort.

Which type of Item-Level Targeting (ILT) should you use to ensure that the Group Policy preferences in GPO1 only apply to domain member servers and not to domain controllers or client computers?

A. Domain
B. Operating System
C. Security Group
D. Environment Variable

Correct Answer: B. Operating System

Explanation:

In an Active Directory domain, Group Policy Objects (GPOs) can contain both Group Policy settings and Group Policy preferences. Group Policy preferences allow you to configure settings that are more flexible and dynamic than standard Group Policy settings. For instance, preferences can apply to specific groups of computers or users based on certain criteria, such as the operating system or membership in a specific security group.

In your scenario, GPO1 contains Group Policy preferences, and the goal is to ensure that these preferences apply only to domain member servers, while other settings in GPO1 should apply universally to all computers in the domain, including domain controllers and client computers. To achieve this, Item-Level Targeting (ILT) can be used, which is a feature that allows the configuration of GPO preferences to apply based on specific conditions like operating system version, user groups, or even environment variables.

This option is not suitable for this scenario because Item-Level Targeting based on Domain would apply to all machines in the domain. Since you need to specifically target domain member servers and exclude domain controllers and client computers, using domain-level targeting will not achieve the desired result. Domain targeting would typically apply the settings to all objects within a specific Active Directory domain, which contradicts the requirement to apply the preferences only to member servers.

This option is the most appropriate for the given requirements. Operating System-based Item-Level Targeting allows you to apply preferences based on the operating system version of the target machine. Since domain member servers typically run specific server editions of Windows (e.g., Windows Server 2016, 2019), and domain controllers and client computers run different operating systems (such as Windows Server editions for domain controllers or Windows client editions for client computers), you can target the Group Policy preferences to apply only to those computers running a specific operating system, such as Windows Server editions.

By using Operating System-based ILT, you can ensure that the preferences in GPO1 only apply to domain member servers (which are running Windows Server editions), and not to domain controllers or client computers. This approach is both simple and efficient, meeting the requirement to minimize administrative effort while achieving the desired outcome.

Using Security Group-based Item-Level Targeting would require creating a security group that includes only domain member servers and then applying the preferences only to that security group. While this is a viable solution, it introduces additional administrative overhead because you would need to manage the membership of this security group manually. You would also have to ensure that all domain member servers are added to the group, which could become cumbersome, especially if the number of member servers increases over time.

Conclusion:

The best solution is to use Operating System-based Item-Level Targeting. This approach leverages the operating system type to ensure that the Group Policy preferences in GPO1 are applied only to domain member servers while excluding domain controllers and client computers. It is a straightforward and effective method that minimizes administrative effort, as you don’t have to manually manage security groups or other complex configurations.

Thus, the correct answer is B. Operating System.

Question No 6:

You have deployed a new Active Directory Domain Services (AD DS) forest named contoso.com, which contains three domain controllers: DC1, DC2, and DC3. You have renamed the default site "Default-First-Site-Name" to "Site1." Your plan is to ship DC1, DC2, and DC3 to separate data centers located in different geographic locations.

You are required to configure replication between DC1, DC2, and DC3 in a manner that meets the following conditions:

  • Each domain controller must reside in its own Active Directory site.

  • The replication schedule between each site must be independently controlled.

  • Interruptions to replication should be minimized.

What three actions should you take, in sequence, in the Active Directory Sites and Services console to achieve this goal?

A. Create a new site for each domain controller.

B. Move each domain controller to its respective site.

C. Configure the replication schedule for each site.

D. Set up site link bridges for replication between the sites.

Answer: A,B.C

Explanation:

To address the given requirements, the goal is to properly configure Active Directory (AD) sites and replication between domain controllers (DCs) located in separate data centers. Here's a breakdown of the steps needed:

  1. Create a new site for each domain controller:
    The first action is to create distinct Active Directory sites for each domain controller. In AD, a site is a logical grouping of IP subnets, typically aligned with a physical network infrastructure (such as a subnet in each data center). By default, all domain controllers in an AD forest are placed in the "Default-First-Site-Name" site unless specified otherwise. Since you are planning to move DC1, DC2, and DC3 to separate data centers, you need to create a site for each domain controller, ensuring that each one is geographically isolated. You can do this by right-clicking the Sites node in the Active Directory Sites and Services console and selecting New Site.

  2. Move each domain controller to its respective site:
    After creating the new sites, the next step is to assign each domain controller to its correct site. By default, when a domain controller is installed, it gets placed in the "Default-First-Site-Name" site, but now that you've created separate sites, you will need to move each domain controller to the appropriate site. This is done by expanding the Servers container under each site in the AD Sites and Services console. Then, right-click the domain controller (DC1, DC2, or DC3) and select Move to place it into the newly created site. This step ensures that the domain controllers are geographically organized and replication traffic is routed properly between them.

  3. Configure the replication schedule for each site:
    Once the domain controllers are correctly placed in their respective sites, the next step is to control the replication schedule. Active Directory replication between sites is managed through site links. By default, replication between sites happens on a regular schedule, but in this scenario, you need to set up independent replication schedules for each site to meet the requirements. This can be done by navigating to the Inter-Site Transports container and modifying the site link properties to configure the replication frequency and cost. These settings control how often replication occurs between the sites, which is crucial for minimizing interruptions and managing network traffic between geographically dispersed data centers.

By following these three steps, you ensure that each domain controller is in its own site, replication schedules are independent, and replication traffic is optimized to minimize interruptions across your different data center locations.

Question No 7:

Your network is running an Active Directory Domain Services (AD DS) forest with the domain name contoso. The root domain of the forest contains multiple domain controllers. Each of these domain controllers is responsible for various Active Directory roles, including those related to the creation and management of application partitions.

Which domain controller, if it fails, will prevent you from creating application partitions in the AD DS environment?

DC1 – Primary Domain Controller (PDC) Emulator

DC2 – Global Catalog (GC)

DC3 – Additional Domain Controller with Application Directory Partition

DC4 – Additional Domain Controller

DC5 – Additional Domain Controller with Application Directory Partition

A. DC1
B. DC2
C. DC3
D. DC4
E. DC5

Correct Answer: C. DC3

Explanation:

In Active Directory, application partitions are specialized partitions used to store data that is intended for use by specific applications, rather than for general domain data (such as user accounts or group memberships). These partitions are important for managing certain types of application data that need to be replicated across domain controllers, but only in specific contexts or regions of the Active Directory forest.

To understand why DC3 is the correct answer, let’s first review the critical components that affect the ability to create and replicate application partitions in Active Directory:

  1. Schema Master Role: This is the role responsible for managing the schema of the Active Directory forest, including the definition of new object types or attributes. However, it is not directly involved in the creation of application partitions, but its availability is crucial for AD modifications.

  2. Domain Naming Master Role: This is the role responsible for managing the naming of new domains and partitions in Active Directory. Without this role, you cannot add new domains or create new application partitions.

  3. Application Directory Partitions: These are partitions within Active Directory designed specifically to store application-specific data. These partitions are replicated only to domain controllers that are designated to hold them.

Why DC3 Is Critical:

  • DC3 is described as an "Additional Domain Controller with Application Directory Partition." This indicates that DC3 holds one or more application directory partitions. When you attempt to create an application partition, the domain controller that is designated to manage and store this partition must be online and operational. If DC3 fails, the ability to create and manage the application partition will be hindered because no other domain controllers are explicitly mentioned as handling the application partition roles.

    If DC3 fails, Active Directory will not have a functioning domain controller for handling the specific application partitions it was responsible for, and thus the creation of these partitions could be blocked.

Other Domain Controllers:

  • DC1 is the Primary Domain Controller (PDC) Emulator, which is essential for managing time synchronization, password changes, and other key domain functions. While important, its failure will not directly prevent the creation of application partitions.

  • DC2 is designated as a Global Catalog (GC), which serves a crucial role in providing directory information across the domain. Although critical for many Active Directory functions, the GC role is not specifically tied to application partition creation.

  • DC4 and DC5 are listed as additional domain controllers but are not explicitly stated to manage application partitions, so their failure won’t prevent the creation of application partitions in the same way DC3's failure would.

Conclusion:

To summarize, the domain controller responsible for managing and hosting application partitions is critical for the creation of those partitions. In this scenario, DC3, which is specifically mentioned as holding an application directory partition, is the one that must remain operational to allow for the creation of new application partitions. Therefore, the correct answer is C. DC3.


UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.