7 - LDAP & Active Directory Flashcards

1
Q

____________ serves as a centralized “command and control” for configuring devices that fall under its control.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is LDAP?

[Define]

A

An open standard protocol for accessing object oriented databases, known as Directory Servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does LDAP define?

A

Defines how clients access the directory server and perform database operations over an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The information present in your directory such as object classes, names and functions.

A

Data Models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uniquely identifies an entity in a directory

A

Distinguished Name (DN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Requests LDAP users make to alter the data associated with an entry. Defined modification types include adding, deleting, replacing, and increasing.

A

Modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A component of a DN. Typically the first (first what?)

A

Relative Distinguished Name (RDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defines all the objects and attributes that the directory service uses to store data

A

Schema

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

String of characters that is used as a unique identifier. In AD FS, URIs are used to identify both partner network addresses and configuration objects.

A

Uniform Resource Identifier (URI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Domain?

A

An administrative grouping of multiple private computer networks or local hosts within the same infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domains can allow greater management of their internal devices and assist in blocking external ones.

[TRUE / FALSE]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domains are often used synchronously with domain name.

[TRUE / FALSE]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Made up of several domains that share a common schema and configuration, forming a contiguous namespace.

A

Trees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Directory is a set of one or more trees.

[TRUE / FALSE]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a “Forest”?

A

One or more trees that do not form a contiguous namespace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the three things that all trees in a forest share.

A
  1. Common Schema
  2. Configuration
  3. Global catalog
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the first Domain created in a Forest?

A

The Forest Root Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What port does LDAP use?

19
Q

A _______ is a relationship established between domains to enable users in one domain to access resources in another domain.

20
Q

How do Trusts authenticate Users across the trust?

A

Via Kerberos or NTLM

21
Q

In the Parent-Child Trust, when are child domains created?

A

Child domains are automatically added when created.

22
Q

When is the Tree-Root trust created?

A

When new root domains are added to an Active Directory forest.

23
Q

When is the Forest Trust created?

A

Must be created by a privileged administrator.

24
Q

What trust relationship does the Forest trust establish?

A

It establishes a trust relationship between two AD forests.

25
This trust exists between two distant child domains; used to improve logon.
Shortcut Trust
26
Access between two Active Directory domains located in different forests (no forest trust exists). Can be one direction.
External Trust
27
What protocol do queries on the domain for Windows systems use?
LDAP
28
Name the 4 steps of the Domain Query process.
1. Client queries DNS for LDAP SRV record. 2. Once the LDAP service is identified, the client connects to Port 389. 3. The connection is made to a Domain controller. 4. Client authenticates and performs the search.
29
Looking for something within the forest will require a \_\_\_\_\_\_\_\_\_\_\_.
Global catalog
30
How does the Global Catalog (GC) identify the location of every object in the forest.
the GC uses **Distinguished Names**
31
Name the 3 Forest-Wide queries that need the Global Catalog (GC) service:
1. Search for a resource (printer, fileshare) in a forest that contains more than one domain 2. A User Principal Name (UPN) logon in a forest that contains more than one domain 3. Email address search from the Global Address List (GAL)
32
Name the 3 steps of the Forest wide query process.
1. Client queries DNS for GC SRV record. 2. Once the GC service is identified, client connects to port 3268 or 3269. This connection is made to a domain controller running the GC service. 3. Client authenticates and performs search.
33
In Windows systems, what is “Local Security Policy”?
A combination of settings used by Windows systems to control security on a computer.
34
What are policy settings commonly used for?
to edit account and password policies
35
How is “Local Policy” a valuable tool?
It is a valuable tool for **computer compliance** and **centrally manage users**, **applications**, and **components**.
36
Name three things you can find using Local Security Policy
1. The Domains trusted to authenticate logon attempts 2. Privileges and Rights assigned to accounts 3. Security Auditing Policy
37
\_\_\_\_\_\_\_\_\_\_\_ is an infrastructure that allows you to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences.
Group Policy
38
Without an Active Directory, there’s one Group Policy available - what is it?
Local Group Policy
39
Group Policy administration only works in conjunction with \_\_\_\_\_\_\_.
Active Directory
40
What is a Group Policy object (GPO)?
A collection of Group Policy settings that define what a system will look like and how it will behave for a defined group of users.
41
Every GPO contains two parts. What are they?
1. User configuration 2. Computer configuration
42
Contains policy settings that are relevant only for users.
User configuration
43
Contains policy settings that are relevant only for computers. Every setting is relevant to the computer itself.
Computer configuration
44
One or more trees that do not form a contiguous namespace are in a what?
Forest