Exam 2 Flashcards
(43 cards)
A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.
domain controller
What protocol has become an industry standard that enables data exchange between directory services and applications?
LDAP
What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?
SRV records
What is the process of replicating DNS information from one DNS server to another?
zone transfer
What type of trust relationship allows you to create two-way transitive trusts between separate forests?
cross-forest
What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?
forward lookup
What DLL must be registered to use the Schema Management snap-in?
schmmgmt.dll
Replication within Active Directory will occur when which of the following conditions is met?
An object is added or removed from Active Directory.
The value of an attribute has changed.
The name of an object has changed.
What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?
Repadmin
Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.
urgent
Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?
Domain Naming Master
What types of memberships are stored in the global catalog?
universal
What console must be used to move the Domain Naming Master FSMO role?
Active Directory Domains and Trusts
What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?
CSVDE
What special identity group is used by the system to allow permission to protected system files for services to function properly?
Service
When using CSVDE, what is the first line of the text file that uses proper attribute names?
header record
Which of the following is not a characteristic of a strong password?
is not your birth date
What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?
PKI
What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?
X
What process applies Group Policy settings to various containers within Active Directory?
linking
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
Default Domain
What policies work with folder redirection to provide the ability to cache files locally?
offline file storage
What is the path to the default GPT structure for a domain?
%systemroot%\sysvol\sysvol\domain.com\Policies
What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
Audit Policy