Exam 2 Flashcards

(43 cards)

1
Q

A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol has become an industry standard that enables data exchange between directory services and applications?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

A

SRV records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process of replicating DNS information from one DNS server to another?

A

zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of trust relationship allows you to create two-way transitive trusts between separate forests?

A

cross-forest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

A

forward lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What DLL must be registered to use the Schema Management snap-in?

A

schmmgmt.dll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replication within Active Directory will occur when which of the following conditions is met?

A

An object is added or removed from Active Directory.
The value of an attribute has changed.
The name of an object has changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?

A

Repadmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.

A

urgent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?

A

Domain Naming Master

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What types of memberships are stored in the global catalog?

A

universal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What console must be used to move the Domain Naming Master FSMO role?

A

Active Directory Domains and Trusts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?

A

CSVDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What special identity group is used by the system to allow permission to protected system files for services to function properly?

A

Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When using CSVDE, what is the first line of the text file that uses proper attribute names?

A

header record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is not a characteristic of a strong password?

A

is not your birth date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?

19
Q

What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?

20
Q

What process applies Group Policy settings to various containers within Active Directory?

21
Q

The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.

A

Default Domain

22
Q

What policies work with folder redirection to provide the ability to cache files locally?

A

offline file storage

23
Q

What is the path to the default GPT structure for a domain?

A

%systemroot%\sysvol\sysvol\domain.com\Policies

24
Q

What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?

25
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
Folder Redirection
26
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
Public Key Policies
27
__________ files are used to apply service packs and hotfixes to installed software.
Patch
28
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
hash rule certificate rule Path rule
29
What policies are designed to identify software and control its execution?
Software Restriction
30
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
Resultant Set of Policy
31
Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?
Group Policy Results
32
What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?
Security Group Filtering
33
What manual process defragments the Active Directory database in addition to reducing its size?
offline defragmentation
34
The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.
Object
35
What is the command-line component of the Windows Server Backup snap-in?
wbadmin
36
Server Backup does not support the use of which type of backup media?
magnetic tape
37
What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?
DNS
38
What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?
primary zone
39
What are the highest-level DNS servers in the entire namespace?
root name server
40
In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?
account organizations
41
What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?
Active Directory Certificate Services
42
What enables a user to manually create a certificate request file using the Certificates MMC snap-in?
Certificate Request Wizard
43
What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing?
enrollment agents