Exam 2 Flashcards Preview

AD Midterm-Quiz-Final_Exam > Exam 2 > Flashcards

Flashcards in Exam 2 Deck (43)
Loading flashcards...
1
Q

A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.

A

domain controller

2
Q

What protocol has become an industry standard that enables data exchange between directory services and applications?

A

LDAP

3
Q

What locator records within DNS allow clients to locate an Active Directory domain controller or global catalog?

A

SRV records

4
Q

What is the process of replicating DNS information from one DNS server to another?

A

zone transfer

5
Q

What type of trust relationship allows you to create two-way transitive trusts between separate forests?

A

cross-forest

6
Q

What type of zone is necessary for computer hostname-to-IP address mappings, which are used for name resolution by a variety of services?

A

forward lookup

7
Q

What DLL must be registered to use the Schema Management snap-in?

A

schmmgmt.dll

8
Q

Replication within Active Directory will occur when which of the following conditions is met?

A

An object is added or removed from Active Directory.
The value of an attribute has changed.
The name of an object has changed.

9
Q

What command-line tool can be used to manually create a replication topology if site link bridging is disabled if the network is not fully routed?

A

Repadmin

10
Q

Certain operations, such as a password change or an account lockout, will be transmitted by using __________ replication, which means that the change will be placed at the “beginning of the line” and applied before any other changes that are waiting to be replicated.

A

urgent

11
Q

Which FSMO role has the authority to manage the creation and deletion of domains, domain trees, and application data partitions in the forest?

A

Domain Naming Master

12
Q

What types of memberships are stored in the global catalog?

A

universal

13
Q

What console must be used to move the Domain Naming Master FSMO role?

A

Active Directory Domains and Trusts

14
Q

What command-line utility is used to import or export Active Directory information from a comma-separated value (.csv) file?

A

CSVDE

15
Q

What special identity group is used by the system to allow permission to protected system files for services to function properly?

A

Service

16
Q

When using CSVDE, what is the first line of the text file that uses proper attribute names?

A

header record

17
Q

Which of the following is not a characteristic of a strong password?

A

is not your birth date

18
Q

What is a system of digital certificates, certification authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography?

A

PKI

19
Q

What types of certificates are generated by the enterprise CA and used to generate a smart card logon certificate for users in the organization?

A

X

20
Q

What process applies Group Policy settings to various containers within Active Directory?

A

linking

21
Q

The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.

A

Default Domain

22
Q

What policies work with folder redirection to provide the ability to cache files locally?

A

offline file storage

23
Q

What is the path to the default GPT structure for a domain?

A

%systemroot%\sysvol\sysvol\domain.com\Policies

24
Q

What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?

A

Audit Policy

25
Q

What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?

A

Folder Redirection

26
Q

Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).

A

Public Key Policies

27
Q

__________ files are used to apply service packs and hotfixes to installed software.

A

Patch

28
Q

Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?

A

hash rule
certificate rule
Path rule

29
Q

What policies are designed to identify software and control its execution?

A

Software Restriction

30
Q

What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?

A

Resultant Set of Policy

31
Q

Rather than simulating policy effects like the Group Policy Modeling Wizard, what obtains RSoP information from the client computer to show the actual effects that policies have on the client computer and user environment?

A

Group Policy Results

32
Q

What refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO?

A

Security Group Filtering

33
Q

What manual process defragments the Active Directory database in addition to reducing its size?

A

offline defragmentation

34
Q

The Reliability and Performance Monitor uses categories called performance __________ to organize the items that can be monitored.

A

Object

35
Q

What is the command-line component of the Windows Server Backup snap-in?

A

wbadmin

36
Q

Server Backup does not support the use of which type of backup media?

A

magnetic tape

37
Q

What is the name resolution mechanism that computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server?

A

DNS

38
Q

What type of zone contains the master copy of the zone database in which administrators make all changes to the zone’s resource records?

A

primary zone

39
Q

What are the highest-level DNS servers in the entire namespace?

A

root name server

40
Q

In terms of AD FS, what organizations contain the user accounts that are accessing the resources controlled by resource organizations, similar to a trusted domain in a traditional Windows trust relationship?

A

account organizations

41
Q

What role in ILM is to provide services for managing public key certificates that can be used by any security system that relies on a PKI for authentication or authorization?

A

Active Directory Certificate Services

42
Q

What enables a user to manually create a certificate request file using the Certificates MMC snap-in?

A

Certificate Request Wizard

43
Q

What is used to request certificates on behalf of a user, computer, or service if self-enrollment is not practical or is otherwise an undesirable solution for reasons of security or auditing?

A

enrollment agents