11 Flashcards
_____ introduced the ability of centralized log collecting
The _______ collects log entries from one or more source systems (forwarders) on the network and requires the web services (wb)-management protocol
WEF
WEC
In order for WEF to work it requires two services, these are ______ and _________
What ports does WEF use?
WESVC
WINRM
5985/5986
A _____________ profile does not save the changes made to the HKCU at logoff
__________ stored on the local system. If a user does not have a profile, one is created using the settings from the default default profile
_____________ are stored on a network share. These profiles are downloaded when the user logs on and work like any other profile.
A ____________ account is used to manage permissions more effiecntly
______________ used for email distribution lists
_____________ used for assigning permissions or for email distribution lists
Mandatory
Local Account
Roaming Account
Distribution Groups
Security Groups
What are the two categorys of group scope?
_____________ normally assigned to resources within a domain. Thjey contain global groups from any other domain in the forest.
_____________ used anywhere in the forest but only local users can be added too it
Domain Local group
Global Group
What is the best arder for managing group memberships and assgining permisssions
Account
GG
DLLG
Permissions
A>GG>DLG<P
What accounts are of a global scope?
_________ perform administrative tasks anywhere in the domain
_________ a built-in-group. The guest account is a member of this group
___________ Administrator and each domain user is automatically a member of this group
Domain Admins
Domain Guests
Domain users
What accounts are of a domain local scope?
__________ create, delete, and modify user accounts and groups
__________ have full control permission to perform administrative tasks on the domain
__________ back up and restore domain controllers using windows backup
___________ gain access to resources for which they have permissions. This includes the authenticated users group
Account Operators
Administrators
Backup Operators
Users
What accounts are special identity groups?
___________ access system through logon process
__________ automatically grants permission to person who created file or directory
__________ defines all interactive, network, dial-up, and authenticated users
Authenticated users
Creator Owner
Everyone
When are profile changes saved?
When the user logs off
Will a Task run interactively if you use schtasks and use another users credentials?
No, it will not run interactively