Chapter 3 Understaing work groups and Active Directory Flashcards

1
Q

Fill in the blanks

_______ is used for authentication, Authorization and auditing.

A

Activate Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill in the blanks
_______ allows you to store credentials, such as username ans passwords that you can log onto a website and other computers on the network?

A

Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blanks

A _______ defines the type of access that granted to an object such as a user or printer?

A

Group Policy (GP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blanks

_______ is a popular directory service with objects in a logical hierarchical manner

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blanks

To View the security logs for windows 7 you will use the __________

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blanks

The _______ is used to organize the objects within a domain.

A

Organizational Unit (OU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blanks

Printers, users, and computers are examples of _______ in Active Directory

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blanks

The Local Security Data Base found on a members server is _________

A

Security Account Manager (SAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blanks

Collection or list of users is known as __________

A

Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blanks

By Default, the user profile are stored in the ______ folder

A

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For active Directory to function, you need to have what?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms describes the process of giving, individuals access to system objects based on their identity?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a logical unit of computers and network resources that defines a security boundary?

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To uniquely identify a user or computer, these objects are assigned a what?

A

Security Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blanks

To enforce users in changing their password, you would use the ________ settings in the group policies.

A

Maximum Password Age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The documents, Desktop and favorites folder are part of the what?

A

User Profile

17
Q

What can be used to specify how many times a user can give the login with an incorrect password before the account is disabled?

A

Group Policy

18
Q

What authorization a user to perform certain actions on a computer?

A

Rights

19
Q

True or False

Roaming profiles are usually kept on the C drive of the local computer running windows 7

A

False

20
Q

True or False

User Account Control (UAC) is used for authentication

A

False

21
Q

True or False

User rights define what actions a person can do on a system.

A

True

22
Q

For a user to log onto a computer running Windows 7 the user need to have the allow interactive login right

A

False

23
Q

The Security Accounts Manager (SAM) is located on a domain controllers

A

False