Communications and Security in Windows Server 2008 Flashcards

Secure and Organizations AD and install an IPSec Policy on a network and an RODC on a domain

You may prefer our related Brainscape-certified flashcards:
1
Q

Steps for securing authentication are

A
  1. Design an authentication strategy
  2. Create Accounts
  3. Secure the authentication process
  4. Educate users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Guidelines for OU organization and structure design

A

Identify and create admin groups ot which rights need to be delegated

Idnetify users or groups to which rights need to be delegated in the OU and place them in the adminstrative group

Create objects that need to be controlled and place them in the OU

In the administrative group, delegate administrative tasks to the OU

to hide OU objects set it for list content permission for the users you want to see and remove this permission from others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To create an OU to hide objects

A

modify the ACL of the OU - the list of permissions that are attached to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command Line Utility for setting an SPN

A

setspn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 local server 2008 accounts

A

Administrator

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DC default accounts

A

Administrator
Guest Account
HelpAssistant Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PA

A

Protected Administrator Account - in admin group with the lowest rights available to an admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PasswordReplicationAllowed for a RODC means

A

The credentials for the specified groups are replicated to the RODC from the writable DC configured as its replication source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec

A

2008 Internet protocol security (IPSec)enforces secure communication between systems on an IP network. provides a stronger access security model than the firewall mechanism without require complex configurations

use ipsec snap in to create, edit and assign policies local and network

Rules it uses:

Filter list
Filter action
Authentication method
Tunnel endpoint
Connection type

delete policy before deleting the attached GPO or it will continue to run

computers, OUs, Domains and sites

includes policy’s name and description
cryptographic key exchange settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPSEc policy ports

A

allow requests are
POrt 80 - default http
Port 20 - default for FTP file Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 steps to creating a policy

A
  1. Creating filter lists
  2. Setting Filter Actions
  3. Creating a policy and adding rules to it

go to security node in gpme
choose IP Security Policies on Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ReplicaDomainDNSName =

A

Have to have [DCINSTALL] at top of answer file for installing an RODC

DNS name of Domain where RODC will be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DCAccountName

RODC

A

name of the RODC Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PasswordReplicationDenied

RODC

A

specifies the credentials of the securty principals that cannot be replicated to the RODC from the writable DC

By default this is applied only to the Denied RODC Password Replication security group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PasswordReplicationAllowed=brodacdero.com"Allowed RODC Password Replication Group”

RODC

A

All the security principals to the Password Replication policy need to have this line done ie: guestuser, admin, mark, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
DelegateAdmin
SiteName=Default-File-Site-Name
IsntallDNS=yes
ConfirmGc=Yes  
ReplicationSourceDC
A

(gc=GlobalCatalog)

17
Q

To create a RODC

A

log onto the DC, cmd prompt,
dcpromo /CreateDCAccount

dcpromo /CreateDCAccount(Username.domain)

/unattend “path to answerfile”

Log onto server and run dcpromo /useexistingAccount:Attach /unattend:”pathOfFile”

18
Q

ReplicationSourceDC

A

parameter specifies the FQDN of the DC that must replicate domain info to the RODC

19
Q

parameter that specifies the location of the directory database for the answer file for an RODC account

A

DatabasePath

20
Q

To create a filter list what steps must be done

A

Access options to manage IP filter lists and actions and use a wizard to add a filter list

21
Q

need to create filter action for IPSEC steps are

A

Access options to manage filter lists, launch a wizard to add a filter action and configure the action settings

22
Q

IP filter list and filter action have been created what is next

A

Create the IPSec policy, add the policy rules and assign the policy