'Examinable' Stuff Flashcards

1
Q

What is Authentication?

A

Verifying the identity of someone or something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Authorization?

A

Determining whether someone or something has permission to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Access refer to in the Authorization process?

A

Determining what actions
something or someone can perform on
the resource based on permission levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List 3 Windows Authentication methods.

A
  1. Kerberos version 5 protocol
  2. NT LAN Manager
  3. Certificate mapping
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KDC

A

Key Distribution Center - Kerberos uses this trusted intermediary to manage the use of encrypted keys passed between the clients and server for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some new authentication features in Windows 7?

A
  1. Smartcards
  2. Windows Biometric Framework (for Biometrics)
  3. Managing file access in Win 7 through NTFS permissions
  4. online identity integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are NTFS permissions?

A

Define the type of access granted to a user, group or computer for a file or folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 levels of permission?

A
  1. Shared folders permissions

2. NTFS file system permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Shared Folder permissions?

A

Allow security principals such as users to access shared resources from across the network. Shared folder permissions are only in effect when users access some resource from across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are NTFS file system permissions?

A

Always in effect, whether connected across the network or logged on to the local machine where the resource is located. You grant NTFS permissions to a user of group for a file or folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are explicit permissions?

A

User creates a file or folder and assign permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inherited permissions

A

File or folder permissions for a child object default from its parent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Effective permissions

A

A file or folder’s final, combined permission set that is determined by Windows 7 when a file or folder contains both user and group permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when determining effective permissions?

A
  1. User and group permissions are combined

2. Deny overrides allos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are shared folders?

A

Shared folders are folders that allow network access to their content.
You can share folders but you cannot share individual files.
The default shared folder’s permission is full control for the user that shared the folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What methods can be used to share folders?

A
  1. MMC console using share’s snap-in
  2. In Windows Explorer
  3. Command line using ‘net share’ command
  4. Through computer management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network and Sharing Center

A

Provides services to view, configure and troubleshoot your network access and sharing capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What else does NSC do?

A

Provides centralized control of network features:

  • network map
  • network location - private, public, domain
  • network discovery

Controls sharing capabilities related to various network resources:

  • file sharing
  • public folder sharing
  • printer sharing
  • media sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network discovery

A

After you enable Network Discovery, components on the computer allow it to map the network and respond to map requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NTFS File Compression

A

The method used by the NTFS file system to compress files and folders and volumes

We use compression to save disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do you determine version of Windows (32 or 64bit)

A

Start -> Right-click Computer -> Properties OR

use msinfo command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an upgrade path?

A

Set of options for upgrading from one Windows OS to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Upgrade installation

A

Retains files, settings, and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Custom installation

A

Otherwise known as clean installation. Overwrites files, settings, and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Windows Upgrade Advisor

A

Scans PC for potential hardware devices and programs which may cause problems

Helps determine if:

  • your computer can run Windows 7
  • which editions and features will work
  • whether your computer has any compatibility issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Windows 7 Compatibility Center

A

Provides Win7 programs,updates, drivers, and more that are compatible with Window 7
- Can be used to search software issues whilst upgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

List common installation methods

A
  1. High Touch Installation (HTI)
  2. Lite Touch Installation (LTI)
  3. Zero Touch Installation (ZTI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

High Touch Installation

A

Requires manual configuration of each system

May include retail media or standard ISO file

Uses installation DVD or USB and manual installation of OS on every computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

LTI

A

Requires human intervention in early phases, but is automated or unattended from that point on

Works well in environments of 150+ computers

You need WAIK, Windows Deployment services, and microsoft deployment toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ZTI

A

Fully automated, “touchless” installation of Windows

Requires System Center Configuration Manager (SCCM) - deploys and updates servers, client computers, and all kinds of devices on a network

  • Geared for environments of more than 500+ computers
  • Steep learning curve
  • Considerable budget compared to HTI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Windows Intune

A

Allows you to manage installations and upgrades from the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Windows Easy Transfer

A

Helps you move files and settings from one computer running Windows to another. Cannot transfer programs
Generates .MIG file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a User Account?

A

A collection of information that defines:

  • actions that can be taken on a computer
  • files and folders that can be accessed (rights, policies, permissions)

Keeps track of user preferences such as the desktop background, window color, and screensaver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

User Account Control

A

A feature in Windows Vista and Windows 7 that requires administrative-level permission to make changes to your computer that affects security or affects settings for other user accounts - 4 levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Control Panel

A
A utility that allows you to 
> configure OS features
> set up hardware
> install/uninstall software
> create and modify users
> perform system maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Administrative Tools

A

A set of utilities for managing advanced Windows features and diagnosing system problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Windows Desktop Settings

A

A broad term that refers to many different configurable settings for personalizing Windows such as the Windows theme, desktop background, mouse clicks, pointer speeds, gadgets, shortcuts, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Aero Interface

A

Aero Shake
Aero Snap
Aero Peek
Show Desktop button (far right end of Desktop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Shortcuts

A

Icons or links that give you quick access to an original source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Gadget

A

A small, single-purpose application that can be installed on the Windows 7 desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

User Profile

A

Contains all of a user’s personal preferences - from theme choice to screensavers to shortcuts

User profile != User account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Local profile

A

Available only on computer on which it was created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Roaming profile

A

Enables a user to use any computer to connect to a Windows domain and access his/her profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Briefly describe virtualization

A

A technology that creates an abstract version of a complete OS environment (incl. a processor, memory, storage, network links, a display, and so forth) entirely in software

Software produces a virtual computer or a virtual machine (VM)

Has a guest OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Microsoft Virtualization

A
Windows Virtual PC
Windows XP mode
Microsoft Enterprise Desktop Virtualization (Med-V)
Virtual Desktop Infrastructure
Application virtualization (App-V)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Ease of Access Center

A
  1. Magnifier
  2. Narrator
  3. On-screen keyboard
  4. High contrast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

App-V

A

Permits users to launch and run applications on their desktops without installing or rebooting machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

VDI

A

Runs a desktop OS within a vm run on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

MED-V

A

A way to deliver legacy applications to end users on centrally configured and managed VMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Windows XP mode

A

An extension to Windows Virtual PC

When installed on Windows 7, enables users to run applications inside the VM that won’t work on Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is an application?

A

A program that runs on top of the OS or from a server

Helps a user perform a specific task such as word processing, appointment scheduling or accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Local installation of an application

A

software files running directly from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Network installation of an application

A

software files are made available from an application server on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

msconfig

A

System configuration utility

  • Enable or disable startup services
  • set boot options such as boot into Safe Mode
  • Access tools like Action Center and Event Viewer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Windows 7 Library

A

A virtual folder that can display content from different locations (folders, for example) on your computer or external hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Encryption

A

Encrypted data is ‘scrambled’ but still readable and usable by the user who encrypted the file

the user and other authorized users can still open and change the file as necessary

Encryption uses:

  • encryption keys
  • certs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How to encrypt files and folders in Windows 7

A

Advanced Attributes dialog box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is compression?

A

The process of decreasing the size of files/folders without affecting their content

Compressing files replaces repeated data with pointers to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

BitLocker Drive Encryption

A

Encrypts an entire fixed disk to prevent access by unauthorized users

Windows Ultimate, Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

BitLocker To Go

A

Encrypts removable drives such as USBs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Basic disk

A
  • Contains only simple volumes
  • Uses partitions and logical drives
  • Partition styles: MBR, GUID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Dynamic disk

A

Divided into volumes instead of partitions

Contains simple,spanned, striped, mirrored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Disk Management

A

Part of Computer MMC snap-in

  • Add a new disk
  • Modify the configuration of an installed disk
  • Convert a disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Simple volume

A

Uses free space available on a single disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Spanned volume

A

Extends a simple volume across multiple disks to a maximum of 32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Mirrored volume

A

Duplicates data from one disk to a second disk for redundancy and fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Striped volume

A

Stores data across two or more physical disks; Raid-0 or RAID-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Other types of storage

A

eSATA
USB and USB 2.0
Firewire
iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Device manager

A

Displays a list of all devices currently installed on the computer and their status

Must be admin to use Device Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Cloud storage for Windows users

A

Windows Live Mesh
Windows Live Skydrive
OneNote to Skydrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

When to use HomeGroups or Public Folders?

A

Small office/home office, all using Windows 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

When to use Workgroup?

A

Peer-to-peer network that includes a mix of computers running Windows 7 and Windows Vista or Windows XP, and you want to share files between the computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

When to use domains and AD?

A

Large business environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What are the caveats of Homegroup?

A
  1. Can only join and not create Homegroups in Windows Start and Basic editions
  2. Can only join one homegroup at a time
  3. Can’t limit access to shared items to individual users
  4. Non-Windows 7 users require additional setup steps to access shared items in a homegroup
  5. Must already have a network set up (either wired or wireless)
  6. To create or join a homegroup, computer’s network location must be set to ‘Home Network’ in the network and sharing center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Permissions

A

Rules applied to users and groups to limit actions they can take on shared resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Share permissions

A

Applies to users who connect to a shared folder over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

NTFS

A

Apply to users who log on locally or from across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What are effective permissions?

A

Granted to a user or group based on the permissions granted through group membership and any permissions inherited from the parent object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Name some Windows built-in utilities

A

Disk Defragmenter, Disk cleanup, task scheduler, and the maintenance section of the Action Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Disk defrag

A

A utility that helps improve the computer’s performance by moving sectors of data on the hard disk, so that files are stored sequentially.

Minimizes the movement of a hard disk’s arm must make to read all of the sectors that make up a program

Set up to automatically run once a week

Can take between several minutes an hour depending on the size and level of fragmentation on the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

How to run disk defrag from the command line

A

‘defrag/?’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Solid State Drives and disk defrag

A

SSDs differ from hard disks. They use SS memory to store data, as opposed to writing data to sectors of a hard disk. Therefore, they do not require disk defrag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Disk Cleanup

A

Helps user remove unnecessary files from their computers

  • downloaded program files
  • temporary internet files
  • offline webpages
  • files left after running software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Task scheduler

A

Enables a user to schedule and automate a variety of actions such as starting programs, displaying messages, and even sending e-mails

Tasks are scheduled by specifying a trigger, which is an event that causes a task to run, and action, which is the action taken when a task is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Action Center

A

Action Center provides a single interface in which you can view the status of security and maintenance features and it alerts you to problems you need to correct and usually provides a way to fix it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

System information

A

Displays a wealth of information about the computer’s hardware, drivers and system software

Check system info for possible clues about the source of system-related issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Windows Registry

A

A database of configuration settings for your computer

Self-sufficient, and rarely requires maintenance

Can you a registry cleaner to remove settings no longer used

Made up of keys, subkeys and values

Subkeys have values that make up the preferences, configuration settings and so on of the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Types of Windows Updates

A
  1. Important updates: security and critical updates, hotfixes, service packs, and reliability improvement
  2. Recommended updates: These include software updates, and new or improved features to help keep software running optimally
  3. Optional updates: Optional device drivers for components on your computer, or new or trial Microsoft software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Action Center tracks 7 security features. What are they?

A
  1. Network firewall
  2. Windows update
  3. Virus protection
  4. Spyware and unwanted software protection
  5. Internet security settings
  6. UAC
  7. Network Access Protection -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Windows Defender

A

A free software program that provides antispyware detection for a Windows computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Spyware

A

A type of program that installs itself on your computer without your permission, monitors your computing activities and reports the activities back to the spyware writer or third party.

92
Q

MSE

A

Microsoft’s Security Essentials is a program that helps protect your computer from viruses and other malware

93
Q

What is a back-up?

A

A properly secured copy of files and folders - and sometimes settings - usually saved in a compressed file format

94
Q

Why do we create back-ups?

A

So you can restore files and settings in the event of data loss from a hard disk failure, accidental erasure or disk formatting, or natural events

95
Q

Windows Backup

A

Designed to back up application data and settings. Does not back up:

  • program files unless part of system image
  • Files stored in a FAT formatted volume
  • Files in the Recycle Bin
  • Temp files stored in drives < 1Gb
  • Files stored on Mapped network drives, on the Internet, on the drive you are saving the backup to; only local files are in included in the back-up
  • Can store backups to CD/DVDs, an external drive, another internal drive, or on a network drive (Only Windows 7 Ultimate, Enterprise and Professional editions allow storing backups to network drive)
96
Q

System Image

A

An image of an entire hard drive that includes all files necessary to restore OS

By default, includes the Windows folder, all system settings, programs and files

97
Q

How to store a System Image

A

CD/DVD
USB
Hard drive
Network location

98
Q

Two methods for creating system image

A
  1. Create system image as part of the automatic Windows Backup process
  2. Creating a system image manually, which involves running the backup and selecting the drives you want to include in the image
99
Q

Advanced Recovery options

A
  1. Use a system image you created earlier to recover your computer
  2. Reinstall Windows (requires installation disc)
100
Q

Microsoft Assessment and Planning toolkit

A

Provides:

  • Hardware inventory
  • Compatibility analysis
  • Readiness reporting
101
Q

What is a Server Role?

A

Describe a server’s primary function

Examples:
AD DS
DNS server
DHCP server
Application server
Fax server
File services
Hyper-V
Print and document services
Remote Desktop services
Web server (IIS)
AD Lightweight Directory services
102
Q

What is a server role?

A

A role is a collection of software that collectively enables the server to provide some service to the network. Generally, a role is what you bought the server for. Ex. ‘Domain Controller’ or ‘Application server’

103
Q

What is a Server Feature?

A

A feature typically does not describe the server’s primary function. Rather, it describes a server’s auxilliary or supporting function.

104
Q

Tools for managing roles and features

A
  1. Initial Configuration Task wizard
  2. Server Manager
  3. Deployment Image Servicing and Management tool (DISM)
105
Q

What is a File Server?

A
  1. Provides storage for user’s files
  2. Shares the folders that contain user’s files
  3. Ensures appropriate levels of access to user’s files through security settings
  4. Provides backup and restore mechanisms
106
Q

What is a Domain Controller?

A
  1. Holds a copy of AD DS
  2. Responds to requests for AD information
  3. Authenticates users to the network
  4. is located by querying DNS
107
Q

What is an Application Server?

A

An application server is a computer that is dedicated to running network-aware application software (traditional applications, web-based applications)

108
Q

What is a Web Server?

A

A server computer attached to the Internet or the corporate intranet providing content:

  1. static content
  2. web-based applications
  3. streaming content
109
Q

What is a directory service?

A

A directory service allows businesses to define, manage, access and secure network resources, including files, printers, people and applications.

110
Q

What is AD?

A

AD provides a central, single point of management for network resources

Active Directory provides a single sign-on to allow access to all resources (when permitted) from a single log-on

It is a directory service created by Microsoft for Windows domain networks

111
Q

AD DS

A

A fully-fledged directory service also referred to as directory services

112
Q

AD LDS

A

Active Directory Lightweight Domain Services

113
Q

AD LDS

A

A lightweight, flexible platform without the weight

Provides flexible support for directory-enabled applications, without the dependencies that are required for AD DS

Provides much of the same functionality as AD DS but does not require the deployment of domains or domain controllers

Suited to developers who want to use APIs but don’t want the complexity of the full AD DS

114
Q

What is an AD structure?

A

A hierarchical arrangement of information about objects

115
Q

What are objects in AD terms?

A
  1. resources (eg. printers)

2. security principals (users or computer accounts and groups) - assigned unique security identifiers (SIDs)

116
Q

Domain controller

A

A windows server computer that has been configured with AD DS

A server that stores the AD database and authenticates users with the network durin logon

117
Q

Functions of DCs

A
  1. Provides authentication
  2. Hosts operations master roles
  3. Hosts the global catalog
  4. Supports group policies and SYSVOL
  5. Provides for replication
118
Q

dcpromo

A

used to install AD DS

used to make a member server into a domain controller

119
Q

Directory Database

A

Each DC participates in storing, modifying and maintaining the AD database information that is stored on each controller

ntds.dit

Multimaster database - admin can update it from any DC

120
Q

DS Fault Tolerance

A

Microsoft directory services builds in fault tolerance through its multimaster domain controller design

  • all share the same database (ntds.dit)
121
Q

Read-only domain controller

A

Cannot be modified; replicates other dcs.
Can be used in less secure environments, but changes cannot be made directly to it.

Designed primarily to be deployed in a branch office

122
Q

What is RODC?

A

RODCs host read-only partitions of the AD DS database, only accept replicated changes to the AD DS, and never initiate replication

123
Q

RODCs provide

A
  1. Additional security for branch office with limited physical security
  2. Additional security if applications must run on a domain controller
124
Q

RODCs..

A

Cannot hold operations master roles or be configured as replication brighthead servers

Can be deployed on servers running Windows 2008 R2 Server Core for additional security

125
Q

Default domain policy

A

a preconfigured GPO that is added when a domain is created and linked at the domain level

Settings apply to all users and computer objects with the domain

126
Q

Default domain controller policy

A

A preconfigured GPO that is added when a domain is created, and linked at the Domain Controller’s OU level

Domain Controllers OU is created when a domain is created, and all domain controllers are automatically placed in this OU

127
Q

Replication

A

The process of keeping each DC in sync with changes

128
Q

Outbound replication

A

When a DC transmits replication information to other DCs

129
Q

Inbound replication

A

When a DC receives updates to the the AD database

130
Q

AD DS

A

A big database of objects (users, computers, groups) and is used to centrally organize, and manage all the objects within an organization

131
Q

What is an object in AD?

A

Used to represent a real-world item. Common objects are user objects and computer objects which represent people and their computers

Objects can be managed and administered using AD DS

Every objects has a set of attributes

132
Q

Schema

A

The definition of all the object types that AD can contain. Includes a list of properties that can be used to describe the objects

133
Q

Two components of the schema

A
  1. Classes
  2. Attributes - some required (username), some optional (user’s full name)

Schema is a set of blueprints for each of the objects

134
Q

Class objects include

A

OUs
Users
Computers

135
Q

Attributes include

A

Description
User name
Computer location

136
Q

Site

A

A group of well-connected computers/subnets (SMEs)

137
Q

Tree

A

A group of domains with a common namespace - the two part root domain name is common to other domains in the tree

138
Q

Forest

A

A group of one or more domains that share a common AD

Forest container defines the fundamental security boundary within AD

139
Q

Global catalog

A

Listing of all the objects in an entire forest

easily searchable

hosted on DCs that are designated as GC servers

140
Q

Organizational units

A

Used to organize objects within AD

Container for the objects - easier to manage

141
Q

OU structure

A

reflects the logical structure of the organization by modelling the organizational chart

142
Q

Benefits of OU

A
  1. Delegate permissions to an OU

2. Link GP to an OU

143
Q

Organization unit

A

A container object within a domain that you can use to consolidate users, groups, computers and other objects

144
Q

Reasons to create OUs

A
  1. Delegate administrative control

2. Configure objects within the organizational unit

145
Q

Group Policy

A

Allows you to configure a setting once, and have it apply to many users and/or computer objects

Can link GPOs to OUs, domains or sites

146
Q

Benefits of single domain

A
  1. Least expensive
  2. Easier to manage
  3. Simpler disaster recovery
147
Q

Top level domain name

A

.com

.net

148
Q

SYSVOL shared folder

A

Used to share info such as scripts and elements of GPOs between DCs - must be on NTFS drive

Database and log files can be located on different drives for optimization

149
Q

MMC-based tools to manage user accounts

A
  1. Server Manager

2. Computer Management

150
Q

Organizational Unit

A

Used to organize objects within AD

Any object (user, computer, group) can be placed within an OU to make them easier to administer

151
Q

Reasons for creating OU

A
  1. Administrative delegation

2. Management through group policy

152
Q

LDAP

A

Lightweight Directory Access Protocol

AD uses LDAP for communication

Enables data exchange between directory services and applications

153
Q

DN

A

Distinguished Name

LDAP uses a DN to uniquely identify each object in the directory

154
Q

DSAdd

A

Creating a variety of AD objects at command line

155
Q

Active Directory or domain-based groups

A

Use them to collectively treat a number of objects in an identical manner

Used to organize users

156
Q

Distribution groups

A

Used for email

157
Q

Security groups

A

Used to assign permissions

158
Q

Group scopes

A
  1. Global - used to organize users
  2. Domain Local- domain-level groups can be used to set up permissions on resources in the domain in which they exist
  3. Universal - used in multiple domain environments
159
Q

Common domain maintenance tasks

A
  • joining a domain
  • decommissioning a DC
  • troubleshooting ADI DNS
160
Q

What do we mean by ‘decommissioning’ a server?

A

Removing all the AD components, and return the DC to a member server role

161
Q

Tool to raise the domain functional level

A

ADUC

162
Q

Tool to raise the forest functional level

A

AD Domains and Trust

163
Q

W32tm

A

Windows Time Service - check and synchronize the time

164
Q

Regular password policies

A
  1. Enforce password history
  2. Maximum password age
  3. Minimum password age
  4. Minimum password length
  5. Password must meet complexity requirements
  6. Store passwords using reversible encryption
165
Q

How are password policies implemented?

A
  1. Creating a password settings object (PSO) and storing it in a password settings container (PSC)
  2. Apply a PSO to a user or global security group

Create PSO by using ADSI Edit

166
Q

PSO settings

A
msDS-PSOAppliesTo
msDS-MinimumPasswordLength
msDS-MinimumPasswordAge
msDS-MaximumPasswordAge
msDS-PasswordHistoryLength
msDS-PasswordComplexityEnabled
msDS-PasswordSettingPrecedence
msDS-PasswordReversibleEncryptionEnabled
msDS-LockoutThreshold
msDS-LockoutObservationWindow
msDS-LockoutDuration
167
Q

GPO

A

Container for group of settings (policy settings) that can be applied to user and computer accounts throughout an AD network

168
Q

Linking

A

the act of assigning GPOs to a site, domain or OU

169
Q

Inherited and cumulative

A

GPO settings are cumulative and inherited from the parent AD containers

170
Q

Policies are applied in the following order:

A
  1. Local policy
  2. Sites
  3. Domains
  4. OUs
  5. Child OUs
171
Q

Access Control Lists

A

Used to restrict who a GPO applies to

172
Q

rsop.msc

A

Resultant Set of Policies tool

173
Q

NTFS

A

Recoverable file system with many advantages over FAT

Uses database called Master File Table

174
Q

Hard disk configurations in Windows

A
  1. Basic

2. Dynamic

175
Q

Basic disk

A

A basic disk uses primary partitions, extended partitions and logical drives to organize data.

176
Q

Volume

A

A formatted partition

177
Q

How many primary partitions can a basic disk have?

A
  • 4 primary

- 3 primary and 1 extended (extended can contain up to 128 logical drives)

178
Q

Can partitions on a basic disk split or share data with other partitions?

A

No.

Each partition on a basic disk is a separate entity on the disk.

179
Q

Dynamic disk

A

Can contain a large number of dynamic volumes (around 2000) that function like the primary partitions on a basic disk

180
Q

What is spanning?

A

Combining separate dynamic hard disks into a single dynamic volume

181
Q

What is striping?

A

Splitting data among several hard disks for increased performance

182
Q

What is mirroring?

A

Duplicate data among several hard disks for increased reliability

183
Q

What operations can only be performed on dynamic disks?

A
  1. Create and delete simple, spanned, striped, mirrored and RAID-5 volumes
  2. Extend a simple or spanned volume
  3. Remove a mirror from a mirrored volume, or break the mirrored volume into two volumes
  4. Repair mirrored or RAID-5 volumes
  5. Reactivate a missing or offline disk
184
Q

Partition Types

A
  1. Master Boot Record - original method (limitation - partitions 2TB)
  2. GUID - larger partition sizes
185
Q

Limitations of MBR

A
  1. Potential for corruption of partition table, a region on the disk that maps sector to logical block numbers (only have 1 partition to keep track of all blocks in the partition)
  2. Limitation of 3 primary partitions and 1 extended - reducing the number of partitions to organize or manage the data
186
Q

NTFS Permissions

A

Apply to any file/folder on a disk that is formatted with NTFS

187
Q

Types of NTFS Permissions

A
  1. Read
  2. Read and execute
  3. List folder contents
  4. Write (does not include deleting files)
  5. Modify (can delete)
  6. Full control
188
Q

Share permissions

A

Apply only to shares when they are accessed over the network

189
Q

Types of Share Permissions

A
  1. Read
  2. Change
  3. Full Control
190
Q

Deny takes precedence

A

If user is assigned allow and deny permissions, deny wins.

191
Q

What is an implicit deny?

A

Aren’t any permissions assigned to a user, so the user cannot access the object.

192
Q

DACL

A

Discretionary Access Control List - a list of access control entries (ACE)

193
Q

How to modify NTFS and Share permissions?

A
  1. Server Manager
  2. Computer management
  3. Windows Explorer
194
Q

Combining NTFS and Share permissions

A
  1. Determine cumulative NTFS permissions
  2. Determine cumulative Share permissions
  3. Determine which of two provide least access (the ‘most restrictive permissions’)
195
Q

Administrative Share

A

All drives, incld. CD-ROM, are given a hidden share to the root of the drive (C$, D$, etc). Cannot change the permissions or properties of these shares

196
Q

ADMIN$

A

Admin share is another administrative share that maps to the location of the os

197
Q

PRINT$

A

Whenever you create a shared printer, the system places the drivers in this share

198
Q

named pipe

A

A piece of memory that handles a communication channel between two processes, whether local or remote

199
Q

NETLOGON share

A

used when processing logon requests from users

200
Q

SYSVOL

A

used to store Group Policy info and scripts that are accessed by clients on the network

201
Q

Name two types of quota

A
  1. Hard - enforces limit

2. Soft - sends notifications, does not enforce

202
Q

BitLocker

A

A technology designed to provide protection for entire disk drives

203
Q

BitLocker To Go

A

For encrypting USB flash drives

204
Q

Domain account

A

Used to authenticate access to shared domain resources

205
Q

Local account

A

Used to authenticate access to manage or use the local computer

206
Q

djoin.exe

A

Allows computers to join a domain while offline (Windows 7 and Windows 2008 R2)

207
Q

CIDR

A

Classless Interdomain Routing

208
Q

IPv4

A

Uses 32-bit for its addresses

Depending on the class, X bits will represent the network portion, and Y bits will represent the host

209
Q

IPv6

A

Uses 128-bit for addresses - provides more possible addresses to work with

210
Q

Class A

A

0 - 127
128 networks
16,777, 218 nodes per network

211
Q

Class B

A

128 - 191
16384 networks
65,536 nodes per network

212
Q

Class C

A

192-223
2,097,152 networks
256 nodes per network

213
Q

Class D

A

224-239

Multicast

214
Q

Class E

A

240-255

Experimental

215
Q

Subnet

A

A subnet is created from the host portion of an IP address to designate a ‘sub’ network

  • reduces administration, security (!) and traffic performance

Network subnetting is not physical, it is logical

Allows large IP ranges to be divided into smaller, logical and more tangible network segments

216
Q

Subnet mask

A

Defines a small network inside a larger network

217
Q

Subnet beginning ID

A

Always even

Network ID

218
Q

Subnet ending ID

A

Always odd

Broadcast ID

219
Q

CIDR

A

Provides flexibility to increase or decrease the class size as necessary

CIDR is the method to specify more flexible IP classes

220
Q

CIDR notation

A

A syntax for specifying IP addresses and their associated routing prefix

Appends a slash character to the address and the decimal number of leading bits of the routing prefix (identifies network portion of address - the larger rest of the address is the host)

221
Q

/number in CIDR notation

A

Refers to mask length

222
Q

Eight special numbers for subnet masks

A

255, 254, 252, 248, 240, 224, 192, 128

223
Q

Share vs NTFS permissions

A

Share permissions control network access to a particular resource. Share permissions do not affect users who log on locally. You set share permissions in the Advanced Sharing dialog box, which you access from the Sharing tab of a folder’s properties dialog box.

NTFS permissions apply to folders and files on an NTFS-formatted drive. They provide extremely granular control over an object. For each user to whom you want to grant access, you can specify exactly what they’re allowed to do: run programs, view folder contents, create new files, change existing files, and so on. You set NTFS permissions on the Security tab of the properties dialog box for a folder or file.

224
Q

Most restrictive permissions

A

It’s important to recognize that the two types of permissions are combined in the most restrictive way. If, for example, a user is granted Read permission on the network share, it doesn’t matter whether or not the account has Full Control NTFS permissions on the same folder; the user gets only Read access when connecting over the network.

225
Q

Effective permission set

A

In determining the effective permission for a particular account, you must also consider the effect of group membership. Permissions are cumulative; an account that is a member of one or more groups is granted all of the permissions that are granted explicitly to the account as well as all of the permissions that are granted to each group of which it’s a member. The only exception to this rule is Deny permissions, which take precedence over any conflicting Allow permissions.