Final Flashcards
After a DNS zone has been secured with DNSSEC, what additional data will be returned to a client as a result of a query?
Information about the organization administering the zone
Information about the server providing the DNS zone
Digital signatures of the administrators of the zone
Digital signatures for the returned records
Digital signatures for the returned records
What is the function of the RRSIG record?
Used to sign the records
Returned to positively deny that the requested A record exists in the zone
Returned to the client in response to a successful query along with the A record
Used to sign the zone
Returned to the client in response to a successful query along with the A record
Used to sign the zone
What DNS security feature in Windows Server 2012 R2 can be configured to allow source port randomization for DNS queries?
Randomization factor
Initialization vector
Socket pool
Name Resolution Policy Table
Socket pool
How are values for DNS Cache Locking expressed?
As a percentage of the TTL
As a percentage of the TTL remaining
As a fixed period of time in hours
As a fixed period of time in days
As a percentage of the TTL
What is the net effect if recursion is disabled on a DNS server and the DNS server does not have any forwarding or root hints configuration present?
The DNS server will be able to provide only answers to queries about internal DNS zones
The DNS server will be able to provide only answers to queries about external DNS zones
The DNS server will be able to provide answers to queries about internal and external DNS zones
None of the above
The DNS server will be able to provide only answers to queries about internal DNS zones
Which of the following commands would correctly set the DNS socket pool to a value of 7,000?
dnscmd /Config /SocketPoolSize 7000
dnscmd /Set /SocketPoolSize 7000
dnscmd /GetSocketPoolSize | dnscmd /Set /SocketPoolSize 7000
dnscmd /Configure /PoolSize 7000
dnscmd /Config /SocketPoolSize 7000
dnscmd /Set /SocketPoolSize 7000
What Windows Server 2012 R2 DNS feature prioritizes DNS responses based on the subnet of the requesting client?
Conditional forwarding
Iterative queries
Recursive queries
Netmask ordering
Netmask ordering
The main page of your company’s Intranet portal is accessible by the FQDN home.na.adatum.corp. How would you configure an entry in the GlobalNames zone for this?
Add a single A record with the IP of one of the web servers hosting the portal
Add a single CNAME record pointing to the A record in another zone
Add multiple CNAME records pointing to all the A records in the other zones
Add multiple A records with all the IPs of the web servers hosting the portal
Add a single CNAME record pointing to the A record in another zone
DNSSEC uses public key infrastructure (PKI) encryption to provide what assurances to DNS clients? (Choose all that apply)
Proof of identity of DNS records
Confidentiality of information
Availability of services
Verified denial of existence
Proof of identity of DNS records
&
Verified denial of existence
How can you best go about delegating administrative access to those employees who need to be able to manage DNS?
Add the user’s Active Directory accounts to the Domain Admins security group
Add the user’s Active Directory accounts to the Enterprise Admins security group
Add the user’s Active Directory accounts to a special universal distribution group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group.
Add the user’s Active Directory accounts to a global security group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group.
Add the user’s Active Directory accounts to a global security group created for this purpose (e.g., DNS Service Managers) and then add that group to the DNS Admins local group.
In Window Server 2012 IPAM, what is the highest-level entity within the IP address space?
IP address range
IP address block
IP address container
IP address
IP address block
Which of the following statements regarding the server requirements for an IPAM server is false?
The server must have a dual-core CPU of at least 2.0 GHz
The server must be running Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2
The server must have at least 4 GB of RAM installed
The server must have at least 80 GB of free disk space available
The server must be running Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2
Which of the following database types can be used with Windows IPAM? (Choose all that apply)
MySQL
Microsoft SQL
Windows Internal Database
Access
Microsoft SQL
& Windows Internal Database
Which PowerShell cmdlet is the correct one to use to create the IPAM provisioning GPOs?
Set-IpamGpoProvisioning
Initiate-IpamGpoProvisioning
Perform-IpamGpoProvisioning
Invoke-IpamGpoProvisioning
Invoke-IpamGpoProvisioning
Which of the following categories will you not find in the Monitor and Manage section of the IPAM console?
DNS and DHCP Servers
DHCP Scopes
DNS Zone Records
DNS Zone Monitoring
DNS Zone Records
Which of the following can be imported into IPAM using the IPAM console?
IP Addresses
IP Address Block
IP Address Ranges
All of the above
All of the above
In Window Server 2012 IPAM, what is the second-highest-level entity within the IP address space?
IP address range
IP address block
IP address container
IP address
IP address range
Which of the following advantages are provided to a SQL server when it’s used with IPAM?
Scalability
More secure
Reporting
Additional disaster recovery
Scalability, Reporting, & Additional disaster recovery
As it pertains to IPAM, what is the name of the process of retrieving a list of all domain controllers, DNS servers, and DHCP servers?
Server discovery
IPAM discovery
Provisioning IPAM
Verifying IPAM access
IPAM discovery
Members of which IPAM security group have the ability to view information in IPAM and can perform server management tasks?
IPAM MSM Administrators
IPAM ASM Administrators
IPAM IP Audit Administrators
IPAM Administrators
IPAM MSM Administrators
Which of the following items would not be considered a logical component of Active Directory?
Domains
Organizational Units
Domain Controllers
Trust relationships
Domain Controllers
In an organization that has three Active Directory forests with a total of six Active Directory domains, how many schemas will exist in the organization?
Three
Six
Nine
Eighteen
Three
What are the requirements to perform an in-place upgrade of a domain controller to Windows Server 2012 R2?
(Choose all that apply)
The domain controller must be running Windows Server 2003 R2, Windows Server 2008, or Windows Server 2008 R2
The domain controller must be running Windows Server 2008 or Windows Server 2008 R2
The forest functional level will need to be at Windows Server 2003 or higher
The forest functional level will need to be at Windows Server 2008 or higher
The domain controller must be running Windows Server 2008 or Windows Server 2008 R2
&
The forest functional level will need to be at Windows Server 2008 or higher
Which of the following desirable features first became available with the Windows Server 2008 domain functional level?
SYSVOL replication using DFSR instead of NTFRS
Automatic SPN management
Authentication mechanism assurance
UserPassword attribute
SYSVOL replication using DFSR instead of NTFRS
You want to use the new features of Key Distribution Center (KDC) support for claims, compound authentication, and Kerberos armoring in your domain. What must you do first? (Choose two answers)
Raise the domain functional level to Windows Server 2008 R2
Raise the domain functional level to Windows Server 2012
Install at least one Windows Server 2012 domain controller
Retire all Windows 2000 Server member servers
Raise the domain functional level to Windows Server 2012
& Install at least one Windows Server 2012 domain controller
Which of the following desirable features first became available with the Windows Server 2008 R2 forest functional level?
Active Directory recycle bin
Domain rename
Cross-forest trusts
KCC algorithm improvements
Active Directory recycle bin
Which of the following accurately represents a User Principal Name?
MYCO\jdoe
jdoe@myco
jdoe.myco.corp
jdoe@myco.corp
jdoe@myco.corp
Your organization currently has three business units (sales, manufacturing, and service) that function mostly independently. What would be the best approach to take when designing a new Active Directory forest environment for your organization? Be sure to consider the current-day environment and the possibility of future change.
Create a multi-domain forest, with one domain per business unit
Create multiple forests, with one forest per business unit, with no trusts
Create multiple organizational units as needed to organize each business unit’s objects
Create multiple forests, with one forest per business unit, with trusts between each forest root domain
Create multiple organizational units as needed to organize each business unit’s objects
Which Active Directory upgrade method presents the lowest overall cost and risk to an organization, assuming that required physical or virtual servers are available and on hand?
In-place upgrade
Add new domain controllers
Migrate to a new domain
None of the above
Add new domain controllers
Which partition contains definitions of all objects and attributes that can be created in the directory?
Schema partition
Configuration partition
Domain partition
Application partition
Schema partition
Which of the following attributes are true of the automatically generated trusts created when a domain is added to the forest? (Choose all that apply)
The trust is two-way between the child domain and the root domain
The trust can be configured to be one-way or two-way
The trust can be configured to be incoming or outgoing, or both
The trust is always transitive
The trust is two-way between the child domain and the root domain
&
The trust is always transitive
You have just created a one-way incoming trust in your domain for an external domain used by a partner company to allow your domain’s users to access a resource in the partner’s domain. What is the next step that will need to be performed to complete the trust?
You will need to create a one-way outgoing trust in the external domain
The partner will need to create a one-way outgoing trust in the external domain
You will need to create a one-way outgoing trust in your domain
The partner will need to create a one-way outgoing trust in your domain
The partner will need to create a one-way outgoing trust in the external domain
Which of the following commands correctly illustrates how to create a one-way external trust from the adatum.local domain to the contoso.local domain?
netdom trust adatum.local /Domain:contoso.local /add
netdom -addtrust /Local:adatum.local /External:contoso.local
netdom trust –add adatum.local /Domain:contoso.local
netdom trust adatum.local /Domain:contoso.local /add
Which of the following scenarios would allow the creation of a shortcut trust? (Choose all that apply)
Between a third-level child domain and a second-level child domain in a different domain tree of the same forest
Between two third-level child domains in the same forest
Between two second-level child domains in different forests
Between a third-level child domain and a forest root domain in different forests
Between a third-level child domain and a second-level child domain in a different domain tree of the same forest
&
Between two third-level child domains in the same forest
When disabling SID filtering on a forest trust, what netdom switch should be used?
/disenablesidhistory:Yes
/enablesidhistory:No
/quarantine:No
/sidhistory:Disable
/enablesidhistory:No
In which scenario would you want to disable SID filtering?
There is no trust between all Domain Admins and Enterprise Admins within both trusts
Forests have been renamed
Domains have been authoritatively restored
User accounts have been involved in a domain migration
User accounts have been involved in a domain migration
What is the disadvantage of configuring selective authentication for a trust?
The inability to definitively control who is accessing what resources
The administrative overhead involved to configure and maintain user access to resources
The SIDs of the foreign security principals will need to be manually obtained
Security groups from the external domain must be used for the foreign security principals
The administrative overhead involved to configure and maintain user access to resources
Which of the following attributes are true when discussing manually created trusts?
The trust is two-way between the child domain and the root domain
The trust can be configured to be one-way or two-way
The trust can be configured to be incoming or outgoing, or both
The trust is always transitive
The trust can be configured to be one-way or two-way
& The trust can be configured to be incoming or outgoing, or both
Which of the following scenarios represents the best reason for creating a forest trust between two Active Directory forests?
Company A has purchased Company B
Company A wants to use an application developed by Company B
Company B wants to access data on a Company A web server
Company B wants to send email to recipients in Company A
Company A has purchased Company B
What type of trust allows users of an internal forest to authenticate to and/or gain access to all resources of an external forest?
Realm trusts
Shortcut trusts
Forest trusts
External trusts
Forest trusts