Final exam Flashcards

1
Q

Active Directory is a database based on the ___ ___ ___ format. The ESE is resonsible for managing changes to the Active Directory database.

A

Extensible Storage Engine (ESE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ ___ is a manual process that defragments the Active Directory database in addition to reducing its size.

A

Offline Defragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To back up Active Directory you must install the ___ ___ ___ feature from the Server Manager console.

A

Windows Server Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ___ provides a single access point to all aspects of Group Policy that were previously spread across other tools, such as Active Directory Users and Computers, Active Directory Sites and Services, Resultant Set of Policy (RSoP), and the Group Policy Management Editor.

A

Group Policy Management MMC pg203

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ___ tab allows administrators to view the locations to which the policy is linked.

A

scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A new Group Policy management feature in Windows Server 2008 is the ability to create ___ that can act as templates when creating new GPOs for your organization.

A

Starter GPOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into an ___ file.

A

.msi file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Modifications to .msi files require transform files, which have an ___ extension.

A

.mst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___ option is helpful when you are deploying required applications to pertinent users and computers.

A

Assign option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

By implementing ___ ___ when folder redirection is also configured, administrators can control the amount of information that is stored on the server.

A

disk quotas

pg174

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you set the ___ ___ to zero, the system attempts to update the policy every 7 seconds.

A

refresh interval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When you modify settings that you wish to be immediately invoked without requiring a restart, a new logon session, or waiting for the next refresh period, you can force a manual refresh. This process uses the ___ tool.

A

gpupdate.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You can configure one or more GPOs within a domain and then use a process called ___ , which applies these settings to various containers within Active Directory.

A
  • linking*
  • pg139*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ ___ ___ works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible.

A

Offline file storage

pg139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three types of Group Policy Object (GPOs)?

A
  1. Local GPOs
  2. Domain GPOs
  3. Starter GPOs

pg141

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ ___ ___ contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU. The ___ must be associated with the container to which it is applied. This association occurs by linking the Group Policy to the desired Active Directory object.

A
  • Group Policy Object (GPOs)*
  • GPO*

pg141

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Configuring Strong Passwords

___ ___ is an automated password-cracking tool that will try every possible combination of characters until the correct sequence of characters is finally discovered.

A
  • Dictionary attack*
  • pg127*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The recommended solution for reducing the risks associated with the Administrator account is to use a standard user account and the ___ __ ___ option in the GUI or the ___ command-line tool when it is necessary to perform an administrative task.

A
  • Run as administrator*
  • runas*
  • pg129*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ is the process of confirming a user’s identity using a known value such as a password, the pin number on a smart card, or the user’s fingerprint or handpriint in the case of biometric ____ .

A

Authentication

pg 102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two types of groups that can be created and stored in the Active Directory database?

A

Distribution groups

Security groups

pg104

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ are Nonsecurity-related groups created for the distribution of information to one or more persons.

A

Distribution groups

pg104

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ are security-related groups created for purposes of granting resource access permissions to multiple users.

A

Security groups

pg104

23
Q

___ ___ can contain user accounts, computer accounts, and/or other global or universal groups from anywhere in the forest.

A

Universal groups

pg105

24
Q

The global catalog has what four main functions in an Active Directory invironment?

A
  1. Facilitating searches for objects in the forest.
  2. Resolving User Principal Names (UPNs).
  3. Maintaining universal group membership information.
  4. Maintaining a copy of all objects in the domain.
25
Q

When a user initiates a search for an object in Active Directory, the request is automatically sent to TCP port 3268, which is used by Active Directory to direct these requests to a global catalog server.
What is this process called?

A

Facilitating searches for objects in the forest

26
Q

Active Directory supports how many FSMO roles?

A

five

27
Q

___ ___ will transmit changes to the Active Directory database almost as soon as they occur; intersite replication occurs on a scheduled basis (every 15 minutes by default).

A

Intrasite replication pg 60

28
Q

Active Directory creates a ___ ___ with the idea that all writeable domain controllers in a domain should communicate Active Directory information to each other, in addition to communicating forest-wide information with other domains.

A

replication topology

pg 62

29
Q

To create a replication topology in a multisite network, one domain controller within each site runs the ___ ___ ___ , which is a process that is responsible for selecting a bridgehead server and mapping the topology to be used for replication between sites.

A

Intersite Topology Generator (ISTG) pg 68

30
Q

Active Directory Installation Wizard, ___ , will guide you through any of the following installation scenarios:

A

dcpromo

31
Q

200 MB minimum free space on the previously mentioned NTFS partition for Active Directory database files is a requirement for ___.

A

Windows Server 2008 Active Directory

32
Q

You can launch the Active Directory Installation Wizard using the dcpromo.exe command line tool or from the ___ ___ utility that’s installed in the Administrative Tools folder of each Windows Server 2008 server.

A

Server Manager

33
Q

___ ___ ___ are used to seperate forest-wide DNS information from domain-wide DNS information to control the scope of replication of different types of DNS data.

A

Application directory partitions

34
Q

A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a ___ ___.

A

domain controller (DC)

35
Q

The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called ___.

A

replication

36
Q

Windows Server 2008 introduces the ___ ___ ___ , a domain controller that contains a copy of the ntds.dit file that cannot be modified and that does not replicate its changes to other domain contollers within Active Directory.

A

Read-Only Domain Controller (RODC)

37
Q

LDAP refers to an object using its ___ ___ , which references an object in the Active Directory directory structure using its entire hierarchical path, starting with the object itself and including all parent objects up to the root of the domain.

A

distinguished name (DN)

38
Q

What three types of DNS zones are there?

A
  1. Primary zone
  2. Secondary zone
  3. Stub zone
39
Q

DNS also provides a ____ , which enables a host to detemine another host’s name based on its IP address.

A

reverse lookup process

40
Q

____ , which is still in use today, enables TCP/IP workstation to retreive settings for all the configuration parameters it needs to run, including an IP address, a subnet mask, a default gateway, and Domain Name System (DNS) server address.

A

Bootstrap Protocol (BOOTP)

41
Q

DHCP provides what four key benefits to those managing a TCP/IP network?

A
  • Centralized administration of IP configuration
  • Dynamic host configuration.
  • Seamless IP host configuration
  • Flexibility and scalability.
42
Q

What does the DHCP message DHCP-DISCOVER mean?

A

Sent by clients via broadcast to locate a DHCP server. Per RFC 2131, the DHCPDISCOVER message may include options that suggest values for the network address and lease duration.

43
Q

The initial DHCP lease process is accomplished using a series of exchanges between a DHCP client and DHCP server that utilizes what four messages?

A
  1. DHCPDISCOVER
  2. DHCPOFFER
  3. DHCPREQUEST
  4. DHCPACK

(remember “DORA”)

44
Q

If your system will be a DHCP server, you should set a ______IP address, because that will be required when you try to set up the DHCP server role.

A

static

45
Q

A____ ____ is made up of free space from multiple physical disks.

A

spanned volume

46
Q

This partition style is recommended for disks larger than 2TB , or disks that are used in Itanium computers.

A

GUID Partition Table (GPT)

47
Q

Each host on a TCP/IP network should be configured with a number of mandatory and optional configuration items, including:

A
  • IPv4 or IPv6 address
  • Subnet mask
  • Default gateway
  • DNS/WINS servers

pg21

48
Q

IPv4 addresses are commonly represented using what is called_________, in which the decimal value of each byte is shown, using periods to seperate the bytes; for example, 192.1.120.84

A

Dotted-decimal notation

49
Q

____ creates a hierarchical addressing structure by breaking the network address space into ____blocks, which are identified by the leading bit string, similar to the classful addressing.

A

Classless Inter-Domain Routing (CIDR)

50
Q

____ is an integral part of IPv6, whereas it was an optional feature under IPv4.

A

IP security through the use of IPsec

51
Q

The process of obtaining an IP address for a computer name is called_____.

A

name resolution

52
Q

The ___ ___ included with Windows Server 2008 is better suited for a smaller network or one with a small amount of network traffic that needs to pass between subnets.

A

routing service

53
Q

____is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.

A

Network Access Protection (NAP)