Term
|
Definition
|
|
Term
What are the Sytem Requirements to run AD RMS? |
|
Definition
-Pentium 4.3 GHz or higher _x000D_ -512MB RAM _x000D_ -40GB HDD _x000D_ -OS of Windows Server 2008 except Web Edition or Itanium Based systems _x000D_ -FAT32 or NTFS file system _x000D_ -Message Queing _x000D_ -IIS with ASP.NET enabled web service |
|
|
Term
What are the considerations for AD RMS? |
|
Definition
-Reserve URLs that will not change and do not include a computer name nor use localhost _x000D_ -An AD DS domain running on Windows 2000 SP3, 2003, or Windows Server 2008 _x000D_ -AD RMS must be installed in the same domain as its potential users. _x000D_ -Domain User a |
|
|
Term
What is a Server License certificate (SLC)? |
|
Definition
it is a self-signed certificate generated during the AD RMS cetup of the frst server in a root cluster. |
|
|
Term
What is a Rights Account Certificate (RAC)? |
|
Definition
issued to trusted users who have an email enabled account in AD DS. _x000D_ -RACs are generated when the user first tries to open rights-protected content. _x000D_ -have a duration of 365 days _x000D_ -Temp RACs do not tie the user to a specific computer and are valid for only 15 minutes _x000D_ -contains the public key of the user as well as his or her private key. |
|
|
Term
What is a Client Licensor certificate (CLC)? |
|
Definition
After the user has a RAC and launches an AD RMS-enabled application the application automatically sends a request for a CLC to the AD RMS cluster. _x000D_ -includes the client licensor public key, the client licensor private key that is encyrpted by the user's public key, and the AD RMS cluster's public key. |
|
|
Term
What is a Machine Certificate? |
|
Definition
The first time an AD RMS enabled applicaton is used a machine certificate is created. _x000D_ -contains the public key for the activated computer. Private key is containted within the lockbox on the computer. |
|
|
Term
What is a Publishing License? |
|
Definition
created when the user saves content in a rights protected mode. the license lists which users can use the content and under which conditions as well s the rights each user has to the content. _x000D_ -includes the symmetric content key for decrypting content as well as the public key of the cluster. |
|
|
Term
|
Definition
The use license is assigned to a user wh opens rights-protected content. |
|
|
Term
What is a Federated Web SSO? |
|
Definition
usually spans firewalls because it links applications contained within an extranet in a resource organization to the internal directory stores of account organizations. _x000D_ The only trust that exists in this model is the federation trust.. It is always a one-way trust from the resource organization to the account organizations. _x000D_ -This is the most common deployement scenario. |
|
|
Term
What is a Federated Web SSO with Forest Trust? |
|
Definition
the organization uses two AD DS forests. One is internal and the is an external forest located with in a perimeter network. _x000D_ -internal users have access to the applications from both the internal newtork and internet. _x000D_ -external users have access to the applications only from the internet |
|
|
Term
|
Definition
use when all the users for an extranet application are external and do not have accounts within an AD DS domain. |
|
|
Term
What kind of certificate does a Federation server need in an AD FS environment? |
|
Definition
server authentication certificate and a token signing certificate |
|
|
Term
What kind of certificate does a Federation Service Proxy use? |
|
Definition
must have a server authentication certificate to support SSL-encrypted communications with Web clients _x000D_ -must also have a client authentication certificate to authenticate the federation server during communications. |
|
|
Term
What kind of certificate des an AD FS Web Agent use? |
|
Definition
server authentication certificate to secure its communications with web clients. |
|
|
Term
Is publisng CA configuration to AD DS directories optional or mandatory for a Standalone CA? |
|
Definition
optional _x000D_ _x000D_ Mandatory for Enterprise |
|
|
Term
|
Definition
An administratively defined collection of network resources that share a common directory database and security policies. |
|
|
Term
|
Definition
Within an active directory, each resource is identified as an object. _x000D_ _x000D_ -Each object contains attributes _x000D_ -Active Directory uses DNS for locating and naming objects _x000D_ -Container objects hold or group other objects, either other containers or leaf objects |
|
|
Term
|
Definition
The schema identifies the object classes that exist in the tree and the attributes of the object. |
|
|
Term
|
Definition
An organizational unit is like folder that subdivides and organizes network resources within a domain. _x000D_ -is a container object _x000D_ -can be used to logically organize network resources _x000D_ simplifies security administration _x000D_ -first level ous are called parents _x000D_ -second level ous are called children _x000D_ -ous can contain other ous or any type of leaf object. |
|
|
Term
What are Generic Containers? |
|
Definition
used to organize Active Directory objects. _x000D_ -created by default _x000D_ -cannot be created, moved, renamed, or deleted. _x000D_ -have very few editable properties. |
|
|
Term
|
Definition
A group of related domains tha share the same contiguous DNS name space. |
|
|
Term
|
Definition
a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces. |
|
|
Term
What is a Domain Controller? |
|
Definition
a server that holds a copy of the Active directory database that can be written to. |
|
|
Term
What is a Global Catalog? |
|
Definition
A database that contains a partial replica of every object from every domain within a forest. |
|
|
Term
|
Definition
a distributed database that stores and manages information about network resources, such as users, computers and printers. |
|
|
Term
|
Definition
An LDAP directory service that you can use to create a directory store for use by directory-enabled applications. _x000D_ -formerly known as ADAM. |
|
|
Term
|
Definition
a feature that enables secure access to web applications outside of a user's home domain or forest. _x000D_ -provides web SSO |
|
|
Term
|
Definition
a feature that safeguards digital information from unauthorized use. |
|
|
Term
|
Definition
an identity and access control feature that creates and manages public key certificates used in software security systems. |
|
|
Term
What are the steps to prevent objects from accidental deletion? |
|
Definition
In AD Users and Computers or Active Directory Sites and Services...do either or... _x000D_ -On the object tab, select the Protect object from accidental deletion check box. _x000D_ -On Security tab, select the Deny Delete All Child Objects advanced permission for Everyone. |
|
|
Term
Where does Windows store standard zone data? |
|
Definition
|
|
Term
How do you change the replication scope for a zone using an application partition? |
|
Definition
dnscmd/zonechangedirectorypartition _x000D_ _x000D_ /foest _x000D_ /domain |
|
|
Term
What cmdlets are used to manage user accounts? |
|
Definition
-New-ADUser...creates a new AD user _x000D_ -Get-ADUser..displays one or more AD user's profile _x000D_ -Set-ADUser...modifies an AD user _x000D_ -Enable-ADAccount/Disable-ADAccount...enables/disables an AD account. _x000D_ -Search-ADAccount...gets AD user, computer, and ser |
|
|
Term
How do you perform and offline domain join? |
|
Definition
Djoin.exe/provision then copy resulting file to the computer that you want to join to the domain. _x000D_ run Djoin.exe/requestI=ODJ |
|
|
Term
Can you convert a group from global to domain local or domain global? |
|
Definition
No. Not directly. First convert the group to a universal group and apply the changes, then convert the group to the desired scope. |
|
|
Term
What are the requirements to join a computer to a domain? |
|
Definition
You must be a member of the Administrators group on the local computer or be given necessary rights. |
|
|
Term
What utilities do you use to create computer accounts from a command prompt or script? |
|
Definition
|
|
Term
What is a managed service account? |
|
Definition
a new account type available in Windows Server 2008 R2 and Windows 7. Provides the same benefits of using a domain user account with these improvements. _x000D_ -passwords managed and reset automatically _x000D_ -when running at Win Server 2008 R2 functional level the SPN does not need to be managed as with local accounts. |
|
|
Term
What is a Virtual Account? |
|
Definition
a new account type that are not created deleted. |
|
|
Term
|
Definition
a strategy to manage users, groups, and permissions. _x000D_ -A place user accounts _x000D_ -G into Global groups _x000D_ -DL into Domain Local groups _x000D_ -P assign permissions to domain local groups. _x000D_ _x000D_ Used in mixed mode. Universal groups not available in mixed mode. |
|
|
Term
|
Definition
Same as AGDLP except Universal groups are used. _x000D_ _x000D_ Used in nateve mode where this more than one domain and you need to grand access to similar groups defined in multiple domains. |
|
|
Term
What do you use Active Directory Users and Computers for? |
|
Definition
Use it to create, organize, and delete objects in Active Directory. |
|
|
Term
How do you access Active Directory Users and Computers? |
|
Definition
-Server Manager _x000D_ -Admin Tools _x000D_ -Running dsa.msc |
|
|
Term
|
Definition
It is the Active Directory Service Interfaces Editor. _x000D_ -use it to query, view, and edit attributes that are not exposed through other MMC snap-ins. |
|
|
Term
|
Definition
creates a new object in Active Directory |
|
|
Term
What is Dsquery used for? |
|
Definition
finds objects that match the search criteria. Returns a list of objects that match the search criteria. |
|
|
Term
|
Definition
retrieves property info about an object. |
|
|
Term
|
Definition
used to import and export Active Directory objects using a comma-seperated list file. _x000D_ -PASSWORD ARE NOT EXPORTED. |
|
|
Term
|
Definition
imports, exports, modifies, and deletes objects in Active Directory using LDAP Data Interchange Format (LDIF) files. _x000D_ -passwords are NOT exported. |
|
|
Term
How do you export user accounts and import them with a password? |
|
Definition
-Export the user accounts _x000D_ -Import the user accounts to create the accounts. User will be forced to change the password at next logon. _x000D_ -Modify the .ldif file to change the operation to modify existing objects. Add a password for each user account and |
|
|
Term
|
Definition
a command line environment designed for automating administration and maintenance for Windows Server 2008 and Windows Server 2008 R2. |
|
|
Term
What is the general syntax of Powershell cmdlts? |
|
Definition
|
|
Term
|
Definition
allows you to search for and view the properties of multiple Active Directory objects. _x000D_ -GUI based |
|
|
Term
|
Definition
-Active Directory Migration tool. _x000D_ GUI based utility that helps you restructure your Active Directory organization or migrate objects from one domain to another. |
|
|
Term
What is the Active Directory Administrative Center? |
|
Definition
an Active Directory management GUI tool built on Windows Powershell. _x000D_ -Creates or manages new or existing user accounts groups, computer accounts, organizational units and containers _x000D_ -Connect to one or several domains or domain controllers in the same instance of AD Admin Center. _x000D_ -Change domain and forest functional levels _x000D_ -Filter Active Directory data by using queries. |
|
|
Term
|
Definition
-Start of Authority record. _x000D_ -first record in any DNS database file. _x000D_ -defines general paremeters for DNS zone. _x000D_ -only one SOA |
|
|
Term
|
Definition
-Name Server _x000D_ -identifies all name servers that can perform name resolution for the zone. |
|
|
Term
|
Definition
maps an IPv4 DNS host name to an IP address. |
|
|
Term
|
Definition
maps an IPv6 DNS host name to an IP address. |
|
|
Term
|
Definition
provides alternative names to hosts that already have a host record. |
|
|
Term
|
Definition
provides alternative names to domains that already have a host record. |
|
|
Term
|
Definition
used by Windows Server 2008 to register network services. |
|
|
Term
|
Definition
in a reverse lookup zone, the PTR reodrd maps an IP address to a host name. |
|
|
Term
What does a full zone transfer copy? |
|
Definition
It copies all of the zone data with each zone transfer. |
|
|
Term
Who initiates a zone transfer? |
|
Definition
the secondary server ALWAYs initiates the zone transfer. |
|
|
Term
|
Definition
-master servers are configured with a list of slave DNS servers. _x000D_ -when a change takes place, the master notifies the slave servers that the zone has changed. _x000D_ -the secondary server then initiates zone transfer, first checking the serial number, then |
|
|
Term
How do you improve DNS performance? |
|
Definition
place multiple DNS servers on your network. |
|
|
Term
What does a caching only server do? |
|
Definition
runs DNS but has no zones configured. _x000D_ -Use a caching only server to improve performance while eliminating zone transfers. |
|
|
Term
When can you disable zone transfers? |
|
Definition
If a zone is AD-integrated and has no secondary servers, you can disable zone transfers. |
|
|
Term
|
Definition
a DNS server that can be used by another DNS server to resolve queries for records that cannot be resolved through the cache. |
|
|
Term
What is a secondary zone? |
|
Definition
you can eliminate the need for a forwarder for a specific zone by adding a secondary zone to the server. |
|
|
Term
|
Definition
a zone with only a partial copy of the zone database. It holds only the following _x000D_ -SOA record for the zone _x000D_ -NS records for all authoritative DNS servers for the zone. _x000D_ -A records for authoritative name servers identified in the NS records. |
|
|
Term
What is a conditional forwarder? |
|
Definition
a forwarder that is used for a specific domain. |
|
|
Term
When should you use a conditional forwarder? |
|
Definition
use a conditional forwarder to eliminate all zone transfer traffic, or in conditions where you are not allowed to transfer data from a zone. |
|
|
Term
|
Definition
the process by which a DNS server or host uses root name servers and subsequent servers to perform name resolution. |
|
|
Term
|
Definition
pointers to top level DNS servers on the internet. |
|
|
Term
|
Definition
a local balancing mechanism used by DNS servers to share and distribute network resorce loads. |
|
|
Term
What is Background Zone Loading? |
|
Definition
DNS servers loads zone data from AD DS in the background while the server restarts. |
|
|
Term
|
Definition
-Read Only Domain Controller _x000D_ -an additional domain controller for a domain that hosts read-only partitions of the Active Directory database. |
|
|
Term
What is the No-refresh interval? |
|
Definition
the time between the record's last refresh and when it can next be refreshed. |
|
|
Term
What is the refresh-interval? |
|
Definition
identifies a period of time when a record can be refreshed. It begins when the no-refresh interval ends. |
|
|
Term
What is the command adprep/forestprep used for? |
|
Definition
used to update the Windows Server 2003 or Windows 2000 Server Active Directory schema for Windows Server 2008 or Windows Server 2008 R2. _x000D_ -run it only once in the forest _x000D_ -run on the domain controller that holds the schema master. _x000D_ -must be a member of the Admins group, Schema Admnis group, and the Domain Admins group. |
|
|
Term
What is the command adprep/domainprep used for? |
|
Definition
-prepares a domain for a Windows Server 2008 or Windows Server 2008 R2 domain controller. _x000D_ -run on the controller that holds the infrastructure operations master. _x000D_ -run AFTER the adprep/forestprep command finishes and after the changes replicate to al |
|
|
Term
What is the adprep/rodcprep used for? |
|
Definition
use if you plan on installing an RODC in any domain in the forest. _x000D_ -run only once in the forest. _x000D_ -can run this command on any computer in the forest. _x000D_ -must be a member of the Enterprise Admins. |
|
|
Term
When installing a new Windows Server 2008 or 2008 R2, what must the first domain controller be? |
|
Definition
It must be a Global catalog server. |
|
|
Term
What must you do if you are installing a new Windows Server 2008 or 2008 R2 domain controller to create a new domain in an existing Windows 2000 or Window Server 2003 forest. |
|
Definition
-run adprep/forestprep if this the first Windows Server 2008 or Windows Server 2008 R2 domain controlle in the forest. _x000D_ -Run adprep/rodc if you are making an rodc _x000D_ -schema must be updated before the os is installed if you are performing an unattended |
|
|
Term
What are the methods that can be used for installing AD DS? |
|
Definition
-Active Directory Domain Services Installation Wizard _x000D_ -Command line (dcpromo) _x000D_ -Answer file _x000D_ -AD DS installation (media) (use ntdsutil.exe) |
|
|
Term
What command is used to remove AD DS? |
|
Definition
|
|
Term
What do you do to remove a domain controller from a domain? |
|
Definition
|
|
Term
What do you do if you are removing the last domain controller from a domain? |
|
Definition
|
|
Term
What do you do if you are removing the last domain controller from a FOREST? |
|
Definition
wizard...select Delete the domain and forest |
|
|
Term
What is available at 2000 Native Domain functional level? |
|
Definition
-universal groups are available for security and distribution _x000D_ -group nesting _x000D_ -Group converting _x000D_ -Security Identifyer history |
|
|
Term
What is available at the 2003 domain functional level? |
|
Definition
-All features in 2000 Native _x000D_ -Domain controller rename _x000D_ -Update logon time stamp _x000D_ -User password on IetOrgPerson object _x000D_ -User and computer container redirect. _x000D_ -Constrained delegation allows applications to take advantage of the secure delegat |
|
|
Term
What is available at the 2008 domain functional level? |
|
Definition
includes all features available in 2003 and adds following... _x000D_ -DFS for SYSVOL _x000D_ -AES _x000D_ -Last Interactive Logon Info. _x000D_ -Fine-grained password policies that allow you to specify password and account lockout policies for users and global security groups in a domain. |
|
|
Term
What is available at the 2008 R2 domain functional level? |
|
Definition
includes all previous features and adds... _x000D_ -Authentication Mechanism Assurance (AMA) allowing you to control access to network resources based on the type of certificate used during logon. _x000D_ -Automatic Service Principle Name (SPN) management when using managed service and virtual accounts. |
|
|
Term
What forest functional level must you be at to use the Active Directory Recycle Bin? |
|
Definition
|
|
Term
What is a Site Link Bridge? |
|
Definition
a collection of two or more site links that can be grouped as a single logical link. _x000D_ -enabled by default _x000D_ -if disabled, you must manually specify site link bridges |
|
|
Term
What is a Bridgehead server? |
|
Definition
a domain controller in a site that replicates with domain controllers in other sites. _x000D_ -REPLICATION WITHIN A SITE DOES NOT USE BRIDGEHEAD SERVERS |
|
|
Term
What can be used to allow replication within mail messages in environments where WAN links are not available? |
|
Definition
SMTP _x000D_ -cannot replicate only the configuration and schema directory partitions and global catalog read only replicas. _x000D_ -requires an enterprise CAwhen you use it over site links. |
|
|
Term
|
Definition
a number assigned to a site link that identifies the overall relative cost of using that site link. _x000D_ -default is 100 _x000D_ -the lower the number, the more preferred the site link. |
|
|
Term
What commands can you use to force replication? |
|
Definition
-Replicate now _x000D_ -repadmin.exe/replicate |
|
|
Term
What are the stages of of DFS migration? |
|
Definition
1. Not initiated _x000D_ 2. Global state 0...this stage DFS replication has not started yet. FRS is still being used _x000D_ 3. Global State 1...DFS begins to replicate but FRS is still the main replication method. _x000D_ 4. Global State 2....FRS continues to replicate but DFS becomes master _x000D_ 5. Global State 3...FRS completely stops and DFS becomes sole source of replication. |
|
|
Term
What does the schema master do? |
|
Definition
Maintains the AD schema for the forest. |
|
|
Term
What does the Domain Naming Master do? |
|
Definition
Adds new domains to and removes existing domains from the forest. _x000D_ -ensures that domain names are unique |
|
|
Term
What does the RID master do? |
|
Definition
It allocates pools or blocks of numbers that are used by the domain controller when creating new security principles. |
|
|
Term
What does the PDC emulator do? |
|
Definition
acts like a Windows NT 4.0 Primary Domain Controller. It performs other tasks normally associated with NT domain controllers. |
|
|
Term
What is the Infrastructure Master responsible for? |
|
Definition
It is responsible for updating changes made to objects. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The Domain Name System (DNS) is a hierarchical, distributed database that maps logical host names to IP addresses |
|
|
Term
What does a DNS server hold? |
|
Definition
A DNS server holds a database of hostnames and their corresponding IP addresses. Clients query the DNS server to get the IP address of a given host. |
|
|
Term
What was used before DNS? |
|
Definition
a hosts file saved on each host computer |
|
|
Term
What makes up the DNS hierarchy? |
|
Definition
The DNS hierarchy is made up of the following components: _x000D_ - . (dot) domain (also called the root domain) _x000D_ - Top Level Domains (TLDs) (.com, .edu, .gov) _x000D_ - Second-level and additional domains _x000D_ - Hosts |
|
|
Term
|
Definition
Fully Qualified Domain Name - includes the host name and the name of all domains back to root. |
|
|
Term
What makes DNS a distributed database? |
|
Definition
DNS is a distributed database because no one server holds all of the DNS information. Instead, multiple servers hold portions of the data. |
|
|
Term
|
Definition
Zones typically contain one or more domains, although additional servers might hold information for child domains. |
|
|
Term
|
Definition
DNS servers hold zone files and process name resolution requests from client systems. |
|
|
Term
What is a DNS forward lookup? |
|
Definition
A forward lookup uses the host name (or the FQDN) to find the IP address |
|
|
Term
What is a DNS reverse lookup? |
|
Definition
A reverse lookup uses the IP address to find the host name (or FQDN). |
|
|
Term
|
Definition
The A record maps a host name to an IP address and is used for forward lookups. |
|
|
Term
|
Definition
The PTR record maps an IP address to a host name and is used for reverse lookups. |
|
|
Term
|
Definition
The CNAME record provides an alternate name (an alias) for a host. |
|
|
Term
|
Definition
The SRV record identifies a service, such as an Active Directory domain controller. |
|
|
Term
How are DNS records created? |
|
Definition
Manually, or dynamically using Dynamic DNS (DDNS). With DDNS, hosts automatically register and update their corresponding records with the DNS server. |
|
|
Term
What is the process followed when a client computer needs to find an IP address? |
|
Definition
- The client examines its HOSTS file for the IP address. _x000D_ - If the IP address is not in the HOSTS file, it examines its local DNS cache for the IP address. _x000D_ - If the IP address is not in the cache, the client sends the request to a DNS server. |
|
|
Term
What is the process when a DNS server received a name resolution request? |
|
Definition
1) The DNS server examines its local DNS cache for the IP address _x000D_ 2) If the IP address is not in the server cache, it checks its HOSTS file. _x000D_ 3) If the information is not in the HOSTS file, the server checks any zones for which it is authoritative. _x000D_ 4) Forwarding or Recursion _x000D_ 5) After the information is found or received from another server, the DNS server returns the result to the client, and places the information in its server cache. |
|
|
Term
What is an authoritative DNS server? |
|
Definition
a DNS server that has a full, complete copy of all the records for a particular zone. |
|
|
Term
|
Definition
Where the DNS server forwards the name resolution request to another DNS server, then waits for a response from that server |
|
|
Term
|
Definition
Where the DNS server queries root domain servers, top-level domain server and other DNS servers in an iterative manner until it finds the one that hosts the target domain. |
|
|
Term
What is a caching-only DNS server? |
|
Definition
A caching-only DNS server has no zone information; it is not authoritative for any domains. It uses information in its server cache, or forwarding or recursion, to respond to client queries. |
|
|
Term
Who can install DNS in Server 2008? |
|
Definition
Members of the Domain Admins group |
|
|
Term
Which versions of server 2008 can have DNS installed on them? |
|
Definition
You can install DNS on any version of Windows Server 2008 except for the Windows Server 2008 Web Server edition. |
|
|
Term
What type of IP address must the DNS server have? |
|
Definition
|
|
Term
How would you add the DNS role from a command prompt (or on a server core)? |
|
Definition
start /w ocsetup DNS-Server-Core-Role |
|
|
Term
What command will give a list of installed services on a server? |
|
Definition
Run the oclist command to get a list of services (including DNS) installed on a server. |
|
|
Term
What can be used to manage DNS on Server 2008? |
|
Definition
Use the DNS snap-in or the dnscmd command to manage DNS. |
|
|
Term
What is a primary DNS zone? |
|
Definition
the master copy of a zone database |
|
|
Term
What are the properties of a primary zone? |
|
Definition
- The primary zone is the only writeable copy of the zone database. _x000D_ - Changes to the zone can only be made to the primary zone. _x000D_ - The server that holds the primary zone is called a primary server. _x000D_ - Each zone can have only a single primary zone s |
|
|
Term
What is a secondary DNS zone? |
|
Definition
A secondary zone is a read-only copy of the zone database. |
|
|
Term
What are the properties of a secondary DNS zone? |
|
Definition
- Changes cannot be made to the records in a secondary zone. _x000D_ - A server that holds a secondary zone is called a secondary server. _x000D_ - Secondary servers copy zone data from other servers through a process called zone transfer. _x000D_ - Secondary servers ca |
|
|
Term
What is an Active Directory-integrated DNS zone? |
|
Definition
An Active Directory-integrated zone holds zone data in Active Directory instead of a text file. |
|
|
Term
What are the properties of an Active Directory-integrated DNS zone? |
|
Definition
- Active Directory-integrated zones are multi-master zones, meaning that changes to the zone information can be made by multiple servers. Multiple servers hold read-write copies of the zone data. _x000D_ - Only DNS servers that are domain controllers can host |
|
|
Term
|
Definition
A stub zone is a zone with only a partial copy of the zone database. |
|
|
Term
What are the properties of a stub zone? |
|
Definition
- The stub zone only contains information about the name servers that are authoritative for the zone; it does not contain information for other hosts. _x000D_ - A stub zone is not authoritative for the zone; its purpose is to identify the name servers that can |
|
|
Term
What is the GlobalNames DNS zone? |
|
Definition
The GlobalNames zone is a special zone in the DNS database that is used for single-label name resolution. |
|
|
Term
What is a GlobalNames DNS zone used for? |
|
Definition
- Allow clients to use simple host names without domain information for name resolution. For example, to contact a server named web1.corp.us.westsim.private, users could simply enter the single-label name web1. _x000D_ - Allow DNS clients to contact NetBIOS-on |
|
|
Term
What are the features of a GlobalNames zone? |
|
Definition
- When users enter a single-label name, the client computer first tries to resolve the name using DNS and the search suffix configuration. If that process fails, the GlobalNames zone is checked (if it exists). _x000D_ - Using the GlobalNames zone does not requ |
|
|
Term
What is a forward lookup DNS zone? |
|
Definition
A forward lookup zone provides hostname-to-IP address resolution. Clients query the DNS server with the hostname, and receive the IP address in return. |
|
|
Term
What is a reverse lookup DNS zone? |
|
Definition
A reverse lookup zone provides IP address-to-hostname resolution. Clients query the DNS server with the IP address, and receive the hostname in return. |
|
|
Term
How many servers can hold the primary zone file? |
|
Definition
Only one server can hold the primary zone file. To place zone data on multiple servers, configure secondary servers. |
|
|
Term
Where does Windows store standard zone data? |
|
Definition
Windows stores standard zone data in the %windir%\System32\Dns directory. The file is a text file with .dns added to the zone name. |
|
|
Term
Which types of zone support dynamic updates? |
|
Definition
Primary and Active Directory-integrated zones support dynamic updates. Use an Active Directory-integrated zone to use secure dynamic updates. |
|
|
Term
What types of record does a reverse lookup zone hold? |
|
Definition
Reverse lookup zones hold PTR (pointer) records. The PTR record maps the IP address to an A record. |
|
|
Term
What type of zones can a reverse lookup zone be? |
|
Definition
A reverse lookup zone can be a primary zone, a secondary zone, or an Active Directory integrated zone. |
|
|
Term
What is the SOA (Start of Authority) record? |
|
Definition
The first record in any DNS database file is the SOA. It defines the general parameters for the DNS zone, and it is assigned to the DNS server hosting the primary copy of a zone. There is only one SOA record, and it is the first record in the zone database file. The SOA record includes parameters such as the authoritative server and the zone file serial number. |
|
|
Term
What is an NS (Name Server) record? |
|
Definition
The NS resource record identifies all name servers that can perform name resolution for the zone. Typically, there is an entry for the primary server and all secondary servers for the zone (all authoritative DNS servers). |
|
|
Term
What is an A (Host Address) record? |
|
Definition
The A record maps an IPv4 (32-bit) DNS host name to an IP address. This is the most common resource record type. |
|
|
Term
What is an AAAA (Quad A) record? |
|
Definition
The AAAA record maps an IPv6 (128-bit) DNS host name to an IP address. |
|
|
Term
What is an MX (Mail Exchanger) Record? |
|
Definition
The MX record identifies servers that can be used to deliver e-mail. |
|
|
Term
|
Definition
The CNAME record provides alternate names (or aliases) to hosts that already have a host record. Using a single A record with multiple CNAME records means that when the IP address changes, only the one A record needs to be modified. |
|
|
Term
|
Definition
The DNAME record provides alternate names (or aliases) to domains that already have a host record. |
|
|
Term
What is a SRV (Service Locator) record? |
|
Definition
The SRV record is used by Windows Server 2008 to register network services. This allows clients to find services (such as domain controllers) through DNS. Windows 2008 automatically creates these records as needed and during domain controller installation. |
|
|
Term
What is a PTR (Pointer) record? |
|
Definition
In a reverse lookup zone, the PTR record maps an IP address to a host name (i.e. "points" to an A record). Where IPv4 PTR records are created in the in-addr.arpa namespace, reverse lookup zones for IPv6 addresses should be created in the ip6.arpa namespace. |
|
|
Term
What are WINS and WINS-R records? |
|
Definition
Add these records to a zone when you want to allow DNS to use WINS resolution. The WINS resource record allows DNS queries that fail to resolve to be forwarded to the WINS servers in the WINS resource record. The WINS-R resource record allows the resolution of a reverse query that is not resolvable through DNS. |
|
|
Term
How can DNS records be automatically created on a DNS server? |
|
Definition
By using Dynamic DNS. Dynamic DNS is required to support Active Directory. |
|
|
Term
When do dynamic updates occur? |
|
Definition
- A network connection's IP address is added, deleted, or changed. _x000D_ - The DHCP server changes or renews an IP address lease. _x000D_ - The client's DNS information is manually changed using ipconfig /registerdns. _x000D_ - The client boots. _x000D_ - A server is promo |
|
|
Term
Which Windows clients support DDNS? |
|
Definition
Windows clients (2000 and above) create their A records with the DNS server. Windows 9x/Me/NT clients do not support dynamic DNS. |
|
|
Term
How does the DHCP server tie in with DDNS? |
|
Definition
The DHCP server registers the PTR record with the DNS server for clients capable of dynamic updates. The DHCP server updates both the A and PTR records for clients that do not support dynamic updates. |
|
|
Term
Are dynamic updates enabled by default on a primary zone? |
|
Definition
Dynamic updates are not enabled on primary zones. You can enable dynamic updates when you create the zone or modify the zone properties later to enable this feature. |
|
|
Term
Are dynamic updates enabled by default on an Active Directory-integrated zone? |
|
Definition
Dynamic updates are enabled on Active Directory-integrated zones. Note: When you convert a primary zone to an Active Directory-integrated zone, the current dynamic update setting is retained. |
|
|
Term
What are secure dynamic updates? |
|
Definition
With secure dynamic updates, only domain members can create records, and only the original client can modify or remove records. |
|
|
Term
What is used to keep track of changes to a DNS zone? |
|
Definition
The zone serial number keeps track of changes to the zone. When you make changes to the zone, the serial number is incremented. |
|
|
Term
What is a DNS master server? |
|
Definition
A master server is the server from which the secondary copies the zone data. The master server can be the primary server or another secondary server. |
|
|
Term
What are the two types of zone transfer? |
|
Definition
Zone transfers can copy all records or only changed records: _x000D_ - A full zone transfer (AXFR) copies all of the zone data with each zone transfer. _x000D_ - A partial (or incremental) zone transfer (IXFR) copies only the changed records. This is the default method on Windows Server 2008. |
|
|
Term
Are zone transfers enabled in Server 2008 by default? |
|
Definition
By default, zone transfer in Windows Server 2008 is disabled for security reasons. To use zone transfers, manually enable the feature in the DNS settings in Server Manager. |
|
|
Term
How can you restrict the servers to which zone transfers are allowed? |
|
Definition
- Allow zone transfers only to servers that are listed as name servers. _x000D_ - Allow zone transfers only to servers you specifically identify. |
|
|
Term
How does a secondary server initiate a zone transfer? |
|
Definition
- The secondary server contacts the master server and compares the serial number on the master with the serial number in its copy. _x000D_ - If the serial number on the master is greater, the secondary initiates zone transfer. _x000D_ - If the serial number is the |
|
|
Term
|
Definition
Windows DNS servers support the use of DNS Notify. With DNS Notify, master servers are configured with a list of slave DNS servers. |
|
|
Term
How does DNS notify work? |
|
Definition
- When a change takes place, the master notifies the slave servers that the zone has changed. _x000D_ - The secondary server then initiates zone transfer, first checking the serial number, then requesting changes. |
|
|
Term
What is a DNS caching server? |
|
Definition
A caching only server runs DNS but has no zones configured. Use a caching only server to improve performance while eliminating zone transfers. |
|
|
Term
How does an Active Directory-integrated zone store DNS information? |
|
Definition
An Active Directory-integrated zone stores DNS information in Active Directory rather than in a zone file. Zone information is copied automatically when Active Directory replicates. |
|
|
Term
How can you secure zone transfers to secondary servers? |
|
Definition
Active Directory replication traffic is automatically secured. To secure zone transfers to secondary servers, use IPsec between servers. |
|
|
Term
How can you force an update of DNS zone data? |
|
Definition
You can force an update of zone data through the DNS console or by using the Dnscmd command |
|
|
Term
|
Definition
A cached copy of a user's logon credentials that have been stored on the user's local workstation. |
|
|
Term
|
Definition
The time difference between any client or member server and the domain controllers in a domain. |
|
|
Term
|
Definition
A role that has the quthority tomanage the creation and deletion of domains, domain trees, and application data partitions in the forest. Upon creation of any of these, the Domain Naming Master ensures that the name assigned is unique to the forest. |
|
|
Term
|
Definition
Global catalog service that listens on port 3268 to respond to requests to search for an object in Active Directory. |
|
|
Term
|
Definition
An attribute has been stored in the partial attribute set replicated to all global catalog servers in the forest. |
|
|
Term
|
Definition
A domain-specific role that is responsible for reference updates from its domain objects to other domains. This assists in tracking which domains own which objects. |
|
|
Term
|
Definition
A forced, ungraceful transfer of a role. This procedure is used only in the event of a catastrophic failure o a domain controller that holds an FSMO role. |
|
|
Term
|
Definition
Move a role to a new domain controller. |
|
|
Term
|
Definition
Memberships stored in the global catalog. A universal group can contain users, groups and computers from any domain in the forest. In addition, universal groups through their membership in domain local groups, can receive permissions for any resource anywhere in the forest. |
|
|
Term
universal group membership caching |
|
Definition
This feature stores universal group memberships on a local domain controller that can be used for logon to the domain, eliminating the need for frequent access to a global catalog server. |
|
|
Term
|
Definition
PAS A partial copy of all objects from other domains within the same forest. This partial copy of forest-wide data includes a subset of each object's attributes. |
|
|
Term
Primary Domain Controller Emulator |
|
Definition
PDC Emulator A role that provides backward compatibility from Microsoft Windows NT 4.0 domains and other down-level clients. |
|
|
Term
|
Definition
RID A variable length number that is assigned to objects as created and becomes part of the object's security identifier (SID). |
|
|
Term
Relative Identifier Master |
|
Definition
RID Master Role that is responsible for assigning relative identifiers to domain controllers in the domain. Relative identifiers are variable-length numbers assigned by a domain controller when a new object is created, |
|
|
Term
|
Definition
SID A variable length number used to uniquely identify an object throughout the Active Directory domain. Part of the SID identifies the domain to which the object belongs and the other part is the RID. |
|
|
Term
|
Definition
Active Directory Domain Services Windows Server 2008 service that provides a centralized authentication service for Microsoft networks. Provides the full-fledged directory service that is called Active Directory in Windows Server 2008 and previous versions of Windows Server. |
|
|
Term
|
Definition
Distinguished Name The full name of the object that includes all hierarchical containers leading up to the root domain. The xxxxxxxxxxx begins with the object's common name and appends each succeeding parent contain object, reflecting the object's location in the Active Directory structure |
|
|
Term
|
Definition
Domain Controller A server that stores the Active Directory database and authenticates users with the network during logon. |
|
|
Term
|
Definition
Knowledge Consistency Checker An internal Active Directory process tha automatically creates and maintains the replication topology. The xxxxxxxxxxx operates based on the information provided by an administrator in the Active Directory Sites and Services snap-in, which is located in the Administrative Tools folder on the domain controller, or an administrative workstation that has the Administrative Tools installed. |
|
|
Term
|
Definition
Naming Context An active Directory partition. |
|
|
Term
|
Definition
Domain Name System The name resolution mechanism computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003 and Windows 2000 Server. |
|
|
Term
|
Definition
Globally Unique Identifier A 128-bit hexadecimal number that is assigned to every object in the Active Directory forest upon its creation. This number does not change even when the object itself is renamed. |
|
|
Term
|
Definition
Lightweight Directory Access Protocol The protocol that has become an industry standard that enables data exchange between directory services and applications. The xxxxxxxxx standard defines the naming of all objects in the Active Directory database and therefore, provides a directory that can be integrated with other directory services such as Novell eDeirectory, and Active Directory --aware applications, such as Microsoft Exchange. |
|
|
Term
|
Definition
Organizational Unit A container that represents a logical grouping of resources that have similar security or administrative guidelines. |
|
|
Term
|
Definition
Read-Only Domain Controller A domain controller that contains a copy of the ntds.dit file that cannot be modified and that does not replicate its changes to other domain controllers within Active Directory. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
A partition that allows information to be replicated to administratively chosen domain controllers. An example of information that is commonly stored in an application partition is DNS data. xxxxxxxxx offer control over the scope and placement of information that is to be replicated |
|
|
Term
|
Definition
Characteristics associated with an object class in Active Directory that make the object class unique within the database. The list of xxxxxxxs is defined only once in the schema, but the same xxxxxxxx can be associated with more than one object class. |
|
|
Term
|
Definition
The configuration partition contains information regarding the physical topology of the network, as well as other configuration data that must be replicated throughout the forest. |
|
|
Term
|
Definition
An object, such as a domain or an Organizational Unit, that is used to organize other objects. Also known as a leaf object. |
|
|
Term
|
Definition
Trust type that allows resources to be shared between Active Directory forests. |
|
|
Term
|
Definition
Administration of an Organizational Unit is tasked to a department supervisor or manager, thus allowing that person to manage day-to-day resource access as well as more mundane tasks, such as resetting passwords. |
|
|
Term
|
Definition
Allow businesses to define, manage, access, and secure network resources, including files, printers, people, and applications. |
|
|
Term
|
Definition
A grouping of objects in Active Directory that can be namaged together. A domain can function as a security boundary for access to resources, such as computers, printers, servers, applications, and file systems. |
|
|
Term
|
Definition
Active Directory domain partition that is replicated to each domain controller within a particular domain. Each domain's xxxxxxx contains information about the objects that are stored within that domain; users, groups, computers, printers, Organization Units, and more. |
|
|
Term
|
Definition
In Active Directory, a logical grouping of network resources and devices that can contain one or more domains configured in a parent-child relationship. Each Active Directory forest can contain one or more xxxxxxxs, each of which can, in turn, contain one or more domains. |
|
|
Term
|
Definition
A one-way, nontransitive trust that is established with a Windows NT domain or a Windows 2000 domain in a separate forest |
|
|
Term
|
Definition
The ability to respond gracefully to a software or hardware failure. In particular, a system is considered to be xxxxxxxx when it has the ability to continue providing authentication services after the failure of a domain controller. |
|
|
Term
|
Definition
The largest container object within Active Directory. The xxxxxxxx container defines the fundamental security boundary within Active Directory, which means that a user can access resources across an entire Active Directory xxxxxxxx using a single logon/password combination. |
|
|
Term
|
Definition
The first domain created within an Active Directory forest. |
|
|
Term
|
Definition
Designed to offer support for Active Directory domain controllers running various supported operating systems by limiting functionality to specific software versions. As legacy domain controllers are decommissioned, administrators can modify the xxxxxxxxx to expose new functionality within Active Directory. Some features in Active Directory cannot be activated, for example, until all domain controllers in a forest are upgraded to a specific level. |
|
|
Term
|
Definition
Occurs sehan a domain controller receives updates to the Active Directory database from other domain controllers on the network |
|
|
Term
|
Definition
A unique number used to identify all devices on an IP network. xxxxxxxxxxs are four octets long an commonly expressed in dotted-decimal notation, such as 192.168.10.1. |
|
|
Term
|
Definition
An object, such as a domain or an Organizational Unit, that is used to organize other objects. Also known as a container object. |
|
|
Term
|
Definition
An improvement to replication that is available after the forest functional level has been raised to Windows Server 2003, or higher, enabling a single membership change to a group to trigger the replication of only the change to each member in the list, rather than the entire membership list. |
|
|
Term
|
Definition
Active Directory DNS provides direction for network clients that need to know which server performs what function. |
|
|
Term
|
Definition
Individual domain controllers in an Active Directory database may contain slightly different information, because it can take anywhere from a few seconds to several hours for changes to replicate throughout a given environment. |
|
|
Term
|
Definition
An element in Active Directory that refers to a resource. Xxxxxxxs can be container xxxxxxs or leaf xxxxxs. Containers are used to organize resources for security or organizational purposes; leaf xxxxxxs refer to the end-node resources, such as users,computers, and printers. |
|
|
Term
|
Definition
Occurs when a domain controller transmits replication information to other domain controllers on the network. |
|
|
Term
|
Definition
Portion of Active Directory database used to divide the database into manageable pieces. |
|
|
Term
|
Definition
1)An option that allows users to access network resources by searching the Active Directory database for the desired resource _x000D_ 2) An option used to deploy applications. It allows users to install the applications that they consider useful to them. |
|
|
Term
|
Definition
The process of keeping each domain controller in sync with changes made elsewhere on the network. |
|
|
Term
|
Definition
Upgrade strategy based on functional levels that allows enterprises to migrate their Active Directory domain controllers gradually, based on the need and desire for the new functionality. |
|
|
Term
|
Definition
Master database that contains definitions of all objects in the Active Directory. |
|
|
Term
|
Definition
The partition that contains the rules and definitions used for creating and modifying, object classes and attributes within Active Directory. |
|
|
Term
|
Definition
A manually created nontransitive trust that allows child domains in separate trees to communicate more efficiently by eliminating the tree-walking of a trust path. |
|
|
Term
|
Definition
One or more IP subnets connected by fast links. |
|
|
Term
|
Definition
The locator records within DNS that allows clients to locate an Active Directory domain controller or global catalog. |
|
|
Term
|
Definition
Enables administrators from a particular domain to grant access to their domain's resources to users in other domains. |
|
|
Term
|
Definition
The building block of the DNS that maps a single IP address to a DNS hostname. |
|
|
Term
|
Definition
Feature offered by Read-Only Domain Controllers (RODCs) that enables an administrator to configure a user as the local administrator of a specific RODC without making the user a Domain Admin with far-reaching authority over all domain controllers in the entire domain and full access to the Active Directory domain data. |
|
|
Term
|
Definition
The dynamic update feature that places a timestamp on record, bases on the current server time, when the IP address is added. This is part of the aging ans scavenging process. |
|
|
Term
|
Definition
The executable files needed to install Windows. |
|
|
Term
|
Definition
The active Directory Installation Wizard. |
|
|
Term
|
Definition
Domain name limited to 15 characters that is maintained for legacy compatibility with older applications that cannot use DNS for their name resolution. |
|
|
Term
|
Definition
Enables the DNS database to be updated with the changed information when the Internet Protocol (IP) address if a host changes. |
|
|
Term
|
Definition
Zones necessary for computer hostname-to-IP address mapping, which are used for name resolution by various services. |
|
|
Term
|
Definition
A domain controller that contains a partial relica of every domain in Active Directory. The xxxxxxxxx stores those attributes most frequently used in search operations (such as a user's first and last names) and those attributes required t locate a full replica of the object. The Active Directory replication system builds the global catalog automatically. |
|
|
Term
incremental zone transfers |
|
Definition
Method of conserving bandwidth by transferring part of a zone. |
|
|
Term
|
Definition
Active Directory Lightweight Directory Services Role that provides developers the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
Directory Services Restore Mode A Special startup mode used to run an offline defragmentation. |
|
|
Term
|
Definition
Flexible Single Master Operations The specific server roles that work together to enable the multimaster functionality of Active Directory. |
|
|
Term
|
Definition
fully qualified domain name The complete DNS name used to reference a host's location in the DNS structure. |
|
|
Term
|
Definition
Object Identifier A unique string used to identify every class or attribute added to a schema. OIDs must be globally unique, and they are represented by a heriarchical dotted-decimal notation string. |
|
|
Term
|
Definition
pointer The resource record that is the functional opposite of the A record, providing an IP address-to-name mapping for the system identified in the Name field using the inaddr.arpa domain name. |
|
|
Term
|
Definition
User Principal Name A naming format that simplifies access to multiple services such as Active Directory and email. A xxxxxxxxx follows a naming convention that can reflect the forest root domain or another alias that follows the format of username@domain-name. |
|
|
Term
|
Definition
A single occurence of an element. |
|
|
Term
|
Definition
The amount of time or delay it takes to replicate information throughout the network. |
|
|
Term
|
Definition
A command-line tool that is used to create, delete, verify, and reset trust relationships from the Windows Server 2008 command line. |
|
|
Term
|
Definition
A command-line tool that is critical for working with DNS on Serve Core. |
|
|
Term
Password Replication Policy |
|
Definition
A list of user or group accounts whose passwords should be stored on a particular Read-Only Domain Controller (RODC) or should not be stored on the specific RODC. |
|
|
Term
|
Definition
A mechanism to set up load balancing between multiple servers that are advertising the same SRV records. Clients will always use the record with the lowest numbered priority first. The will only use an SRV record with a higher-number priority if the lower-numbered priority record is unavailable. |
|
|
Term
restartable Active Directory |
|
Definition
Feature that enables administrators to place the NTDS.DIT file in an offline mode without rebooting the domain controller outright. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
Zone that answer queries in which a client provides an IP address and DNS resolves the IP address to a hostpage. |
|
|
Term
|
Definition
The process of removing records that were not refreshed or updated within specified time intervals. |
|
|
Term
|
Definition
A special installation option that creates a minimal environment for running only specific services and roles. Server Core runs without the Windows Desktop shell, which means that it must be administered exclusively from the command line or using Group Policy. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
A unility that enables ainistrators to view any other roles the server might be performing. The Server Manager utility launches automatically at startup after the Initial Configuration Tasks utility is closed. It can be accessed manually through the shortcut provided in the Administrative Tools folder or directly from the Start menu. |
|
|
Term
|
Definition
To begin the Active Directory installation at a central location, such as a data center, and then allow a local administrator to complete the configuration. |
|
|
Term
|
Definition
A shared folder that exists on all domain controllers and is used to store Group Policy Objects, login scripts, and other files that are replicated domain-wide. |
|
|
Term
|
Definition
The length of time a record is valid., after which it needs to be reregistered. |
|
|
Term
|
Definition
Running dcpromo from the command line using a specially formatted text file to specify the necessary installation options. |
|
|
Term
|
Definition
A relative weighting for SRV records that have the same priority. For exampl, consider three SRV records with the same priority with relative weights of 60, 20 and 20. Because 60 + 20 + 20 +100, the record with the weight of 60 will be used 60/100, or 60%, of the time, whereas each of the other two records will be used 20/100, or 20 percent, of the time. |
|
|
Term
|
Definition
The process fo replicating DNS information from the DNS server to another. |
|
|
Term
|
Definition
Each replication transaction does not need to complete before another can start because the transaction can be stored until the destination server is available. |
|
|
Term
|
Definition
The server at each site that acts as a gatekeeper in managing site-to-site replication. This allows intersite replication to update only one domain controller within a site. After a xxxxxxxx is updated, it updates the remainder of its domain controller partners with the newly replicated information. |
|
|
Term
|
Definition
Method used by domain controllers to inform one another of when changes need to be replicated. Each domain controller will hold a change for 45 seconds before forwarding it, after which it will transmit the change to each of its replication partners in 3 second intervals. |
|
|
Term
|
Definition
To reduce the size of transmitted data to decrease the use of network bandwidth. |
|
|
Term
|
Definition
The link, created by the Knowledge Consistency Checker, between domain controllers that replicate with one another in a site. |
|
|
Term
|
Definition
The amount of time required for replication so that all domain controllers in the environment contain the most up-to-date information. |
|
|
Term
|
Definition
Value assigned to a site link object to define the push that relication will take. If more than one path can be used to replicate information, cost assignments will determine which path is chosen first. A lower-numbered cost value. |
|
|
Term
|
Definition
A command-line tool used for monitoring Active Directory. |
|
|
Term
dual counter-rotating ring |
|
Definition
Created by the Knowledge Consistency Checker for the replication path. If one domain controller in the ring fails, traffic is routed in the opposite direction to allow replication to continue. |
|
|
Term
|
Definition
A value assigned to a site link that determines how often information will be replicated over the site link. |
|
|
Term
|
Definition
Classless Inter-Domain Routing Form of notation that shows the number of bits being used for the subnet mask. For example, for an IP address of 192.168.64.0 with a mask of 255.255.255.0, the CIDR representation would be 192.168.64.0/24. |
|
|
Term
|
Definition
Intersite Topology Generator A process that selects a bridgehead server and maps the topology to be used for intersite replication. |
|
|
Term
|
Definition
linked-value replication An improvement to replication that is available for use after the forest functional level has been raised to Windows Server 2003 or higher, enabling a single membership change to a group to trigger the replication of only this change to each member in the list, rather than the entire membership list. |
|
|
Term
|
Definition
Remote Procedure Calls over Internet Protocol Default protocol used for all replication traffic. |
|
|
Term
|
Definition
Simple Mail Transport Protocol Transport protocol used for intersite replication when a direct or reliable IP connection is unavailable. |
|
|
Term
|
Definition
update sequence number A local value, maintained by each domain controller, that tracks the changes that are made at each DC, thus tracking which updates should be replicated to other domain controllers. |
|
|
Term
|
Definition
The process of replicating Active Directory information between domain controllers within a site. |
|
|
Term
|
Definition
The process of replicating Active Directory information from one site to another. |
|
|
Term
preferred bridgehead servers |
|
Definition
The administrator's list of servers to be used as bridgehead servers. A bridgehead server is the server at each site that acts as a gatekeeper in managing site-to-site replication. |
|
|
Term
|
Definition
A command-line tool that can check replication sonsistency between replication partners, monitor replication status, display replication metadata, and force replication events and Knowledge Consistency Check (KCC) recalculation. |
|
|
Term
|
Definition
Servers that inform each other when updates are necessary. The Knowledge Consistency Checker (KCC) selects one or more replication partners for each domain controller in the site. |
|
|
Term
|
Definition
Defines the path used by replicatin traffic. |
|
|
Term
|
Definition
Determines the time when a site link object is available to replicate information. |
|
|
Term
|
Definition
Defines a chain of site links by which domain controllers from different sites can communicate. |
|
|
Term
|
Definition
A connection between two or more sites that enables intersite replication |
|
|
Term
|
Definition
An attribute set on an object to indicate when it was last updated. Timestamps are used to assist in the resolution of conflicts during replication. If a change was made to an attribute of the same object, the timestamp can help determine which object is the most up-to-date. |
|
|
Term
|
Definition
Default characteristic of site links that use the same transport protocol. A domain controller inany site can connect to a domain controller in any other site by navigating a chain of site links. |
|
|
Term
|
Definition
The change will be placed at the "beginning of the line" and it will be applied before any other changes that are waiting to be replicated. |
|
|
Term
|
Definition
A value associated with each Active Directory attribute that keeps track of how many times that attribute has been changed. |
|
|
Term
|
Definition
The network infrastructure between sites defined by fast and reliable IP subnets. |
|
|
Term
What is a Certificate Revocation List (CRL) ? |
|
Definition
A Certificate Revocation List (CRL) is a digitally signed list of unexpired certificates that a particular CA has revoked. |
|
|
Term
AD CS supports two types of CRLs ? |
|
Definition
The AD CS supports two types of CRLs. _x000D_ _x000D_ A Base CRL is a full, initial set of revoked certificates. _x000D_ _x000D_ A Delta CRL lists only certificates that have been revoked since the last full Base CRL was implemented. |
|
|
Term
|
Definition
CRL Distribution Point (CDP) |
|
|
Term
What is a CRL Distribution Point (CDP) ? |
|
Definition
A CRL Distribution Point (CDP) is a certificate extension that indicates where the CRL for a particular CA can be retrieved. |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
Using CDPs enables PKI administrators to locate and access a relevant CRL so they can manually update the entries it contains. These entries are valid only for a specified time period. |
|
|
Term
|
Definition
Active Directory (AD) : You use the AD as the CDP to publish and store CRLs for enterprise CAs, which use certificate templates. PKI users can retrieve CRL data from an AD CDP using LDAP. _x000D_ _x000D_ Accessing CRLs via a directory service uses more bandwidth than accessing CRLs directly because it requires that every client be able to authenticate to every server. Directories must be linked so that results can be located and passed back to the requesting PKI client. _x000D_ _x000D_ A local directory: _x000D_ You use the local directory of a CA server as the CDP to store CRLs on standalone CAs, which don't require AD or use certificate templates. By default, standalone CAs hold all certificate requests in a pending queue until a CA approves them. _x000D_ _x000D_ PKI users can access CRL data in a local directory via the Internet or an extranet, using HTTP or FTP. |
|
|
Term
|
Definition
Online Certificate Status Protocol |
|
|
Term
|
Definition
The OCSP enables you to manage and distribute the revocation status of a certificate via the Online Responder service. |
|
|
Term
|
Definition
you use the OCSP to submit a certificate status request to an Online Responder. The Online Responder service uses the OCSP to issue a digitally signed certificate status response, based on the CRLs that are provided to it by CAs. |
|
|
Term
configure an Online Responder |
|
Definition
You can use the following sets of properties to configure an Online Responder: _x000D_ _x000D_ Web Proxy _x000D_ Audit _x000D_ Security |
|
|
Term
To validate whether AD replicated fine between to DCs run command ? |
|
Definition
|
|
Term
If users at a Branch are to log onto a Domain using RODC ? |
|
Definition
Password Replication Policy should be configured. |
|
|
Term
|
Definition
Active Directory Certificate Services |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
|
Definition
Certification Authorities |
|
|
Term
|
Definition
A CA is used to issue digital certificates and the directories are used to store policies and certificates. |
|
|
Term
|
Definition
Certificate Revocation List |
|
|
Term
|
Definition
A CRL is a digitally signed list of unexpired certificates revoked by a CA. |
|
|
Term
What are Certificate Templates ? |
|
Definition
Certificate templates give instructions to users about procedures for creating and submitting a valid certificate request. This is an essential part of an enterprise CA and enables an administrator to recognize, configure, and issue certificates that have been pre-configured for selected tasks. |
|
|
Term
Where are Certificate templates stored ? |
|
Definition
Certificate templates are stored in Active Directory Domain Services (AD DS). _x000D_ _x000D_ This enables them to be used by all CAs in a forest and ensures that the CAs have access to the current standard templates. |
|
|
Term
Benefits of using Certificate Templates ? |
|
Definition
consistent application of the certificate policy across the forest. _x000D_ _x000D_ There are default templates that can be used. |
|
|
Term
Default Certificate Templates Available are ? |
|
Definition
Computer _x000D_ Cross Certification Authority _x000D_ Directory Email Replication _x000D_ CEP Encryption _x000D_ Code Signing _x000D_ Domain Controller _x000D_ Domain Controller Authentication _x000D_ EFS Recovery Agent |
|
|
Term
How many versions of Certificate Templates are available ? |
|
Definition
Version 1 _x000D_ Version 2 _x000D_ Version 3 |
|
|
Term
Explain Version 1 certificate Template ? |
|
Definition
Version 1certificate templates are available in a Windows Server 2000 PKI. When a CA is installed, these templates are created by default and cannot be removed or modified. However, you can create a duplicate copy of a version 1 template and change it to a modifiable version 2 or version 3 template. _x000D_ _x000D_ Version 1 templates are supported by CAs configured for Windows Server 2000 and Windows Server 2003 Standard Edition, which only support version 1 templates. |
|
|
Term
Explain Version 2 certificate Template ? |
|
Definition
Version 2 certificate templates enable you to customize the settings and permissions of a template based on your needs. These templates are only issued by Enterprise CAs installed on Windows Server 2003 Enterprise Edition or higher. |
|
|
Term
Explain Version 2 certificate Template ? |
|
Definition
Version 3 certificate templates enable an administrator to add the advanced Suite B cryptographic settings to their certificates. These settings contain advanced options for digital signatures, encryption, hashing, and key exchange. Administrators can only issue certificates based on version 3 certificate templates from CAs installed on Windows Server 2008 servers. These certificates can only be used on clients running Windows Server 2008 or Windows Vista. |
|
|
Term
Windows Server 2000 and Windows Server 2003 Standard Edition CAs support which version of certificate templates? |
|
Definition
|
|
Term
Windows Server 2003 Datacenter and Enterprise Edition CAs – support which version of certificate templates ? |
|
Definition
|
|
Term
Windows Server 2008 CAs support which version of certificate templates ? |
|
Definition
support for versions 1, 2, and 3 |
|
|
Term
What are the permissions that you can assign to a certificate template ? |
|
Definition
The permissions that you can assign to a certificate template are : _x000D_ _x000D_ Full Control _x000D_ Enroll _x000D_ Autoenroll _x000D_ Read _x000D_ Write |
|
|
Term
Note : Windows Server 2008 enables key archival and recovery to prevent potential loss of data that can result from the loss of a key. |
|
Definition
Note : This process enables a Key Recovery Agent (KRA) to retrieve private keys, original certificates, and public keys from a database. |
|
|
Term
|
Definition
|
|
Term
Note : Enterprise CAs can archive a user's private key in their database when certificates are issued. These private keys are encrypted and stored by a CA. |
|
Definition
Note :A private key can be recovered at a later time by using the private key archive. |
|
|
Term
How do you configure your environment for key archival ? |
|
Definition
To configure your environment for key archival, you will need to _x000D_ _x000D_ * configure a KRA certificate template and enroll the KRA for a KRA certificate _x000D_ _x000D_ * enable key archival for a CA |
|
|
Term
How do you configure a KRA certificate template ? |
|
Definition
you need to add the certificate template to a CA. _x000D_ _x000D_ _x000D_ If the certificate is configured with Read and Enroll permissions, the new KRA can use the Certificates snap-in and the Certificate Import Wizard to create a KRA certificate. _x000D_ _x000D_ If the certificate is configured with the Autoenroll permission, it will be issued automatically the next time the user logs on to the network |
|
|
Term
Restricted groups policy settings enable you to manage the membership of groups. |
|
Definition
Restricted groups policy settings enable you to manage the membership of groups. |
|
|
Term
Remember that _x000D_ Member Of settings are cumulative and that if GPOs use the Members setting, only the Members _x000D_ setting with the highest GPO processing priority will be applied, and its list of members will prevail. |
|
Definition
Remember that _x000D_ Member Of settings are cumulative and that if GPOs use the Members setting, only the Members _x000D_ setting with the highest GPO processing priority will be applied, and its list of members will prevail. |
|
|
Term
Delegating Administration Using Restricted Groups Policies with the _x000D_ Member Of Setting. |
|
Definition
In Group Policy Management Editor, navigate to Computer Configuration\Policies\ _x000D_ Windows Settings\Security Settings\Restricted Groups. |
|
|
Term
You want to add a group to the local Administrators group on computers without _x000D_ removing accounts that already exist in the group. Describe the restricted groups _x000D_ policy you should create. |
|
Definition
Create a restricted groups policy for the group you wish to add. Use the Member Of policy setting (This Group Is A Member Of) and specify Administrators |
|
|
Term
|
Definition
|
|
Term
|
Definition
Group Policy Management Console |
|
|
Term
|
Definition
Group Policy Management Editor |
|
|
Term
|
Definition
A policy setting can have three states: _x000D_ _x000D_ Not Configured, _x000D_ Enabled, _x000D_ and Disabled. |
|
|
Term
A single GPO can be linked to more than one site or OU. |
|
Definition
A single GPO can be linked to more than one site or OU. |
|
|
Term
What is the Scope of the GPO : Security Filters ? |
|
Definition
You can narrow the _x000D_ _x000D_ Security Filters that specify global security groups to which the GPO should or should not apply. |
|
|
Term
|
Definition
Windows Management Instrumentation |
|
|
Term
What do Windows Management Instrumentation (WMI) filters do for the scope of a GPO ? |
|
Definition
Windows Management Instrumentation (WMI) filters that specify a scope, _x000D_ using characteristics of a system such as operating system version or free disk space. |
|
|
Term
|
Definition
|
|
Term
What is the Resultant Set of Policy (RSoP) ? |
|
Definition
Users or Computers are likely to be within the scope of multiple GPOs linked to the sites, domain, or OUs in which the users or computers exist. _x000D_ _x000D_ This leads to the possibility that policy settings might be configured differently in multiple GPOs. _x000D_ _x000D_ You must be able to understand and evaluate the Resultant Set of Policy (RSoP), which determines the settings that are applied by a client when the settings are configured divergently in more than one GPO. |
|
|
Term
Refresh settings for Policy settings in the Computer Configuration node ? |
|
Definition
Policy settings in the Computer Configuration node are applied at _x000D_ system startup and every 90–120 minutes thereafter. |
|
|
Term
Policy Refresh settings User Configuration policy settings ? |
|
Definition
User Configuration policy settings are _x000D_ applied at logon and every 90–120 minutes thereafter. |
|
|
Term
Manual Refresh of Group policy settings is done using ? |
|
Definition
gpupdate.exe _x000D_ /force _x000D_ /logoff _x000D_ /target: { computer | user } _x000D_ /wait: value _x000D_ /boot |
|
|
Term
What are the tools associated with Group Policy Updation ? |
|
Definition
Gpupdate _x000D_ Secedit _x000D_ FLEX COMMAND _x000D_ _x000D_ FLEX COMMAND: Help in group updates of workstation. It can be applied directly to OUs etc |
|
|
Term
|
Definition
|
|
Term
Security settings are reapplied every 16 hours even if a GPO has not changed. |
|
Definition
Security settings are reapplied every 16 hours even if a GPO has not changed. |
|
|
Term
Always Wait For Network At Startup And Logon policy setting |
|
Definition
Without this setting, by default, Windows XP and Windows Vista clients perform only background refreshes, meaning that a client might start up and a user might log on without receiving the latest policies from the domain. |
|
|
Term
|
Definition
Group Policy Software Installation |
|
|
Term
startup,logon, logoff, and shutdown scripts will not run _x000D_ if the user is disconnected from the Enterprise Network. |
|
Definition
startup,logon, logoff, and shutdown scripts will not run _x000D_ if the user is disconnected from the Enterprise Network. |
|
|
Term
If a user is disconnected from the Enterprise network does group policy still apply itself ? |
|
Definition
Yes, The previously applied group policy settings are still applied. |
|
|
Term
The local GPO exists whether or not _x000D_ the computer is part of domain, workgroup, _x000D_ or a non-networked environment. |
|
Definition
The local GPO exists whether or not _x000D_ the computer is part of domain, workgroup, _x000D_ or a non-networked environment. |
|
|
Term
By default, only the Security Settings policies _x000D_ are configured on a system’s local GPO. _x000D_ _x000D_ All other policies are set at Not Configured |
|
Definition
By default, only the Security Settings policies _x000D_ are configured on a system’s local GPO. _x000D_ _x000D_ All other policies are set at Not Configured |
|
|
Term
When AD DS is installed, _x000D_ two default GPOs are created _x000D_ _x000D_ â– Default Domain Policy _x000D_ â– Default Domain Controllers Policy |
|
Definition
â– Default Domain Policy : This GPO is linked to the domain and has no security group or WMI filters. _x000D_ _x000D_ â– Default Domain Controllers Policy : This GPO is linked to the Domain Controllers OU. Because computer accounts for domain controllers are kept exclusively in the Domain Controllers OU, and other computer accounts should be kept in other OUs, this GPO affects only domain controllers. |
|
|
Term
|
Definition
globally unique identifier |
|
|
Term
By default, when Group Policy refresh occurs, the CSEs apply settings in a GPO only if the GPO has been updated |
|
Definition
By default, when Group Policy refresh occurs, the CSEs apply settings in a GPO only if the _x000D_ GPO has been updated |
|
|
Term
Describe the default Group Policy processing behavior, including refresh intervals and CSE application of policy settings |
|
Definition
Every 90–120 minutes, the Group Policy Client service determines which GPOs are scoped to the user or computer and downloads any GPOs that have been updated, based on the GPOs’ version numbers. _x000D_ _x000D_ CSEs process the policies in the GPOs according to their policy processing configuration. _x000D_ _x000D_ By default, most CSEs apply policy settings only if a GPO has been updated. _x000D_ _x000D_ Some CSEs also do not apply settings if a slow link is detected. |
|
|
Term
|
Definition
Directory Replication Agent |
|
|
Term
|
Definition
The GPC is an Active Directory object stored in the Group Policy Objects container _x000D_ within the domain naming context of the directory. Like all Active Directory objects, each GPC _x000D_ includes a globally unique identifier (GUID) attribute that uniquely identifies the object _x000D_ within Active Directory. The GPC defines basic attributes of the GPO, but it does not contain _x000D_ any of the settings. The settings are contained in the GPT, a collection of files stored in the SYSVOL _x000D_ of each domain controller in the %SystemRoot%\SYSVOL\Domain\Policies\GPO GUID _x000D_ path, where GPO GUID is the GUID of the GPC. When you make changes to the settings of a _x000D_ GPO, the changes are saved to the GPT of the server from which the GPO was opened |
|
|
Term
Scripting Languages that can be used to write code for Group Policy in Windows Server 2008 |
|
Definition
Microsoft Visual Basic, Scripting Edition (VBScript), Microsoft JScript, Perl, and Microsoft MS DOS style batch files (.bat and .cmd). |
|
|
Term
GPO is actually two components: a _x000D_ Group Policy Container (GPC) _x000D_ and Group Policy Template (GPT) |
|
Definition
GPO is actually two components: a _x000D_ Group Policy Container (GPC) _x000D_ and Group Policy Template (GPT) |
|
|
Term
|
Definition
Knowledge Consistency Checker |
|
|
Term
How is Group Policy Container GPC of GPO replicated ? |
|
Definition
The GPC in Active Directory is replicated by the Directory Replication Agent (DRA) using a topology generated by the Knowledge Consistency Checker (KCC). |
|
|
Term
The GPT in the SYSVOL is replicated using one of two technologies. _x000D_ _x000D_ The File Replication Servicev(FRS) is used to replicate SYSVOL in domains running Windows Server 2008, Windows _x000D_ Server 2003, and Windows 2000. _x000D_ _x000D_ If all domain controllers are running Windows Server 2008, you can configure SYSVOL replication, using Distributed File System Replication (DFS-R), a much more efficient and robust mechanism. |
|
Definition
The GPT in the SYSVOL is replicated using one of two technologies. _x000D_ _x000D_ The File Replication Servicev(FRS) is used to replicate SYSVOL in domains running Windows Server 2008, Windows _x000D_ Server 2003, and Windows 2000. _x000D_ _x000D_ If all domain controllers are running Windows Server 2008, _x000D_ you can configure SYSVOL replication, using Distributed File System Replication (DFS-R), a much more efficient and robust mechanism. |
|
|
Term
What does the Group Policy Verification Tool Gpotool.exe do ? |
|
Definition
Gpotool.exe is used to troubleshoot GPO status, _x000D_ including problems caused by the replication _x000D_ of GPOs, leading to inconsistent versions of a GPC and GPT |
|
|
Term
In both the Computer Configuration and User Configuration nodes, _x000D_ the Administrative Templates node contains _x000D_ registry-based Group Policy settings. |
|
Definition
In both the Computer Configuration and User Configuration nodes, _x000D_ the Administrative Templates node contains _x000D_ registry-based Group Policy settings. |
|
|
Term
Policies in the Administrative Templates node in the Computer Configuration node modify _x000D_ registry values in the HKEY_LOCAL_MACHINE (HKLM) k |
|
Definition
Policies in the Administrative Templates node in the Computer Configuration node modify _x000D_ registry values in the HKEY_LOCAL_MACHINE (HKLM) k |
|
|
Term
Policies in the Administrative Templates node in the _x000D_ User Configuration node modify registry values in the HKEY_CURRENT_USER (HKCU) key. |
|
Definition
Policies in the Administrative Templates node in the _x000D_ User Configuration node modify registry values in the HKEY_CURRENT_USER (HKCU) key. |
|
|
Term
ADM and ADMX/ADML administrative templates can coexist. _x000D_ These are administrative templates files |
|
Definition
ADM and ADMX/ADML administrative templates can coexist. _x000D_ These are administrative templates files |
|
|
Term
Another new Group Policy feature in Windows Server 2008 is starter GPOs. _x000D_ A starter GPO contains Administrative Template settings |
|
Definition
Another new Group Policy feature in Windows Server 2008 is starter GPOs. _x000D_ A starter GPO contains Administrative Template settings |
|
|
Term
Starter GPOs can contain only Administrative Templates policy settings. |
|
Definition
Starter GPOs can contain only Administrative Templates policy settings. |
|
|
Term
You can centralize the management of administrative templates by creating a central store |
|
Definition
You can centralize the management of administrative templates by creating a central store |
|
|
Term
Windows Server 2008 also adds the ability to attach comments to GPOs and policy settings |
|
Definition
Windows Server 2008 also adds the ability to attach comments to GPOs and policy settings |
|
|
Term
1. Litware, Inc., has three business units, _x000D_ each represented by an OU in the litwareinc.com domain. _x000D_ The business unit administrators want the ability to manage Group Policy for the users and computers in their OUs. Which actions do you perform to give the administrators the ability to manage Group Policy fully for their business units? (Choose all _x000D_ that apply. Each correct answer is a part of the solution.) _x000D_ _x000D_ A. Copy administrative templates from the central store to the Policy Definitions folder on the administrators’ Windows Vista workstations. _x000D_ _x000D_ B. Add business unit administrators to the Group Policy Creator Owners group. _x000D_ _x000D_ C. Delegate Link GPOs permission to the administrators in the litwareinc.com domain. _x000D_ _x000D_ D. Delegate Link GPOs permission to the each business unit’s administrators in the business unit’s OU. |
|
Definition
1. Correct Answers: B and D _x000D_ _x000D_ A. Incorrect: The central store is used to centralize administrative templates so that they do not have to be maintained on administrators’ workstations. _x000D_ _x000D_ B. Correct: To create GPOs, the business unit administrators must have permission to access the Group Policy Objects container. By default, the Group Policy Creator Owners group has permission, so adding the administrators to this group will _x000D_ allow them to create new GPOs. _x000D_ _x000D_ C. Incorrect: Business unit administrators require permission to link GPOs only to their business unit OU, not to the entire domain. Therefore, delegating permission to link GPOs to the domain grants too much permission to the administrators. _x000D_ _x000D_ D. Correct: After creating a GPO, business unit administrators must be able to scope the GPO to users and computers in their OU; therefore, they must have the Link GPOs permission. |
|
|
Term
You are an administrator at Contoso, Ltd. At a recent conference, you had a conversation _x000D_ with administrators at Fabrikam, Inc. You discussed a particularly successful set of configurations _x000D_ you have deployed using a GPO. The Fabrikam administrators have asked _x000D_ you to copy the GPO to their domain. Which steps can you and the Fabrikam administrators _x000D_ perform? _x000D_ A. Right-click the Contoso GPO and choose Save Report. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Import. _x000D_ B. Right-click the Contoso GPO and choose Back Up. Right-click the Group Policy _x000D_ Objects container in the Fabrikam domain and choose Restore From Backup. _x000D_ C. Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Paste. _x000D_ D. Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Import Settings. |
|
Definition
Correct Answer: D _x000D_ A. Incorrect: A saved report is an HTML or XML description of a GPO and its settings. _x000D_ It cannot be imported into another GPO. _x000D_ B. Incorrect: The Restore From Backup command is used to restore a GPO in its _x000D_ entirety. _x000D_ C. Incorrect: You cannot paste settings into a GPO. _x000D_ D. Correct: You can import settings to an existing GPO from the backed-up settings _x000D_ of another GPO. |
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is a single Active Directory domain in the _x000D_ company network. Windows Server 2008 is run by all domain controllers that are configured as DNS servers. A _x000D_ domain controller named DC01 has a standard primary zone for wiikigo.com. A domain controller named DC02 _x000D_ has a standard secondary zone for wiikigo.com. You have to make sure that the replication of the wiikigo.com _x000D_ zone is encrypted. You must not lose any zone data. So what action should you perform? _x000D_ _x000D_ A. The zone transfer settings of the standard primary zone should be configured. The Master Servers lists on _x000D_ the secondary zone should be modified. _x000D_ _x000D_ B. The interface that the DNS server listens on should be modified on both servers. _x000D_ _x000D_ C. The primary zone should be converted into an Active Directory-integrated zone. The secondary zone should _x000D_ be deleted. _x000D_ _x000D_ D. The primary zone should be converted into an Active Directory-integrated stub zone. The secondary zone _x000D_ should be deleted. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is an organizational unit named Production in _x000D_ your company. The Production organizational unit has a child organizational unit named R D. After a GPO _x000D_ named Software Deployment is created by you, you link it to the Production organizational unit. You create a _x000D_ shadow group for the R D organizational unit. You have to deploy an application to users in the Production _x000D_ organizational unit. You also need to make sure that the application is not deployed to users in the R D _x000D_ organizational unit. What are two possible ways to achieve this goal? _x000D_ _x000D_ A. In order to achieve this goal, security filtering on the Software Deployment GPO should be configured to _x000D_ Deny Apply group policy for the R D security group. _x000D_ _x000D_ B. In order to achieve this goal, the Enforce setting should be configured on the software deployment GPO. _x000D_ _x000D_ C. In order to achieve this goal, the Block Inheritance setting should be configured on the R D organizational _x000D_ unit. _x000D_ _x000D_ D. In order to achieve this goal, the Block Inheritance setting should be configured on the Production _x000D_ organizational unit. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. You have a domain controller named DC01. Windows _x000D_ Server 2008 is run by this domain controller. DC01 is configured as a DNS server for wiikigo.com. You have the _x000D_ DNS Server server role installed on a member server which is named Server01 and then you create a standard _x000D_ secondary zone for wiikigo.com. DC01 is configured as the master server for the zone. You have to make sure _x000D_ that Server01 receives zone updates from DC01. What action should you perform? _x000D_ _x000D_ A. The zone transfer settings for the wiikigo.com zone should be modified on DC01. _x000D_ _x000D_ B. The Server01 computer account should be added to the DNSUpdateProxy group. _x000D_ _x000D_ C. A conditional forwarder should be added on S01. _x000D_ 70-640 3D. The permissions of wiikigo.com zone should be modified on DC01. _x000D_ _x000D_ D. The permissions of wiikigo.com zone should be modified on DC01. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There are two domain controllers named DC01 and _x000D_ DC02 in your company. All domain and forest operations master roles are hosted by DC01. _x000D_ A problem occurred that DC01 fails. _x000D_ Since you are the technical support, you are required to reinstall the operating system to rebuild DC01. In _x000D_ addition, you are required to have all operations master roles rollbacked to their original state. A metadate _x000D_ cleanup is performed and all references of DC01 are removed. Which action should be performed to achieve _x000D_ the goal? (Choose three from the options below, and then put them in a correct order) _x000D_ 1/ Operations master roles should be transferred from DC01 to DC02. _x000D_ 2/ Operations master roles should be transferred from DC02 to DC01. _x000D_ 3/ Operations master roles should be seized from DC01 to DC02. _x000D_ 4/ Operations master roles should be seized from DC02 to DC01 _x000D_ 5/ DC01 should be rebuilt as a replica domain controller. _x000D_ 6/ DC02 should be rebuilt as a domain controller. _x000D_ _x000D_ A. 3->5->2 _x000D_ B. 3->6->1 _x000D_ C. 4->5->2 _x000D_ D. 4->6->1 |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is an Active Directory forest in the company. Not _x000D_ all domain controllers in the forest are configured as Global Catalog Servers. One root domain and one child _x000D_ domain is contained in your domain structure. You modify the folder permissions on a file server that is in the _x000D_ child domain. You find that some Access Control entries start with S-1-5-21 and that no account name is listed. _x000D_ You have to list the account names. So what action should you perform? _x000D_ _x000D_ A. The schema should be modified to enable replication of the friendlynames attribute to the Global Catalog. _x000D_ _x000D_ B. The RID master role in the child domain should be moved to a domain controller that holds the Global _x000D_ Catalog. _x000D_ _x000D_ C. The infrastructure master role in the child domain should be moved to a domain controller that does not _x000D_ hold the Global Catalog. _x000D_ _x000D_ D. The RID master role in the child domain should be moved to a domain controller that does not hold the _x000D_ Global Catalog. |
|
Definition
|
|
Term
How would you delegate control of an AD OU to a user? |
|
Definition
- Right Click on OU _x000D_ - Delegate Control _x000D_ - Choose User _x000D_ - Choose the appropriate option _x000D_ - Finish |
|
|
Term
|
Definition
An Organizational Unit (OU) is similar to a folder that subdivides and organizes network resources within a domain. |
|
|
Term
What are the different types of OU? |
|
Definition
Parent OUs are OUs that contain other OUs. _x000D_ Child OUs are OUs within other OUs. |
|
|
Term
What organisational structures can you not apply GPO's to? |
|
Definition
|
|
Term
What is group policy inheritance? |
|
Definition
Through inheritance, settings applied to the domain or parent OUs apply to all child OUs and objects within those OUs. |
|
|
Term
How can you prevent objects from accidental deletion in AD? |
|
Definition
- On the Object tab, select the Protect object from accidental deletion check box. (This option is only seen with Advanced Features selected from the View menu.) _x000D_ _x000D_ - On the Security tab, select the Deny Delete All Child Objects advanced permission for |
|
|
Term
What setting should be set at creation to prevent an AD OU being accidentally deleted? |
|
Definition
When you create an organizational unit, leave the Protect container from accidental deletion check box selected. This is the default. Other types of objects do not have this default setting and must be manually configured. |
|
|
Term
How would you delete an AD object that is protected from deletion? |
|
Definition
To delete on abject that is protected, first clear the Protect container from accidental deletion setting, then delete the object. |
|
|
Term
What is delegation of authority? |
|
Definition
Delegating authority is the assignment of administrative tasks, such as resetting passwords or creating new users, to appropriate users and groups. |
|
|
Term
Describe some of the facts about delegating control : |
|
Definition
- You can delegate control of any part of an OU or object at any level with the Delegation of Control Wizard or through the Authorization Manager console. _x000D_ _x000D_ - An object-based design allows you to delegate control based on the types of objects in each |
|
|
Term
What is the Builtin Default Container? |
|
Definition
The Builtin container holds default service administrator accounts and domain local security groups. These groups are pre-assigned permissions needed to perform domain management tasks. |
|
|
Term
What is the Computers default container? |
|
Definition
The Computers container holds all computers joined to the domain without a computer account. It is the default location for new computer accounts created in the domain. |
|
|
Term
What is the Domain Controllers detault container? |
|
Definition
The Domain Controllers OU is the default location for the computer accounts for domain controllers. |
|
|
Term
What is the LostAndFound default container? |
|
Definition
The LostAndFound container holds objects moved or created at the same time an Organizational Unit is deleted. Because of Active Directory replication, the parent OU can be deleted on one domain controller while administrators at other domain controllers can add or move objects to the deleted OU before the change has been replicated. During replication, new objects are placed in the LostAndFound container. |
|
|
Term
What is the NTDS Quotas default container? |
|
Definition
The NTDS Quotas container holds objects that contain limits on the number of objects users and groups can own. |
|
|
Term
What is the Program Data default container? |
|
Definition
The Program Data container holds application-specific data created by other programs. This container is empty until a program designed to store information in Active Directory uses it. |
|
|
Term
What is the System default container? |
|
Definition
The System container holds configuration information about the domain including security groups and permissions, the domain SYSVOL share, DFS configuration information, and IP security policies. |
|
|
Term
What is the Users default container? |
|
Definition
The Users container holds additional predefined user and group accounts (besides those in the Builtin container). Users and groups are pre-assigned membership and permissions for completing domain and forest management tasks. |
|
|
Term
What is special about AD containers? |
|
Definition
They are automatically created and cannot be deleted |
|
|
Term
What is special about the Domain Controllers OU |
|
Definition
It is the only default OU, and it can have a GPO applied, whereas the other default containers cannot have a GPO applied |
|
|
Term
How would you view hidden containers in AD Users and Computers? |
|
Definition
Click Advanced Features from the View menu |
|
|
Term
Which containers are hidden by default in AD Users and Computers? |
|
Definition
- LostAndFound _x000D_ - NTDS Quotas _x000D_ - Program Data _x000D_ - System |
|
|
Term
What is special about AD containers and how do they differ from OU's? |
|
Definition
They are automatically created and cannot have GPO's applied to them. |
|
|
Term
What is the SAM database? |
|
Definition
A local database that allows users to access local resources on the machine |
|
|
Term
What are the two types of user account? |
|
Definition
|
|
Term
What is a local user account? |
|
Definition
A local user account is created and stored on a local system and is not distributed to any other system. _x000D_ _x000D_ - Local user accounts are created with the Computer Management console. _x000D_ - The local Security Accounts Manager (SAM) manages the user account information. _x000D_ - Only local resources are accessible with local user accounts. |
|
|
Term
What is a domain user account? |
|
Definition
A domain user account is created and centrally managed through Active Directory, and is replicated between domain controllers in the domain. |
|
|
Term
How can domain user accounts be created? |
|
Definition
Domain user accounts are created with Active Directory Users and Computers, command line tools, and PowerShell. |
|
|
Term
What is unique to each domain user account? |
|
Definition
Each domain user account has a unique security identifier (SID) to identify the user. A user can log on to the domain from any computer that is a member of the domain and can access resources on that computer or on other computers for which the domain user account has permissions. |
|
|
Term
How can external users with email accounts be represented in AD? |
|
Definition
External users which need an e-mail account, can be represented through a contact object |
|
|
Term
What is a contact object? |
|
Definition
an account that does not have any security permissions. Users represented as contact objects cannot log on to the domain. Use contacts to add information about individuals, such as e-mail or phone number, to Active Directory. Applications, such as Exchange, can search for attributes of contact objects. |
|
|
Term
What is the user or logon name? |
|
Definition
The user or logon name is the name of the user account |
|
|
Term
What is the user principle name (UPN)? |
|
Definition
The User Principle Name (UPN) combines the user account name with the DNS domain name _x000D_ _x000D_ - The UPN format is also known as the SMTP address format. _x000D_ - The DNS domain name in the UPN is known as the UPN suffix. _x000D_ - By default, the domain that holds the user account is selected for the UPN suffix. However, you can configure different UPN suffixes to use instead of the domain name. |
|
|
Term
What is the LDAP Distinguished Name (DN)? |
|
Definition
The LDAP Distinguished Name (DN) references the domain and related container(s) where the object resides. It has three basic attributes: _x000D_ Domain Component (DC) _x000D_ Organizational Unit (OU) _x000D_ Common Name (CN) |
|
|
Term
What is the Relative Distinguished Name (RDN) |
|
Definition
The Relative Distinguished Name (RDN) is used to identify the object within its container. The RDN needs to be unique only within the object’s container. |
|
|
Term
When would you use the Ãœser cannot change password"option? |
|
Definition
when you want to maintain control over a Guest, service, or temporary account. For example, many applications use service accounts for performing system tasks. The application must be configured with the user account name and password. If you allow changing the user account password for the service account, you would also need to change the password within every application that uses that account. |
|
|
Term
How would you unlock an account? |
|
Definition
To unlock an account, go to the Account tab in the account object's Properties dialog box, and select the Unlock Account box. Resetting the password on the account also unlocks a user account. |
|
|
Term
What should you do if a user account is accidentally deleted? |
|
Definition
Restore it from backup rather than creating a new one with the same name. Creating a new account with the same name results in a user account with a different SID and will not automatically assume the permissions and memberships of the previously deleted account. |
|
|
Term
How would you add a User Principal Name (UPN) suffix to a forest? |
|
Definition
1) Open Active Directory Domains and Trusts. _x000D_ 2) Right-click Active Directory Domains and Trusts in the Tree window pane, then select Properties. _x000D_ 3) Type the new UPN suffix that you would like to add to the forest on the UPN Suffixes tab. _x000D_ 4) Click Add. _x000D_ 5) Click OK. |
|
|
Term
What is a computer account? |
|
Definition
A computer account is an Active Directory object that identifies a network computer. The account in Active Directory is associated with a specific hardware device |
|
|
Term
How would you prestage a computer account? |
|
Definition
From Active Directory Users and Computers, create a computer account. This process is called prestaging computer accounts. From the workstation, join the domain. The workstation will be associated with the computer account you created previously. |
|
|
Term
Where is the computer account created when you join a workstation to the domain? |
|
Definition
In the Computers built-in container |
|
|
Term
How would you control where computer accounts are placed when a computer joins the domain? |
|
Definition
Create computer account ahead of time (pre-stage them) |
|
|
Term
Which groups have permissions to create a computer account? |
|
Definition
- Account Operators _x000D_ - Domain Admins _x000D_ - Enterprise Admins |
|
|
Term
How many computers are the Authenticated Users group members allowed to join to the domain (from a workstation)? |
|
Definition
10 - this wil also create the computer account automatically if it doesn't already exist. This ability comes from the Add workstations to a domain user right. |
|
|
Term
How would you allow a specific user to join a specific computer to the domain? |
|
Definition
You can also allow specific users to join specific computers to a domain by selecting The following user or group can join this computer to a domain when creating the computer account. |
|
|
Term
How would you give other users permissions to create computer accounts in AD? |
|
Definition
By giving them the Create Computer Objects right over the Active Directory OU. This permission does not have a limit on the number of accounts that can be created. Note: You must grant this right to the domain or specific OUs. |
|
|
Term
Will a computer receive group policy settings once the computer account is created? |
|
Definition
No, the computer must be joined to the domain before it receives any GPO settings or AD receives any workstation-specific information |
|
|
Term
What commands can be used to create computer accounts from a command prompt or script? |
|
Definition
dsadd or netdom. (Use netdom join to jion a computer to the domain) |
|
|
Term
What establishes a secure channel between a computer and the domain controller? |
|
Definition
The computer password (authomatically generated when the computer joins the domain). |
|
|
Term
Where is the computer account password saved? |
|
Definition
On the local computer and in AD. BY default, it is changed every 30 days |
|
|
Term
What might cause a computer to fail to authenticate to the domain? |
|
Definition
If the two computer passwords (on the local machine and in AD) become unsychronised. _x000D_ _x000D_ This problem will also occur if you have rebuilt the computer, or if you are replacing the computer with another one using the same computer account name. |
|
|
Term
How would you reset the computer account after a logon failure? |
|
Definition
- Run the netdom reset command followed by the computer account name and the domain. _x000D_ - In Active Directory Users and Computers, right-click the computer account and select Reset Account. _x000D_ - Create a script in Visual Basic. _x000D_ _x000D_ After resetting the c |
|
|
Term
|
Definition
Local groups exist only on the local computer, and control access to local resources. |
|
|
Term
|
Definition
Domain groups exist in Active Directory, and can be used to control access to domain and local resources. In an Enterprise environment, you will work mainly with domain groups. |
|
|
Term
|
Definition
Active Directory groups have a group scope. The scope defines the potential group membership and the resource access that can be controlled through the group. The following table lists the different security group scopes and their membership and use. |
|
|
Term
What membership can a global group have? |
|
Definition
Global groups can contain members within the same domain. These include: _x000D_ _x000D_ - Global groups in the same domain (in native mode only). _x000D_ - Users and computers within the same domain. |
|
|
Term
What should a global group be used for? |
|
Definition
Use global groups to group users and computers within the domain who have similar access needs. |
|
|
Term
What membership can a domain local group have? |
|
Definition
Domain local groups can contain members from any domain in the forest. These include: _x000D_ _x000D_ - Domain local groups in the same domain (in native mode only). _x000D_ - Global groups within the forest. _x000D_ Universal groups within the forest (in native mode only). _x000D_ - Users and computers within the forest. |
|
|
Term
What membership can a universal group have? |
|
Definition
Universal groups can contain members from any domain in the forest. These include: _x000D_ _x000D_ - Universal groups within the forest. _x000D_ - Global groups within the forest. _x000D_ - Users and computers within the forest. |
|
|
Term
What resources can global groups permission? |
|
Definition
Global groups can be assigned permissions to resources anywhere in the forest. |
|
|
Term
What resources can domain local groups permission? |
|
Definition
Domain local groups can be assigned permissions within a domain. |
|
|
Term
What resources can universal groups permission? |
|
Definition
Universal groups can be assigned permissions to resources anywhere in the forest. |
|
|
Term
What should global groups be used for? |
|
Definition
Create global groups to organize users (e.g., Sales or Development). |
|
|
Term
What should domain local groups be used for? |
|
Definition
Create domain local groups representative of the domain controller resources to which you want to control access, and then assign permissions on the resource to the group. |
|
|
Term
What should universal groups be used for? |
|
Definition
Universal group membership should be relatively stable. For this reason, you should only add global or universal groups to universal groups. Avoid adding user accounts directly to universal groups. |
|
|
Term
What is a security group? |
|
Definition
A security group is one that can be used to manage rights and permissions. _x000D_ _x000D_ - Group members get the permissions that are granted to the group. _x000D_ - A security group represents an object with a security identifier (SID), which through the member attribute, collects other objects, such as users, computers, contacts, and other groups. |
|
|
Term
Which type of AD group should be used for assiging permissions? |
|
Definition
|
|
Term
What is a ditribution group? |
|
Definition
A distribution group is used to maintain a list of users and is typically used for sending e-mails to all group members. Distribution groups cannot be used for assigning permissions. |
|
|
Term
What happens if you convert a security group to a distribution group? |
|
Definition
This would remove the permissions assigned to the group. _x000D_ _x000D_ This could prevent or allow unwanted access. |
|
|
Term
How would you convert a global group to a domain local group? |
|
Definition
First convert to a universal group, then to a domain local. |
|
|
Term
Can you convert a global group nested in another global group into a universal group? |
|
Definition
No - a universal group cannot be a member of a global group |
|
|
Term
Can you make a universal group a member of a global group? |
|
Definition
|
|
Term
What happens when a group is deleted? |
|
Definition
All information about the group - including any permissions assigned - is deleted. |
|
|
Term
How can you recover a deleted group? |
|
Definition
- Re-create the group, add all the original group members, and reassign any permissions granted to the group. _x000D_ - Restore the group from a recent backup. |
|
|
Term
When are the default local groups created? |
|
Definition
During Windows installation |
|
|
Term
Can you rename or delete the default local groups? |
|
Definition
CAN rename them _x000D_ _x000D_ CANNOT delete them |
|
|
Term
What is the Administrators default local group? |
|
Definition
Members of the Administrators group have complete and unrestricted access to the computer, including every system right. The group contains the Administrator user account (by default) and any account designated as a computer administrator. |
|
|
Term
What is the Backup Operators default local group? |
|
Definition
Members of the Backup Operators group can back up and restore files (regardless of permissions), log on locally, and shut down the system. However, members cannot change security settings. |
|
|
Term
What is the User default local group? |
|
Definition
Members of the Users group: _x000D_ _x000D_ - Can use the computer but cannot perform system administration tasks and might not be able to run legacy applications. _x000D_ - Cannot share directories or install printers if the driver is not yet installed. _x000D_ - Cannot view or modify system files. |
|
|
Term
What group do "limited use"accounts become a member of automatically |
|
Definition
Users default local group |
|
|
Term
What is the Power Users default local group? |
|
Definition
Members of the Power Users group have no more user rights or permissions than a standard user account, by default. For legacy applications requiring the same Power User rights and permissions that were present in previous versions of Windows, administrators can apply a security template that enables the Power Users group to assume the same rights and permissions present in previous versions of Windows |
|
|
Term
What is the Guests default local group? |
|
Definition
Members of the Guests group have limited rights (similar to members of the Users group), such as shutting down the system. Members of the Guests group have a temporary profile created at log on, that is then deleted when the member logs off. |
|
|
Term
What is the Administrators default domain group? |
|
Definition
Full control over the computer, including every available right in the system (the only built-in account that automatically has all rights), including the Take ownership of files or other objects right. |
|
|
Term
What is the Server Operators default domain group? |
|
Definition
Log on locally, back up and restore files and directories, change the system time, and force a local or remote shutdown. Can also create and delete shared resources, format the hard disk, and start and stop some services. Abilities extend to domain controllers. |
|
|
Term
What is the Backup Operators default domain group? |
|
Definition
Back up, copy, and restore files on the computer (regardless of permissions). Log on to and shut down the computer. Cannot change security settings. |
|
|
Term
What is the Account Operators default domain group? |
|
Definition
Create, delete, and modify domain user accounts and groups. Cannot modify the Administrators group or any Operators groups. |
|
|
Term
What is the Guests default domain group? |
|
Definition
The domain Guest account is a member of this group. The group does not have any default rights. |
|
|
Term
What is the Network Configuration Operators default domain group? |
|
Definition
Change TCP/IP settings including changes on domain controllers. |
|
|
Term
What is the Print Operators default domain group? |
|
Definition
Create, share, manage, and delete printers on domain controllers. Manage Active Directory printer objects. Log on locally, add or remove device drivers, and shut down domain controllers. |
|
|
Term
What is the Users default domain group? |
|
Definition
Perform common tasks such as running applications, using local and remote printers, and locking workstations. By default, all domain members are members of this group. |
|
|
Term
Which default domain groups are created in the Built-In Container? |
|
Definition
Administrators _x000D_ Server Operators _x000D_ Backup Operators _x000D_ Account Operators _x000D_ Guests _x000D_ Network Configuration Operators _x000D_ Print Operators _x000D_ Users |
|
|
Term
What default domain groups are created in the Users container in AD? |
|
Definition
Domain Admins _x000D_ Domain Computers _x000D_ Comain Controllers _x000D_ Comain Guests _x000D_ Domain Users _x000D_ Enterprise Admins _x000D_ Schema Admins _x000D_ Read-Only Domain Controllers _x000D_ DHCP Administrators _x000D_ Cert Publishers |
|
|
Term
What is the Domain Admins default domain group? |
|
Definition
Full control over the domain. This group is a member of the Administrators group on all computers when they are joined to the domain. This means that members of the Domain Admins group can perform all tasks on any computer in the domain (including domain controllers). |
|
|
Term
What is the Domain Computers default domain group? |
|
Definition
Contains all computers that are a member of the domain. When you join a computer to the domain, it becomes a member of this group. |
|
|
Term
What is the Domain Controllers default domain group? |
|
Definition
Contains all domain controllers. When a computer is made a domain controller, it is added to this group. |
|
|
Term
What is the Domain Guests default domain group? |
|
Definition
Contains all domain guests. It does not have any default rights |
|
|
Term
What is the Domain Users default domain group? |
|
Definition
Contains all domain users. This group can be used to give access to all users in a domain. |
|
|
Term
What is the Enterprise Admins default domain group? |
|
Definition
Full control over all domains in the forest. This group is a member of the Administrators group on all computers in the forest, allowing them to perform any task on any computer in the forest. |
|
|
Term
What is the Schema Admins default domain group? |
|
Definition
Full control over the Active Directory schema. By default, the Administrator account is a member of this group. |
|
|
Term
What is the Read-Only Domain Controllers default domain group? |
|
Definition
Contains all members who have administrative access to the Read-Only Domain Controllers in the domain. |
|
|
Term
What is the DHCP Administrators default domain group? |
|
Definition
Contains all members who have administrative access to the DHCP service. |
|
|
Term
What is the Cert Publishers default domain group? |
|
Definition
Contains all members which are permitted to publish certificates to the directory. |
|
|
Term
Describe the AGDLP strategy |
|
Definition
A: Place user Accounts _x000D_ G: Into Global groups _x000D_ DL: Into Domain Local groups _x000D_ P: Assign Permissions to domain local groups |
|
|
Term
When is the AGDLP strategy used? |
|
Definition
Used in mixed mode domains and in native mode domains (does not use universal groups, which are also not available in mixed mode). |
|
|
Term
|
Definition
Nesting is the technique of making a group a member of another group. Using hierarchies of nested groups may make administration simpler--as long as you remember what permissions you have assigned at each level. |
|
|
Term
When is the AGUDLP strategy used? |
|
Definition
Used in native mode domains, when there is more than one domain, and you need to grant access to similar groups defined in multiple domains. |
|
|
Term
Describe the AGUDLP strategy |
|
Definition
A: Place user Accounts _x000D_ G: Into Global groups _x000D_ U: Into Universal groups _x000D_ DL: Into Domain Local groups _x000D_ P: Assign Permissions to domain local groups |
|
|
Term
When is the ALP strategy used? |
|
Definition
Used on workstations and member servers. _x000D_ _x000D_ ALP is best used in a workgroup environment, not in a domain. |
|
|
Term
Describe the ALP strategy |
|
Definition
A: Place user Accounts _x000D_ L: Into Local groups _x000D_ P: Assign Permissions to the local groups |
|
|
Term
When should universal groups be used? |
|
Definition
Universal groups should be used when you need to grant access to similar groups defined in multiple domains. It is best to add global groups to universal groups, instead of placing user accounts directly in universal groups. |
|
|
Term
What group should be used if both the users and resources are located in Multiple Domains? |
|
Definition
|
|
Term
What groups should not be used in a single domain design? |
|
Definition
|
|
Term
How can you start AD Users and Computers? |
|
Definition
- Server Manager _x000D_ - Administrative Tools (from the Control Panel or Start menu) _x000D_ - Running dsa.msc |
|
|
Term
|
Definition
Active Directory Service Interfaces Editor (ADSI Edit) acts as a low-level GUI editor for common administrative tasks such as adding, deleting, and moving objects. |
|
|
Term
What can you use ADSI Edit for? |
|
Definition
You can use ADSI Edit to query, view, and edit attributes that are not exposed through other MMC snap-ins (such as Active Directory Users and Computers). |
|
|
Term
What does the command ds add do? |
|
Definition
Dsadd creates a new object in Active Directory. |
|
|
Term
What does the command dsquery do? |
|
Definition
Dsquery finds objects that match the search criteria (allows a search through the whole forest). The command returns a list of objects that match the search criteria. Use Dsquery * to search all object types. |
|
|
Term
What does the Dsget command do? |
|
Definition
Dsget retrieves property information about an object. Use the -expand switch to show nested group membership for users. |
|
|
Term
What does the dsmod command do? |
|
Definition
Dsmod modifies or changes the properties of an object. |
|
|
Term
What does the dsrm command do? |
|
Definition
Dsrm removes (deletes) objects. Use the -subtree option to delete a container object and all objects below that object. |
|
|
Term
What does the movetree command do? |
|
Definition
Movetree moves an OU and its objects (it does not move computer objects). |
|
|
Term
What does the netdom command do? |
|
Definition
Netdom adds computer objects, joins a computer to a domain, and moves computer objects. |
|
|
Term
|
Definition
The Csvde command imports and exports Active Directory objects using a comma-separated list file. |
|
|
Term
|
Definition
Csvde can read existing information from Active Directory (export) or create new objects in Active Directory (import). |
|
|
Term
|
Definition
You cannot use Csvde to modify existing objects in Active Directory. |
|
|
Term
What are some common uses for CSvde? |
|
Definition
- Using Csvde to export objects from one Active Directory system (or an Exchange 5.5 database) and import them into a different Active Directory database. _x000D_ - Using a database program to create a CSV file, modifying the file, and importing the objects in |
|
|
Term
Will Csvde import passwords for user accounts? |
|
Definition
|
|
Term
What does the Ldifde command do? |
|
Definition
The Ldifde command imports, exports, modifies, and deletes objects in Active Directory using LDAP Data Interchange Format (LDIF) files. |
|
|
Term
What are some common uses for Ldifde? |
|
Definition
- Using Ldifde to export a set of Active Directory objects, modifying various attributes, and then re-importing the file to change the attributes. _x000D_ - Exporting or importing data that exists on non-Active Directory LDAP directories. |
|
|
Term
How can you manage passwords with Ldifde? |
|
Definition
Passwords are not exported with user accounts. You can change passwords for existing account with a .ldif file but you cannot create new user accounts with a password. |
|
|
Term
How would you export a user account and then import it with a password with Ldifde? |
|
Definition
1) Export the user accounts. The unicodePwd field will be blank. _x000D_ 2) Import the user accounts to create the accounts. The user accounts will be disabled, and the user will be forced to change the password at next logon. _x000D_ 3) Modify the .ldif file to change the operation to modify existing objects. Add a password for each user account and add entries to enable the account. _x000D_ 4) Run Ldifde using the file with the passwords to modify the existing user accounts. |
|
|
Term
What does the Ldp command do? |
|
Definition
The Ldp utility allows you to search for and view the properties of multiple Active Directory objects. It is a GUI-based, Windows Explorer-like utility with a scope pane on the left that is used for navigating through the Active Directory namespace, and a details pane on the right that is used for displaying results. |
|
|
Term
What is the Active Directory Migration Tool? |
|
Definition
The Active Directory Migration Tool (ADMT) is a GUI-based utility that helps you restructure your Active Directory organization or migrate objects from one domain to another. |
|
|
Term
Where can you move AD objects with ADMT? |
|
Definition
You can move objects to different domains within the same forest (intraforest), or to domains in other forests (interforest). |
|
|
Term
What must be in place for an interforest migration in ADMT? |
|
Definition
The target forest must trust the source forest. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Cscript C:\windows\system32\slmgr.vbs-ato |
|
|
Term
add server Core roles, components or features |
|
Definition
Ocsetup.exe <component> /switch |
|
|
Term
|
Definition
Active Directory Services Interface used by Windows PowerShell |
|
|
Term
|
Definition
The mechanism by which an identity is validated by comparing secrets such as passwords provided by the user or computer to secrets maintained in the identity store |
|
|
Term
|
Definition
|
|
Term
|
Definition
a command-line tool that imports or exports Active Directory objects from or to a comma-delimited text file. |
|
|
Term
|
Definition
Discretionary access control list |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
An administrative unit of Active Directory. With a domain , all domain controllers replicate information about objects such as users,, groups and computers in the domain |
|
|
Term
|
Definition
Most of the DS commands take two modifies after the command itself: the object type and the object's DN |
|
|
Term
|
Definition
creates an object in the directory IE dsadd user "user DN" -samid pre-windows 2000 logon name -pwd {Password | *} -mustchpwd yes |
|
|
Term
|
Definition
returns specified attributes of an object |
|
|
Term
|
Definition
Modifies specified attributes of an object |
|
|
Term
|
Definition
moves and object to a new container or OU |
|
|
Term
|
Definition
performs a query based on parameters provided at the command line and returns a list of matching objects |
|
|
Term
|
Definition
Removes and object, all objects in the subtree beneath a container object or both |
|
|
Term
|
Definition
the boundary of an instance of Active Directory. A forest contains one or more domains. All domains in the forest replicate the schema and configuration partitions of the directory. |
|
|
Term
|
Definition
the first domain created in a forest |
|
|
Term
|
Definition
A setting that determines which features of Active Directory are enabled within a domain or forest. The functional level limits the versions of Windows that can be used by domain controllers in a domain or forest. |
|
|
Term
global catalog or partial attribute set |
|
Definition
A partition of the Active Directory data store that contains a subset of attributes for every object in the Active Directory forest. The global catalog is used for efficient object queries and location. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A database of information regarding users, groups, computers, and other security principals. Attributes stored in an identity store include user names and passwords |
|
|
Term
|
Definition
Netdom join %computername% /domain: |
|
|
Term
|
Definition
A standard protocol used by Active Directory for authentication |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
Lightweight Directory Access Protocol Data Interchange Format is a draft internet standard for file format that can perform batch imports and exports of active directory objects including users. -i import -f filename to import to or from |
|
|
Term
|
Definition
Microsoft Management Console |
|
|
Term
|
Definition
A folder on a disk - a hierarchy that can be navigated Like a disk volume letter name or Mapped drive. |
|
|
Term
|
Definition
are administrative containers within Active Directory that are used to collect objects that share common requirements for administration, configuration or visibility. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Namespaces are created by providers, which can be thought of as drivers. Example file system has a provider as does the registry. Powershell can access and manipulate in the namespaces of those providers. |
|
|
Term
|
Definition
Windows Powershell namespaces from any provider can be represented as PSDrives Windows PowerShell automatically creates a PS Drive for each drive latter already defined by Windows |
|
|
Term
|
Definition
System Access Control List |
|
|
Term
|
Definition
Security Account Manager ID |
|
|
Term
|
Definition
a definition of the attributes and objects classes supported by Active Directory. |
|
|
Term
|
Definition
connect to the container (OU), create the object (user), populate its properties, (display name), commit the changes |
|
|
Term
set a static IPv4 configuration |
|
Definition
|
|
Term
|
Definition
An active Directory object that represents a portion of the network with reliable connectivity. Within a site, domain controllers replicate updates within seconds, and clients attempt to use the services within their site before obtaining the services from other sites |
|
|
Term
|
Definition
Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
Is a translator between .NET framework and Windows PowerShell. To connect to an active directory object, you submit an LDAP query string LDAP://OU=People,DC=contoso,dc=com" |
|
|
Term
|
Definition
User Principle Name The logon name plus the UPN suffix which by default is the domain to which you would logon ie: lflemingjm@hqda.army.mil Unique to entire forest. Email unique to the world! |
|
|
Term
|
Definition
Windows Management Interface |
|
|
Term
Which properties can be modified for multiple users simultaneously |
|
Definition
General, Account, Address, Profile, Organization Tabs |
|
|
Term
What are the distinctions between name of a user object and an account |
|
Definition
User Object Names sAMAccountName, User PrincipalName (UPN), display name and RDN. Account properties=an identity to which permissions and rights can be assigned. |
|
|
Term
sAMAcccountName Attribute |
|
Definition
(preWindows 2000 logo name) must be unique for the ENTIRE domain |
|
|
Term
|
Definition
Relative Distinguished Name of an object. Must be unique in an OU. |
|
|
Term
|
Definition
How users are listed in the GAL |
|
|
Term
|
Definition
Set objUser = GetObject"LDAP://UserDN") objUser.IsAccountLocked = False objUser.SetInfo() |
|
|
Term
|
Definition
the most important LDAP attribute CN="josephine fleming",ou=people,dc=contoso,dc=com |
|
|
Term
|
Definition
Security Identifier is created by the Windows 2000 security subsystem and assigned to security principal objects |
|
|
Term
|
Definition
in the context of programming or scripting, an action performed on an object. |
|
|
Term
|
Definition
In the context of programming or scripting, a data structure that represents a system resource. Objects expose properties or attributes, methods or actions. |
|
|
Term
|
Definition
Assignment of an administrative task.Delegation within Active Directory is achieved by modifying the DACL of an abject. |
|
|
Term
|
Definition
A view of Active Directory objects base on search criteria. |
|
|
Term
|
Definition
An IP (Internet Protocol) address isa 32 bit binary unique number identifier for a node or host connection on an IP network. usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. |
|
|
Term
Group policy Member Of setting |
|
Definition
Member of settings are cumulative |
|
|
Term
Group[ Policy by Members settings |
|
Definition
GPOs that use the Members setting, only the member setting with the highest GPO processing will be applied and its list of members will prevail, |
|
|
Term
|
Definition
A setting that configures the logging of security-related activities |
|
|
Term
|
Definition
An assignment of administrative responsibility. A grant of permission to perform an administrative task |
|
|
Term
Extensible Markup Language |
|
Definition
(XML) an abbreviated version of the Standard Generalized Markup Language (SGML) XML enables the flexible development of user-defined doc types, providing non-proprietary, persistent, and verifiable file format for the storage and transmission of text and data both on and off the Internet |
|
|
Term
|
Definition
A hardware or software product designed to isolate a system or network from another network. Traditionally used to protect a private network from intrusion from the Internet. A firewall inspects inbound or outbound packets or both and determines, based on rules, which packets to allow to the other side of the firewall. |
|
|
Term
|
Definition
The Primary access protocol for Active Directory. |
|
|
Term
|
Definition
used to configure the membership of groups, security settings, software management and auditing |
|
|
Term
|
Definition
Resultant Set of Policies |
|
|
Term
|
Definition
A Group Policy Object is, by itself, just a collection of configuration instructions that will be processed by the CSEs (Client Side Extensions) of computers. |
|
|
Term
|
Definition
Start of Authority, and important record type in the Domain Name System. |
|
|
Term
|
Definition
Check replication consistency between replication partners, monitor replication status, display replication metadata, force replication events and knowledge consistency checker recalculation |
|
|
Term
Will, the administrator for your organization, has decided to implement certificates for all of your internal users. What type of root certificate authority (CA) would he implement? |
|
Definition
|
|
Term
You are hired as a contractor for a new organization that has no network currently in place. You decide to implement an Active Directory domain and the Active Directory Domain Services (AD DS). Which of the follow are requirements to install Active Directory? |
|
Definition
|
|
Term
You have decided to implement certificate authority (CA) servers and you want all of your users to receive their certificates automatically without any user intervention. What two ways can you accomplish this goal? |
|
Definition
Autoenrollment _x000D_ GPO enrollment |
|
|
Term
What role provides Internet-based clients a secure identity access solution that works on both Windows and non-Windows operating systems? |
|
Definition
Active Directory Federation Services (AD FS) |
|
|
Term
You have decided to place DNS on a read-only domain controller (RODC). What type of DNS zone do you now have? |
|
Definition
|
|
Term
What AD role allows administrators to configure services for issuing and managing public key certificates, which help organizations implement network security? |
|
Definition
Active Directory Certificate Services (AD CS) |
|
|
Term
What role gives administrators the ability to enroll users into the certificate services program and allows for the issue and management of certificate requests? |
|
Definition
|
|
Term
You have decided to implement a certificate authority on your network. You have hired a third-party company to create and issue you the certificates you need to hand out to your Internet users. What type of certificate authority do you need to set up? |
|
Definition
Stand Alone Subordinate CA |
|
|
Term
Alexandria, the network administrator, has just hired a new junior administrator named Paige. Paige needs to be able to recover keys from the certificate authority server. What role does Alexandria need to give Paige so that she can recover keys? |
|
Definition
|
|
Term
What file outlines the set of rules that a Federation Service uses to recognize partners, certificates, account stores, claims, and the numerous properties that are associated with the Federation Service? |
|
Definition
|
|
Term
What is the Lightweight Directory Access Protocol (LDAP) directory service that allows directory-enabled applications to store and retrieve data without needing the dependencies AD DS requires? |
|
Definition
Active Directory Lightweight Directory Services (AD LDS) |
|
|
Term
You are the administrator of a network. Your company has decided to use server virtualization to help save money and add fault tolerance to your servers. What role-based utility is included with Windows Server 2008 making this possible? |
|
Definition
|
|
Term
Your manager has explained to you that due to security requirements, you need to secure documents and emails using Microsoft Office 2007 Enterprise. What service do you need to install to help secure documents and emails? |
|
Definition
Active Directory Rights Management Service (AD RMS) |
|
|
Term
Your company has one main location and five remote sites. One of the remote sites is having a problem with Active Directory and DNS being hacked into. What can you use to help solve this problem? |
|
Definition
Implement a _x000D_ Read-only domain controller and a _x000D_ Read-only DNS server |
|
|
Term
Your company has one main location and one remote site. The remote site is 300 miles from the main location and it has no IT staff on site. What type of domain controller can you install so that a normal user can have the rights to manage it? |
|
Definition
Read-only domain controller (RODC) |
|
|
Term
You have decided to implement a certificate authority on your network. You have hired a third-party company to create and issue you the certificates you need to hand out to your internal users. What type of certificate authority do you need to set up? |
|
Definition
Enterprise Subordinate CA |
|
|
Term
Your company has decided to install a certificate authority (CA). After you install the CA, you publish the certificate revocation list (CRL) to a central location for all CAs to use. What is this central location called? |
|
Definition
|
|
Term
Your company currently uses Windows Server 2008 domain controllers. Your company wants to use multiple account lockout policies depending on what department people are in. What does Windows Server 2008 offer so that you can do this? |
|
Definition
Fine-grained password policy |
|
|
Term
You have decided to implement certificate authority servers. You have routers located on your network. What component allows systems to receive a certificate even though they do not have an Active Directory account? |
|
Definition
Network Device Enrollment Service |
|
|
Term
What operations can you perform using the Active Directory Users And Computers tool if you need to reorganise AD based on an Organisation change? |
|
Definition
Rename an organizational unit _x000D_ Query for resources _x000D_ Rename a group _x000D_ Create a computer account |
|
|
Term
In order to restrict security for the Texas OU, you remove some permissions at that level. Later, a junior systems administrator mentions that she is no longer able to make changes to objects within the Austin OU (which is located within the Texas OU). What is the most likely cause? |
|
Definition
|
|
Term
Isabel wants to check for any objects that have not been properly replicated among domain controllers. If possible, she would like to restore these objects to their proper place within the relevant Active Directory domains. What 2 steps does she need to do to accomplish this? |
|
Definition
Select the Advanced Features item in the View menu _x000D_ Examine the contents of the LostAndFound folder using the Active Directory Users And Computers tool. |
|
|
Term
The domain contains over 200,000 objects and hundreds of OUs and takes a long time to load. _x000D_ What can you do to speed things up if you only want to view Computer objects? |
|
Definition
Use the Filter option in the Active Directory Users And Computers tool to restrict the display of objects. |
|
|
Term
Jane, a consultant, has recommended that the Windows NT 4 domains be consolidated into a single Active Directory domain. Which of the following statements provide a valid justification to support Jane's proposal? |
|
Definition
In general, OU structure is more flexible than domain structure. _x000D_ It is possible to create a distributed system administration structure for OUs by using delegation. |
|
|
Term
operations are represented as common tasks within the Delegation of Control Wizard? |
|
Definition
Reset passwords on user accounts. _x000D_ _x000D_ Manage Group Policy links. _x000D_ _x000D_ Modify the membership of a group. _x000D_ _x000D_ Create, delete, and manage groups. |
|
|
Term
New Helpdesk Op. How do you allow them to only change certain objects in the directory in certain OUs? |
|
Definition
Use the Delegation of Control Wizard to assign the necessary permissions on the OU that he or she is to administer. |
|
|
Term
You are planning an OU design. What 3 pieces of information should be considered or consulted? |
|
Definition
Business organizational requirements _x000D_ _x000D_ System administration requirements _x000D_ _x000D_ Security requirements |
|
|
Term
You want to allow the Super Users group to create and edit new objects within the Corporate OU. What option would you choose in the Delegation Wizard? |
|
Definition
Create A Custom Task To Delegate |
|
|
Term
A systems administrator is using the Active Directory Users And Computers tool to view the objects within an OU. He has previously created many users, groups, and computers within this OU, but now only the users are showing. What is a possible explanation for this? |
|
Definition
Filtering options have been set that specify that only User objects should be shown. |
|
|
Term
Two large AD Sites with 15 DCs each. Too much replication traffic between sites. What can you create at each site to reduce the bandwidth usage? |
|
Definition
Create preferred Bridgehead Servers at each site to funnel the traffic between 2 servers only. |
|
|
Term
What does not need to be manually created when you are setting up a replication scenario involving three domains and three sites? |
|
Definition
Connection objects. _x000D_ Automatically created by the Active Directory replication engine. |
|
|
Term
What services of Active Directory is responsible for maintaining the replication topology? |
|
Definition
Knowledge Consistency Checker service. |
|
|
Term
What Active Directory objects are responsible for representing a transitive relationship between sites? |
|
Definition
Site link bridges _x000D_ Default Transitive On. |
|
|
Term
______ is the protocol to use for links where the link is randomly unavailable and replication traffic must be sent whether the other end is connected or not. |
|
Definition
SMTP _x000D_ Uses Store and Forward method to ensure that information is not lost if a connection cannot be established. |
|
|
Term
You have 7 sites with different speed links. You want to keep the number of domains to a minimum. What is the smallest number of domains you can have that cover all 7 sites? |
|
Definition
|
|
Term
Changes to AD objects are only being replicated to some DCs and not all. Regarding the network links themselves what could be causing this problem? |
|
Definition
Network connectivity is unavailable _x000D_ A WAN connection has failed |
|
|
Term
Changes to AD objects are only being replicated to some DCs and not all because of a possible configuration problem with a DC or Sites. What are 4 of the possible errors that have been made? |
|
Definition
Connection objects are not properly configured. _x000D_ Sites are not properly configured. _x000D_ Site links are not properly configured _x000D_ One of the domain controllers is configured for manual replication updates. |
|
|
Term
A systems administrator suspects that there is an error in the replication configuration. How can he look for specific error messages related to replication? |
|
Definition
By going to Event Viewer -> Directory Service log |
|
|
Term
One site, 50 DCs. What the? _x000D_ How can replication traffic be reduced and controlled, and how can the structure of AD more accurately reflect the structure of the network? |
|
Definition
Create multiple site links. _x000D_ Configure one server at each of the new sites to act as a bridgehead server. |
|
|
Term
1. What tool do you use to: _x000D_ Determine replication data transfer statistics. _x000D_ 2. Collect information about multiple Active Directory domain controllers at the same time. _x000D_ 3. Measure other performance statistics, such as server CPU utilization. |
|
Definition
|
|
Term
What Active Directory objects should you modify to define the network boundaries for Active Directory sites? |
|
Definition
Subnets - Define AD Site boundaries. |
|
|
Term
|
Definition
v to disclose something secret _x000D_ _x000D_ • She believed she had been fired because she had threatened to divulge information about the company's mismanagement. _x000D_ _x000D_ • It is a basic tenet of most secret societies that members are not allowed to divulge anything about the initiation rites to outsiders. _x000D_ _x000D_ • His journal divulged a side of his personality that no one had ever seen. |
|
|
Term
Configure the costs for each link with these rules _x000D_ 1. ISDN must have default site cost link _x000D_ 2. Austin must use San Jose for replication |
|
Definition
The ISDN line is required to have the default cost of 100. That means that the T1 line's cost must be lower than 100 for this connection to be used by preference, and the only choice is 50. That leaves costs of 150 and 200 for the Austin links. Because Austin will never get replication information from Chicago, that link's cost should be 200. That only leaves 150 for the cost of the link between Austin and San Jose. |
|
|
Term
What is the default Site Link Cost? |
|
Definition
|
|
Term
You want to create a new site called San Jose. Where do you do this? |
|
Definition
AD S&S - Sites - New Site |
|
|
Term
Two sites connected via a T1 line and a dial up line for redundancy. _x000D_ You want to use the T1 line mainly. What do you do to ensure this occurs? |
|
Definition
Lower the cost of the T1 Line |
|
|
Term
Only 1 GC for 3 Sites. HQ with 100 users is connected to other 2 sites (each have 20 users) via fast T1 connections. Where would you place the GC? |
|
Definition
At HQ. _x000D_ Though ideally one GC per site. |
|
|
Term
How do you specify a server as a bridgehead server? |
|
Definition
AD S&S - DC properties - Select protocol- and click Add |
|
|
Term
The company has three domain controllers, each of which has Knowledge Consistency Checker (KCC) errors consistently popping up in the directory services Event Viewer log. What does this indicate? |
|
Definition
|
|
Term
You need to keep track of licensing with the licensing server. Where can you configure the licensing server so that as the system administrator you can ensure you are compliant? |
|
Definition
Configure licensing in the Active Directory Sites And Services tool. |
|
|
Term
You decide to create a trust relationship between Domain A and Domain B. Before you take any other actions, can users in Domain A use resources from Domain B yet? |
|
Definition
No. _x000D_ A trust relationship only allows for the possibility of sharing resources between domains; it does not explicitly provide any permissions. In order to allow users to access resources in another domain, you must configure the appropriate permissions. |
|
|
Term
Plans are to deploy four Active Directory domains with the following requirements: _x000D_ minimize the number of servers _x000D_ enough fault tolerance to survive the complete failure of one domain controller. _x000D_ What is the minimum number of domain controllers to deploy initially? |
|
Definition
8 _x000D_ Two per domain for fault tolerance |
|
|
Term
What server configurations can be directly promoted to become a domain controller for a new domain? |
|
Definition
Member servers _x000D_ Stand-alone servers |
|
|
Term
Server1: Schema Master _x000D_ Server2: RID Master _x000D_ Server3: Windows NT 4 BDC _x000D_ Server4: Infrastructure Master _x000D_ Server5: PDC Emulator Master _x000D_ Entire environment migrating to Windows Server 2008. Which Server not needed? |
|
Definition
Server3: Windows NT 4 BDC |
|
|
Term
Implicit trusts created between domains are known as ______ |
|
Definition
|
|
Term
Need to add field to the properties of a User object. _x000D_ On what servers can the change be made? |
|
Definition
The Schema Master is the only server within Active Directory on which changes to the schema can be made. |
|
|
Term
What are several Active Directory domains that share a contiguous namespace called? |
|
Definition
|
|
Term
Accidentally demoted the last domain controller of your ADTest.com domain. _x000D_ Want a complete undo. Possible? |
|
Definition
Once the last domain controller in an environment has been removed, there is no way to recreate the same domain. If adequate backups had been performed, you may have been able to recover information by rebuilding the server |
|
|
Term
Items that depend on the DNS namespace are .... |
|
Definition
Domains _x000D_ trees _x000D_ forests _x000D_ DNS zones |
|
|
Term
Which types of computers contain a copy of the Global Catalog (GC)? |
|
Definition
Specified Active Directory domain controllers |
|
|
Term
Which pieces of information should you have before you use the Active Directory Installation Wizard to install a new subdomain? |
|
Definition
name of the child domain _x000D_ name of the parent domain _x000D_ DNS configuration information _x000D_ NetBIOS name for the server |
|
|
Term
Which type of trust is automatically created between the domains in a domain tree? |
|
Definition
|
|
Term
A systems administrator wants to remove a domain controller from a domain. What is the easiest way to perform the task? |
|
Definition
Use the Active Directory Installation Wizard to demote the domain controller. |
|
|
Term
Regarding the sharing of resources between forests... |
|
Definition
A trust relationship must exist before resources can be shared between forests. |
|
|
Term
New remote location with very slow WAN link. Needs following specs: _x000D_ Fast logon times _x000D_ Reduced network bandwidth _x000D_ Ability to use existing hardware _x000D_ What can you implement to achieve the above requirements? |
|
Definition
Universal group membership caching stores information locally once a user attempts to log on for the first time. |
|
|
Term
Of the five main single master functions, two apply to an entire Active Directory forest. What are the three that apply to just the domain? |
|
Definition
RID Master _x000D_ PDC Emulator Master _x000D_ Infrastructure Master |
|
|
Term
When deploying Active Directory, you decide to create a new domain tree. What do you need to do to create this? |
|
Definition
Promote a Windows Server 2008 computer to a domain controller and select the option that makes this domain controller the first machine in a new domain that is a child of an existing one. |
|
|
Term
7 Reasons for Using Multiple Domains |
|
Definition
Scalability _x000D_ Reducing replication traffic _x000D_ Meeting Business needs hierarchy - easier data managment _x000D_ Decentralized administration _x000D_ Multiple DNS or domain namesLegality |
|
|
Term
What are some of the Drawbacks of Multiple Domains? |
|
Definition
Administrative inconsistency _x000D_ Increased management _x000D_ Decreased flexibility |
|
|
Term
Min Requirements for DC numbers |
|
Definition
|
|
Term
Recommended Req's for DC numbers |
|
Definition
|
|
Term
Reasons for adding extra DCs |
|
Definition
Fault tolerance and reliability _x000D_ Performance |
|
|
Term
Main requirement for joining a new domain to an existing forest |
|
Definition
Domain does not share a namespace with the existing Active Directory domain. |
|
|
Term
If you want to join a W2k8 server to an existing W2k3 Forest what do you need to do first? |
|
Definition
Prepare the domain by running: _x000D_ adprep /forestprep _x000D_ adprep /domainprep |
|
|
Term
What naming information do you need prior to joining a domain to a new tree? |
|
Definition
name of the parent domain _x000D_ name of the child domain _x000D_ NetBIOS name for the new server |
|
|
Term
What other information (other than the 3 names) do you need prior to joining a domain to a new tree? |
|
Definition
DNS configuration _x000D_ domain administrator username and password |
|
|
Term
DcPromo option selected to create a new domain tree. |
|
Definition
" makes this domain controller the first machine in a new domain that is a child of an existing domain" |
|
|
Term
DcPromo option selected to create a new domain tree. |
|
Definition
makes this domain controller the first machine in a new domain that is a child of an existing domain |
|
|
Term
3 Features common to all Domains in a Forest |
|
Definition
Schema _x000D_ GC _x000D_ Configuration Info |
|
|
Term
Type of trust between the Forest Root Domain and all the rest of the domains in the forest |
|
Definition
|
|
Term
How is a new Domain Tree created? |
|
Definition
Created top down - forest root domain - then child domains |
|
|
Term
How do you move a DC between domains? |
|
Definition
1. Demote it. _x000D_ 2. Move it. _x000D_ 3. Promote it |
|
|
Term
True of False? A Trust grants all users in one domain access to the other domains. |
|
Definition
False. _x000D_ Trust only provides the foundation. _x000D_ Rights must be granted to resources once Trust is established. |
|
|
Term
What 2 features of AD to ALL Trees and Forests share? |
|
Definition
Schema and _x000D_ Global Catalog |
|
|
Term
What do you always have even if you only have 1 Domain? |
|
Definition
|
|
Term
What do you need to ensure is done before you remove the last DC from a Domain? |
|
Definition
Computers no longer log on to this domain _x000D_ No user accounts are needed _x000D_ All encrypted data is decrypted _x000D_ All cryptographic keys are backed up |
|
|
Term
What are the 2 Forest Operation Master Roles? |
|
Definition
Schema Master _x000D_ Domain Naming Master |
|
|
Term
What tool is used to manage the Forest Operation Master roles? |
|
Definition
|
|
Term
What are the 3 Domain Operation master Roles? |
|
Definition
RID Master _x000D_ PDC Emulator Master _x000D_ Infrastructure Master |
|
|
Term
The Schema master holds ___ |
|
Definition
a master copy of the AD Schema |
|
|
Term
Where can changes to the AD Schema be made? |
|
Definition
Only on the Schema Master |
|
|
Term
The Domain Naming Master __ |
|
Definition
tracks domains within the AD Forest |
|
|
Term
What does the RID Master do? |
|
Definition
Creates a unique RID for every AD object |
|
|
Term
PDC Emulator is responsible for __ |
|
Definition
Maintaining backward compatibility with NT DCs - used only in Mixed Mode domains. |
|
|
Term
In a Forest running at 2k Native or later what role does the PDC play? |
|
Definition
Acts as default DC if another is not available |
|
|
Term
The Infrastructure Master ensures |
|
Definition
Ensures that group membership info stays current between DCs |
|
|
Term
How do you assign the Domain Naming Master Role? |
|
Definition
Open AD D&T _x000D_ AD D&T Properties _x000D_ Select Operations Master _x000D_ Click Change |
|
|
Term
How do you assign all of the RID, PDC and Infrastructure Roles? |
|
Definition
Open AD U _x000D_ right-click Domain _x000D_ Select Operation Masters _x000D_ Click Change |
|
|
Term
What is a transitive trust? |
|
Definition
Implied trusts. _x000D_ If domain A trusts domain B AND _x000D_ domain B trusts domain C THEN _x000D_ domain A trusts domain C |
|
|
Term
What are External Trusts used for? |
|
Definition
Used to provide access to external domain (NT) that can't use forest trusts |
|
|
Term
What type of trust are External Trusts? |
|
Definition
Non-transitive and either 1-way or 2-way (manually created) |
|
|
Term
On External Trusts, what is enabled by default to prevent hackers from using SID info to gain access? |
|
Definition
Default SID filtering _x000D_ SID History cleaned of SID history attributes that are not members of the trusted domain. |
|
|
Term
When is a Realm Trust used? |
|
Definition
Used to connect to non-Windows domain using Kerberos |
|
|
Term
What types of Realm Trusts are there? |
|
Definition
Either Transitive or Non-Transitive _x000D_ And either 1-way or 2-way |
|
|
Term
Where do you configure Trust Releationships? |
|
Definition
AD D&T - Domain Properties - Trusts Tab |
|
|
Term
What happens when Selective authentication is used with Cross Forest Trusts? |
|
Definition
users can't authenticate to DC or resource server unless explicitly enabled |
|
|
Term
What is a manually created Trust called? |
|
Definition
|
|
Term
What is a Cross Forest Trust used for? |
|
Definition
To Share resources between forests |
|
|
Term
What is the restriction on Cross Forest Trusts? |
|
Definition
They cannot be Non-transitive. |
|
|
Term
Where would you go to enable Selective Authentication? |
|
Definition
Trust properties - Selective Authentication |
|
|
Term
Where would you add a UPN suffix? |
|
Definition
AD D&T - Properties - UPN Suffixes |
|
|
Term
You need to add another Global Catalog server to an existing domain. Where would you go to do this? |
|
Definition
AD S&S _x000D_ - DC _x000D_ - NTDS Settings Properties _x000D_ - GC Checkbox |
|
|
Term
What happens when Universal Group Membership Caching is enabled on a W2k8 DC? |
|
Definition
1. User logs on - Universal Groups cached from GC _x000D_ 2. Next time user logs on - no need to contact GC |
|
|
Term
The benefits of Universal Group Membership Caching are: |
|
Definition
Faster logon times _x000D_ Reduced network bandwidth _x000D_ Ability to use existing hardware |
|
|
Term
On a W2k8 DC how do you enable Universal Group Membership Caching? |
|
Definition
AD S&S _x000D_ - Sites _x000D_ - DefaulFirstSite _x000D_ - NTDS Settings - Properties _x000D_ - checkbox |
|
|
Term
What forest and function levels does the network need for you to install RODC's? |
|
Definition
Windows 2003 functional Level or above |
|
|
Term
How many domains can a DC have or belong to at any one time? |
|
Definition
|
|
Term
Functional level if you have the following servers in your domain: _x000D_ 2003 server _x000D_ 2000 Server _x000D_ 2008 server |
|
Definition
|
|
Term
Which NTFS feature can you implement to limit the amount of disk space occupied by users? |
|
Definition
|
|
Term
What two steps need to be done to convert a disk volume from FAT to NTFS? |
|
Definition
|
|
Term
What 2 protocols are required to support AD? |
|
Definition
|
|
Term
Command used to promote or demote a DC? |
|
Definition
|
|
Term
Your organisation needs one set of credentials for multiple forests. What 2008 role do you install? |
|
Definition
|
|
Term
How do you test that DNS forward lookups are working properly prior to installing AD? |
|
Definition
ping hostname _x000D_ IP returned |
|
|
Term
What FS with these req's? _x000D_ file-level security _x000D_ efficient use of space on large partitions. _x000D_ domain controller Sysvol must be stored |
|
Definition
|
|
Term
You have decided that you must convert the system partition on your Windows Server 2008 from the FAT32 filesystem to NTFS. Which 2 steps must you take in order to convert the filesystem? |
|
Definition
CONVERT /FS:NTFS _x000D_ Reboot the computer |
|
|
Term
Name 3 protocols need for AD to work properly |
|
Definition
LDAP _x000D_ DNS _x000D_ TCP/IP |
|
|
Term
2 sites with non-communicative DCs. Names: _x000D_ server1.yourcompany.com and server1.yourcompany.com _x000D_ Problem? |
|
Definition
Yes each server needs a unique FQDN. |
|
|
Term
How can you increase the space on a volume without backup, recreate restoring? |
|
Definition
Use NTFS mounts to map new volume to existing volume. |
|
|
Term
What file system reqs exist for installation of AD? |
|
Definition
NTFS volume. _x000D_ Greater than 4GB |
|
|
Term
What 5 connectivity tests should you do prior to installing AD? (assume second site connected via VPN) |
|
Definition
Test NW adapater - drivers & config _x000D_ Check IPconfig _x000D_ Test Internet access _x000D_ Check LAN access _x000D_ Check Client Access _x000D_ Check WAN Access |
|
|
Term
How do you check the configuration of the TCP/IP protocol and output it to a text file? |
|
Definition
ipconfig /all > ipcfg.txt |
|
|
Term
What are the 3 forest functional levels in W2k8? |
|
Definition
2k Native (default) _x000D_ 2k3 _x000D_ 2k8 |
|
|
Term
5 New features in W2k8 Functional Level but not in W2k3? |
|
Definition
Fine-grained password policies. _x000D_ Read-only domain controller (RODC). _x000D_ Last interactive logon information. _x000D_ Advanced Encryption Services (AES 128 and 256) support for the Kerberos protocol. _x000D_ Distributed File System replication support for Sysvol. |
|
|
Term
What is a Defunct Schema Class? |
|
Definition
A Class of objects that has been marked as non-usable. |
|
|
Term
|
Definition
Provides way of querying names and IP addresses, replicating the info in the DB as well as the schema |
|
|
Term
Name 7 different common DNS records. |
|
Definition
SOA, NS, A, CNAME, PTR, MX, and SRV |
|
|
Term
|
Definition
Start of Authority Record. _x000D_ defines the general parameters for the DNS zone, including who the authoritative server is |
|
|
Term
|
Definition
Name Server _x000D_ list name servers for a domain; allow other name servers to look up names |
|
|
Term
|
Definition
Address Record for Host _x000D_ links hostname to ip address |
|
|
Term
|
Definition
Pointer Record. _x000D_ Links IP address to hostname for reverse lookups |
|
|
Term
|
Definition
Mail Exchange record _x000D_ Lists mail server who can accept mail for domain |
|
|
Term
|
Definition
Service record _x000D_ Maps service (eg DC ) to IP address |
|
|
Term
Name the 3 queries types when DNS is used to resolve names or IP's |
|
Definition
Iterative, Recursive, and Inverse |
|
|
Term
What is an Iterative query? |
|
Definition
Client asks Server. Server responds with best possible answer |
|
|
Term
What is a Recursive query? |
|
Definition
Client queries server, server doesn't know, asks each server up the line until answer is returned to client via server. |
|
|
Term
What is an Inverse query? |
|
Definition
Client queries IP address instead of name. |
|
|
Term
A zone used to resolve names to IP addresses is a _________? |
|
Definition
|
|
Term
A zone used to resolve IP addresses to names is a ________? |
|
Definition
|
|
Term
How do you create new zones? |
|
Definition
with the New Zone wizard. |
|
|
Term
Where do you configure a zone for Dynamic updates? |
|
Definition
Properties of the forward/reverse lookup zone - General Tab - Dynamic updates - None/Secure Only/Nonsecure and secure |
|
|
Term
What is the default setting for Dynamic updates |
|
Definition
|
|
Term
Name 5 tools used to troubleshoot DNS problems? |
|
Definition
DNS Snap-in _x000D_ DSS event log _x000D_ NSLookup _x000D_ Ipconfig _x000D_ DNS server log file |
|
|
Term
Multiple sites across Australia. _x000D_ Single AD tree required. _x000D_ What DNS and AD structures do you implement to ensure good performance? |
|
Definition
Install a DNS server at each regional location and create a single domain name for all the regions for resolution of local resources. |
|
|
Term
3 Unix DNS, print & fax servers. _x000D_ New AD domain with integrated DNS replaces Unix DNS server. _x000D_ Can't print or fax. What gives? |
|
Definition
You need to manually add A resource records for the Unix machines. |
|
|
Term
How do you configure a DNS server so that it only answers queries from hosts on your intranet and no where else? |
|
Definition
Configuring his server as a root server and leaving out root hints for the top-level domains _x000D_ And _x000D_ Leaving forwarding turned off |
|
|
Term
What must you do so that your customers can utilize all mirrored web servers? |
|
Definition
Enable Round Robin DNS to balance out the load across all the servers you have mirrored and configured in the DNS |
|
|
Term
You have multiple remote locations by slow satellite links.Need to install DNS into these offices so that clients can locate authoritative DNS servers in the main location. What type of DNS zones should be installed in the remote locations? |
|
Definition
Stub Zones - Contain: NS, A and SOA records |
|
|
Term
You have 5 W2k8 DC's. All run as primary DNS zones. Need to ensure all hold same database and use only secure updates. _x000D_ What do you do? |
|
Definition
Upgrade all servers to Active Directory Integrated servers. |
|
|
Term
Six Offices. Need single AD tree. _x000D_ How do you deploy DNS to enable efficient and responsive name/IP resolutions for this environment? |
|
Definition
Create a single second-level name and deploy a DNS server at each location in the network |
|
|
Term
What are the two main server types in an NT domain? |
|
Definition
|
|
Term
Two types of domains in and NT - Multi-master domain topology? |
|
Definition
Master Domain _x000D_ (trust) _x000D_ Resource Domain |
|
|
Term
3 Advantages of old NT over workgroups? |
|
Definition
Centralised Admin _x000D_ Database replication _x000D_ Could scale to 1000's of users |
|
|
Term
4 Limitations of NT model? |
|
Definition
Didn't scale/work well for very/large org _x000D_ Trust relationships needed a lot of work _x000D_ Excessive replication BAD for low-bandwidth WAN links _x000D_ Difficult to delegate admin duties |
|
|
Term
|
Definition
LDAP for transferring information _x000D_ Reliance on DNS for name resolution _x000D_ Ability to extend the schema |
|
|
Term
|
Definition
Create security boundaries to protect resources and ease of administration _x000D_ Ease admin of usrs, grps, comps etc _x000D_ Provide central DB of NW obj's |
|
|
Term
Type of server for remote locale with questionable security? |
|
Definition
Read-only domain Controller |
|
|
Term
True or False: _x000D_ Two objects can have the same relative distinguished name |
|
Definition
True. _x000D_ Jane Doe can be in AD twice (or more) in different OU's |
|
|
Term
True of False?: _x000D_ Two objects can have the same distinguished name. |
|
Definition
False. _x000D_ DN is unique to each AD object |
|
|
Term
AD Trust Relationships - 3 truths |
|
Definition
1. Trusts are transitive _x000D_ 2. By default, trusts are two-way relationships. _x000D_ 3. Trusts are used to allow the authentication of users between domains. |
|
|
Term
Protocol used to query AD |
|
Definition
|
|
Term
Policy that allows for different password and account lockout policies for different sets of users in the same domain? |
|
Definition
Fine-grained password policy |
|
|
Term
What is the Server role that allows/provides for single sign-on capability for multiple apps? |
|
Definition
|
|
Term
Advantages of using Server 2008 AD Certificate Services? |
|
Definition
Web enrollment _x000D_ Network Device Enrollment Service _x000D_ Online Responder |
|
|
Term
Which role allows a user to secure an email while using Microsoft Office 2007 Outlook? |
|
Definition
AD Rights Management Services (AD RMS) |
|
|
Term
Identity and access (IDA) has five distinct categories. What are they? |
|
Definition
Directory services, _x000D_ strong authentication, Federated Identities, information protection, _x000D_ and Identity Lifecycle Management |
|
|
Term
Another administrator has changed a user's group settings. What is the easiest way to get the original setting back for the user? |
|
Definition
Perform Auditing. _x000D_ Review logs. _x000D_ Undo what he did - the dunce! |
|
|
Term
What is the feature of AD that allows info to remain in sync between DC's? |
|
Definition
|
|
Term
Which component of AD should you implement at remote sites to improve the performance of searches conducted for objects in all domains? |
|
Definition
|
|
Term
Name of the server that is a repository of Active Directory topology and schema information for Active Directory? |
|
Definition
|
|
Term
You need to install the Active Directory Federation Services. What application do you use to do the install? |
|
Definition
|
|
Term
What term is used to refer to the actual structure that contains the information stored within Active Directory? |
|
Definition
|
|
Term
NW admin for a 200-node network. Only 30 need a new app. _x000D_ What can you do? |
|
Definition
Create an OU with the 30 in it. _x000D_ Deploy app/update to the OU |
|
|
Term
Used to create a logical structure in AD is an ______? |
|
Definition
|
|
Term
|
Definition
Heirarchical Organisation _x000D_ Extensible Schema _x000D_ Centralised Data Storage _x000D_ Replication - DNS & AD _x000D_ Ease of Admin _x000D_ Network Security _x000D_ Scalability _x000D_ Search |
|
|
Term
|
Definition
a minimal install of Windows Server 2008, without GUI or .NET Framework |
|
|
Term
What are the hardware requirements for Server Core? |
|
Definition
|
|
Term
What are 2 advantages of Server Core? |
|
Definition
more secure (fewer services and components) and requires less management |
|
|
Term
What 9 server roles are supported in Core? |
|
Definition
AD Domain Services (AD DS), AD Lightweight Directory Services (AD LDS), DHCP Server, DNS Server, file server, print server, Streaming Media Services, IIS (doesn't support ASP.NET), Hyper-V (server virtualization) |
|
|
Term
What 11 optional features are available in Server Core? |
|
Definition
failover cluster, network load balancing, subsystem for UNIX, windows backup, multipath I/O, removeable storage management, Windows Bitlocker drive encryption, SNMP, WINS, Telnet, QoS |
|
|
Term
What command is used to change the administrator password? |
|
Definition
|
|
Term
What command is used in Core to set IPv4 configuration? |
|
Definition
|
|
Term
What command is used to join a domain? |
|
Definition
|
|
Term
What command is used in Core to add roles, components, and features? |
|
Definition
|
|
Term
What command is used in Core to view roles, components, and features? |
|
Definition
|
|
Term
What command is used in Core to enable Remote Desktop? |
|
Definition
cscript c:\windows\system32\scregedit.wsf /AR0 |
|
|
Term
What command is used to promote a domain controller? |
|
Definition
|
|
Term
What command is used in Core to configure DNS? |
|
Definition
|
|
Term
What command is used in Core to configure DFS? |
|
Definition
|
|
Term
What command is used to add Active Directory Domain services? |
|
Definition
|
|
Term
What is the one AD server role available in Core that can't be added with ocsetup.exe? |
|
Definition
AD Domain Services (added with dcpromo.exe) |
|
|
Term
What command is used to remove a domain controller? |
|
Definition
|
|
Term
What piece of information is required when removing a domain controller? |
|
Definition
the password of the local admin account |
|
|
Term
What 2 directory partitions do all domains in a forest share? |
|
Definition
|
|
Term
How does Dynamic DNS (DDNS) differ from standard DNS? |
|
Definition
DDNS allows real-time DNS updates |
|
|
Term
What command will send DNS registration info to a DNS server? |
|
Definition
|
|
Term
How is DNS information replicated in DDNS? |
|
Definition
|
|
Term
How was DNS information replicated in standard DNS? |
|
Definition
through manual copies of the zone file |
|
|
Term
What two name resolution technologies does DDNS cover? |
|
Definition
|
|
Term
When does DDNS update the record? |
|
Definition
when a client leases an IP address |
|
|
Term
What is Scope Option 003? |
|
Definition
|
|
Term
What is Scope Option 006? |
|
Definition
|
|
Term
What is the scope for default gateway? |
|
Definition
|
|
Term
What is the scope for preferred DNS server? |
|
Definition
|
|
Term
Where does non-dynamic DNS store data? |
|
Definition
in a text file located at %SystemRoot%\System32\DNS |
|
|
Term
What are the 3 types of DNS zones? |
|
Definition
primary, secondary, and stub zone |
|
|
Term
What is a primary DNS zone? |
|
Definition
a DNS zone which stores a copy of the zone that can be directly updated |
|
|
Term
What is a secondary DNS zone? |
|
Definition
a copy of a primary DNS zone |
|
|
Term
What are secondary DNS zones used for? |
|
Definition
load balancing, fault tolerance, and increasing capacity |
|
|
Term
|
Definition
a copy of a DNS zone containing only NS, SOA, and sometimes glue A records; it is not authoritative |
|
|
Term
What limitation exists on a DNS server storing its data in AD? |
|
Definition
the DNS server must be a DC |
|
|
Term
|
Definition
a DNS system where updates occur over a secure channel |
|
|
Term
How does secure DNS work? |
|
Definition
when a DNS transfer is initiated, the DNS server verifies that the DNS server sending the update is on an approved list |
|
|
Term
What is the purpose of secure DNS? |
|
Definition
to prevent poison entries |
|
|
Term
How is secure DNS set up in an Active Directory domain? |
|
Definition
it is set up automatically |
|
|
Term
What are 3 reasons to use a stub zone? |
|
Definition
keep delegated zone info current, improve name resolution, simplify administration |
|
|
Term
What does a Start of Authority (SOA) record do? |
|
Definition
specifies the DNS server in charge of a zone |
|
|
Term
What 4 items does an SOA record specify? |
|
Definition
primary server for the zone, zone administrator's email address, secondary zone expiration values, minimum default TTL values |
|
|
Term
What is the Global Name Zone designed to do? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What 3 types of records are stored in a Forward Lookup Zone? |
|
Definition
LDAP, Global Catalog, and Name Server records |
|
|
Term
How can repopulation be forced if a Forward Lookup Zone does not appear in AD? |
|
Definition
use net stop logon and net start logon |
|
|
Term
What do Forward Lookup Zones do? |
|
Definition
store domain name-to-IP address mappings |
|
|
Term
What do Reverse Lookup Zones do? |
|
Definition
store IP address-to-domain name mappings |
|
|
Term
At what 3 times are Reverse Lookup Zones populated? |
|
Definition
when IP addresses are leased, when machines are restarted, when ipconfig /registerdns is executed |
|
|
Term
|
Definition
provide a link between DNS servers and top-level DNS servers |
|
|
Term
What are 3 reasons to divide namespaces into more than 1 zone? |
|
Definition
delegate responsibility, break up large namespaces for management, extend namespace to add subdomains |
|
|
Term
When creating subdomains, what needs to be done to make sure that all zone records stay current? |
|
Definition
delegation records need to be added to other DNS servers to point to the authoritative server |
|
|
Term
How does round robin DNS work? |
|
Definition
when an IP address for a server in a round robin pool is given out, that address is moved to the bottom of the list |
|
|
Term
What sort of servers most often utilize round robin DNS? |
|
Definition
|
|
Term
|
Definition
forwarding requests to other servers for fulfillment |
|
|
Term
When is DNS recursion usually disabled? |
|
Definition
When the network is sensitive |
|
|
Term
What is server scavenging? |
|
Definition
process of getting rid of stale DNS records |
|
|
Term
What 2 containers are created when DNS is integrated with AD? |
|
Definition
forestDNSzone and domainDNSzone |
|
|
Term
What do incremental zone transfers do? |
|
Definition
replicate only changes to DNS (rather than all records) |
|
|
Term
Does DNS work on a push or pull basis? |
|
Definition
pull: when changes are made, the DNS server notifies other servers that changes are available |
|
|
Term
What directory format does Active Directory use? |
|
Definition
|
|
Term
What do AD tree structures share? |
|
Definition
The same contiguous name space? |
|
|
Term
|
Definition
A Read Only Domain Controller |
|
|
Term
Do different forests share the same name space? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
A domain is an administratively-defined collection of network resources that share a common directory database and security policies |
|
|
Term
What is an AD object attribute? |
|
Definition
Information about the object such as a user's name, phone number, and email address) which is used for locating and securing resources. |
|
|
Term
What does an object schema identify? |
|
Definition
The schema identifies the object classes (the type of objects) that exist in the tree and the attributes (properties) of the object. |
|
|
Term
What does AD use DNS for? |
|
Definition
Active Directory uses DNS for locating and naming objects. |
|
|
Term
|
Definition
First-level OUs can be called parents. _x000D_ Second-level OUs can be called children. _x000D_ OUs can contain other OUs or any type of leaf object (e.g. users, computers, and printers). |
|
|
Term
|
Definition
A tree is a group of related domains that share the same contiguous DNS name space. |
|
|
Term
|
Definition
A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces. |
|
|
Term
What is the forest root domain? |
|
Definition
The forest root domain is the top-level domain in the top tree. It is the first domain created in the Active Directory forest. |
|
|
Term
What is the tree root domain? |
|
Definition
The tree root domain is the highest level domain in a tree. |
|
|
Term
|
Definition
Each domain in the tree that is connected to the tree root domain is called a child domain. |
|
|
Term
|
Definition
A domain tree is a group of domains based on the same name space. Domains in a tree: _x000D_ - Are connected with a two-way transitive trust. _x000D_ - Share a common schema. _x000D_ - Have common global catalogs. |
|
|
Term
What is a domain controller? |
|
Definition
A domain controller is a server that holds a copy of the Active Directory database that can be written to |
|
|
Term
|
Definition
Replication is the process of copying changes to Active Directory between the domain controllers. |
|
|
Term
What two objects does AD use to represent the physical structure of the network? |
|
Definition
- A subnet represents a physical network segment. Each subnet possesses its own unique network address space. _x000D_ - A site represents a group of well-connected networks (networks that are connected with high-speed links). |
|
|
Term
What manages AD replication between locations? |
|
Definition
Sites and subnets are used to manage Active Directory replication between locations. |
|
|
Term
What does an AD site differ from a domain? |
|
Definition
A site differs from a domain in that it represents the physical structure of your network, while a domain represents the logical structure of your organization. |
|
|
Term
How are clients assigned to AD sites? |
|
Definition
Clients are assigned to sites dynamically according to their Internet Protocol (IP) address and subnet mask. |
|
|
Term
How are domain controllers assigned to AD sites? |
|
Definition
Domain controllers are assigned to sites according to the location of their associated server object in Active Directory. |
|
|
Term
What is the structure of the NTDS.dit file? |
|
Definition
- The data table contains all the information in the Active Directory data store: users, groups, application-specific data, and any other data that is stored in Active Directory after its installation. _x000D_ _x000D_ - The link table contains data that represents |
|
|
Term
What does the Global Catalog server do? |
|
Definition
Responsible for replicating a subset of attributes throughout Active Directory |
|
|
Term
What are FSMO roles/What do they do? |
|
Definition
Flexible Single-Master Operation roles are specialized domain controller tasks assigned to a domain controller in the domain or forest. Operations master roles are useful because certain domain and enterprise-wide operations are not well suited for the multi-master replication performed by Active Directory to replicate objects and attributes |
|
|
Term
|
Definition
- Schema Master _x000D_ - Domain Naming Master _x000D_ - RID Master (Relative Identifier) _x000D_ - PDC Emulator _x000D_ - Infrastructure Master |
|
|
Term
What does the schema master do? |
|
Definition
Maintains the schema (the mapping of all the different object types) |
|
|
Term
What does the RID master do? |
|
Definition
The RID master allocates pools or blocks of numbers (called relative IDs or RIDs) that are used by the domain controller when creating new security principles (such as user, group, or computer accounts). |
|
|
Term
What does the PDC Emulator do? |
|
Definition
The PDC emulator acts like a Windows NT 4.0 Primary Domain Controller (PDC) and performs other tasks normally associated with NT domain controllers. (eg - time services) |
|
|
Term
What does the Infrastructure Master do? |
|
Definition
Provides a mapping of all the container objects in AD. The infrastructure master is responsible for updating changes made to objects. |
|
|
Term
Which level do the Schema and Domain Naming Master roles operate at? |
|
Definition
|
|
Term
What level do the RID, PDC and Infrastructure Master roles operate at? |
|
Definition
|
|
Term
What is the Global Catalog? |
|
Definition
The Global Catalog (GC) is a database that contains a partial replica of every object from every domain within a forest. A server that holds a copy of the Global Catalog is a global catalog server. The Global Catalog facilitates faster searches because different domain controllers do not have to be referenced. |
|
|
Term
What is an Operations Master? |
|
Definition
A domain controller that performs an operations master role is known as an operations master or operations master role owner. |
|
|
Term
What does the Domain Naming Master do? |
|
Definition
The domain naming master adds new domains to and removes existing domains from the forest. |
|
|
Term
What is a functional level? |
|
Definition
A functional level is a set of operation constraints that determine the functions that can be performed by an Active Directory domain or forest |
|
|
Term
What does a functional level define? |
|
Definition
- Which Active Directory Domain Services (AD DS) features are available to the domain or forest. _x000D_ _x000D_ - Which Windows Server operating systems can be run on domain controllers in the domain or forest. Functional levels do not affect which operating syste |
|
|
Term
Which domain functional levels does Server 2008 support? |
|
Definition
Windows 2000 Native _x000D_ Windows Server 2003 _x000D_ Windows Server 2008 |
|
|
Term
Which forest functional levels does Server 2008 support? |
|
Definition
Windows 2000 _x000D_ Windows Server 2003 _x000D_ Windows Server 2008 |
|
|
Term
|
Definition
A policy is a set of configuration settings that must be applied to users or computers. Collections of policy settings are stored in a Group Policy object (GPO). The GPO is a collection of files that includes registry settings, scripts, templates, and software-specific configuration values. |
|
|
Term
What are new services in AD 2008? |
|
Definition
- AD Domain Services _x000D_ - AD Lightweight Directory Services _x000D_ - AD Certificate Services _x000D_ - AD Federation Services _x000D_ - AD Rights Management Services |
|
|
Term
|
Definition
A role is a set of software features that provides a specific server function. Examples of roles include DNS server, DHCP server, File Server, and Print Server. |
|
|
Term
What is an AD role service? |
|
Definition
Role services are specific programs that provide the functions of a role. Some roles, like DNS, have a single role service. Other roles, like Print Server, have multiple role services such as the LPD Service for Unix printing and Internet Printing. You can think of a role as a group of programs, with each role service being a sub-component of the role. |
|
|
Term
|
Definition
A feature is a software program not directly related to a server role but which adds functionality to the entire server. Features include management tools, communication protocols or clients, and clustering support. |
|
|
Term
What is Active Directory Domain Services (AD DS) |
|
Definition
AD DS is a distributed database that stores and manages information about network resources, such as users, computers, and printers. The AD DS role: _x000D_ - Helps administrators securely manage information. _x000D_ - Facilitates resource sharing and collaboration between users. _x000D_ - Is required to be installed on the network to install directory-enabled applications such as Microsoft Exchange Server and for applying other Windows Server technologies, such as Group Policy. |
|
|
Term
What is Active Directory Lightweight Directory Service (AD LDS) |
|
Definition
Active Directory Lightweight Directory Services (AD LDS), formerly known as Active Directory Application Mode (ADAM), is an LDAP directory service that you can use to create a directory store (database) for use by directory-enabled applications. AD LDS is very similar to Active Directory Domain Services (AD DS), but is customizable and can be much smaller than an AD DS database. |
|
|
Term
What is Active Directory Federation Services (AD FS) |
|
Definition
AD FS is a feature which enables secure access to web applications outside of a user's home domain or forest. The AD FS role: _x000D_ _x000D_ - Provides Web Single-Sign-On (SSO) technologies to authenticate a user to multiple Web applications using a single user account. _x000D_ - Securely federates (shares) user identities and access rights in the form of digital claims between partner organizations. |
|
|
Term
What is Active Directory Rights Management Service (AD RMS) |
|
Definition
AD RMS is a feature which safeguards digital information from unauthorized use. The AD RMS role: _x000D_ _x000D_ - Can define exactly how a recipient can use information, specifying who can open, modify, print, forward, and/or take other actions. _x000D_ - Allows organizations to create custom usage rights templates (such as "Confidential - Read Only") that can be applied directly to information such as product specifications, financial reports, e-mail messages, and customer data. |
|
|
Term
What is Active Directory Certificate Services (AD CS) |
|
Definition
AD CS is an identity and access control feature that creates and manages public key certificates used in software security systems. The AD CS role: _x000D_ _x000D_ - Provides customizable services for creating and managing public key certificates. _x000D_ - Enhances security by binding the identity of a person, device, or service to a corresponding private key. _x000D_ - Includes features that allow you to manage certificate enrollment and revocation in a variety of scalable environments. |
|
|
Term
Name some things that AD Certificate Services supports |
|
Definition
Digital signatures _x000D_ Encrypting File System (EFS) _x000D_ Internet Protocol security (IPsec) _x000D_ Secure/Multipurpose Internet Mail Extensions (S/MIME) _x000D_ Secure Socket Layer/Transport Layer Security (SSL/TLS) _x000D_ Secure wireless networks _x000D_ Smart card logon _x000D_ Virtual Private Networks (VPN) |
|
|
Term
What AD roles are not supported on Server 2008 Standard? |
|
Definition
AD FS requires the DataCenter or Enterprise editions for deployment. |
|
|
Term
WHich server roles can Server 2008 core run? |
|
Definition
Active Directory _x000D_ Active Directory Lightweight Directory Services (AD LDS) _x000D_ Dynamic Host Configuration Protocol (DHCP) Server _x000D_ DNS Server _x000D_ File Server _x000D_ Print Server _x000D_ Media Services _x000D_ Web Server (IIS) |
|
|
Term
What are the limitations of Server 2008 core? |
|
Definition
There is no Windows Shell. _x000D_ There is no managed code support (no .NET framework). All code has to be native Windows API code. _x000D_ There is only MSI support for unattended mode installs. |
|
|
Term
What methods can you use to manage a Server 2008 core system? |
|
Definition
Log on and use the command prompt. _x000D_ Log on using Remote Desktop to gain access to the command prompt. _x000D_ Use Windows Remote Shell (winrm). _x000D_ Run Server Manager or another tool on another computer and connect to the server core system. This method allows you to use a GUI interface for managing the server core system. |
|
|
Term
How would you add server roles to a Server 2008 core system? |
|
Definition
Run start /w ocsetup to add server roles to the server core system. Switches for the role or service must be typed exactly as they are listed, and role names are case-sensitive. |
|
|
Term
How would you see a list of roles, role services and features that can be installed on Server 2008 core? |
|
Definition
|
|
Term
What does AD Domain Services (AD DS) do? |
|
Definition
provides Identity and Access (IDA) solutions for enterprise networks |
|
|
Term
|
Definition
|
|
Term
What 4 things should an IDA infrastructure do? |
|
Definition
store information about users, groups, computers, and objects; authenticate identities; control access; provide and audit trail |
|
|
Term
What 5 technologies comprise a Microsoft IDA solution? |
|
Definition
AD Domain Services; AD Lightweight Directory Services; AD Certificate Services; AD Rights Management Services _x000D_ *AD Federation Services |
|
|
Term
What part of IDA does AD Domain Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Lightweight Directory Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Certificate Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Rights Management Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Federation Services provide? |
|
Definition
partnership with external organizations |
|
|
Term
What did AD Lightweight Directory Services used to be called? |
|
Definition
Active Directory Application Mode |
|
|
Term
What does AD Lightweight Directory Services do? |
|
Definition
stores and replicates application-related database information |
|
|
Term
What best practice should be used when using AD Certificate Services to provide certificate services to external communities? |
|
Definition
get a root certificate from a trusted third-party CA |
|
|
Term
What does AD Rights Management Services do? |
|
Definition
provides persistent rights management, even after authentication (similar to Acrobat controls) |
|
|
Term
What 5 components does AD Rights Management Services require to function? |
|
Definition
AD domain with Server 2000 SP3 or higher DC's, IIS, database server AD RMS client, RMS-enabled browser |
|
|
Term
What does AD Federation Services do? |
|
Definition
allows organizations to project rights and access controls across organizational boundaries |
|
|
Term
|
Definition
a set of rules that defines classes of objects and attributes in a directory |
|
|
Term
What do replication services do? |
|
Definition
distribute directory data across a network |
|
|
Term
What does a global catalog contain? |
|
Definition
limited information about every object in the directory |
|
|
Term
What is another name for a global catalog? |
|
Definition
|
|
Term
What command is used to launch configuration of a domain controller? |
|
Definition
|
|
Term
What are the components of an AD infrastructure? |
|
Definition
AD data store, DC's, domains, forest, trees, functional level, OU's, sites |
|
|
Term
What is the directory also known as? |
|
Definition
|
|
Term
How is the directory stored? |
|
Definition
as a single file (Ntds.dit) |
|
|
Term
Where is the directory located by default? |
|
Definition
%SystemRoot%\Ntds folder on all domain controllers |
|
|
Term
What 4 partitions are usually found in the AD data store? |
|
Definition
schema, configuration, global catalog, domain naming context |
|
|
Term
What important authentication service is run by all domain controllers? |
|
Definition
Kerberos Key Distribution Center (KDC) |
|
|
Term
Where can a user receive authentication from? |
|
Definition
|
|
Term
What serves as a scope for administrative policies (password expiration, etc.)? |
|
Definition
|
|
Term
What is considered best practice when replication cannot occur reliably between domain controllers? |
|
Definition
place them in separate domains |
|
|
Term
|
Definition
a collection of one or more Active Directory domains |
|
|
Term
What is the first domain in a forest known as? |
|
Definition
|
|
Term
What entity defines a security boundary? |
|
Definition
|
|
Term
What is a security boundary? |
|
Definition
an entity outside which no data is replicated |
|
|
Term
|
Definition
|
|
Term
What determines whether domains are part of the same tree? |
|
Definition
whether those domains are part of a contiguous DNS namespace |
|
|
Term
What are the 3 domain functional levels? |
|
Definition
Windows 2000 native, Windows Server 2003, and Windows Server 2008 |
|
|
Term
What are the 2 forest functional levels? |
|
Definition
Windows Server 2003 and Windows Server 2008 |
|
|
Term
What requirement exists for the Windows Server 2008 domain functional level? |
|
Definition
all DC's must be running Server 2008 |
|
|
Term
What requirement exists for the Windows Server 2008 forest functional level? |
|
Definition
all domains must be Windows Server 2008 domains |
|
|
Term
What MMC is used to administer roles? |
|
Definition
|
|
Term
What are the two primary steps in creating a new DC? |
|
Definition
add roles through Server Manager and promote server to DC |
|
|
Term
What command-line command can be used to promote a server to DC? |
|
Definition
|
|
Term
What two names do all DC's require? |
|
Definition
a valid DNS name and a valid NetBIOS name |
|
|
Term
|
Definition
A command-line tool that enables administrators to create and display a Resultant Set of Policy (RSoP) query from the command line. |
|
|
Term
|
Definition
A Group Policy Management feature that uses the Resultant Set of Policy snap-in to simulate the effect of a policy on the user environment. |
|
|
Term
|
Definition
A feature in Group Policy Management that is equivalent to the Logging mode within Resultant Set of Policy MMC snap-in. Rather than simulating policy effects like the Group Policy Modeling Qizard, Group Policy Results obtains Resultant Set of Policy (RSoP) information from the client computer to show the actual effects that policies have on the client computer and user environment. |
|
|
Term
|
Definition
The Resultant Set of Policy (RSoP) mode that queries existing policies in the hierarchy that are linked to sites, domains, domain controllers, and Organization Units. This mode is useful for documenting and understanding how combined policies are affecting users and computers. The results are returned in an MMC window that can be saved for later reference. |
|
|
Term
|
Definition
The Resultant Set of Policy (RSoP) mode that allows administrators to simulate the effect of policy settings prior to implementing them on a computer or user. |
|
|
Term
|
Definition
A filtering method that method uses filters written in the WMI Query Language (WQL) to control GPO application. |
|
|
Term
|
Definition
Common Information Management Object Model A database used through Windows Management Instrumentation that contains information gathered when a computer starts and becomes part of the network. This information includes hardware, Group Policy Software Installation settings, Internet Explorer Maintenance settings, scripts, Folder Redirection settings, and Security settings. |
|
|
Term
|
Definition
REsultant Set of Policy Query engine that looks at GPOs and then reports its findings. Use this tool to determine the effective settings for a user or a computer based on the combination of the local, site, domain, domain controller, and OU policies. |
|
|
Term
|
Definition
Windows Management Instrumentation A component of the Microsoft Windows operating system that provides management information and control in an enterprise environment. It allows administrators to create queries based on hardware, software, operating systems, and services. |
|
|
Term
|
Definition
WMI Query Language A language that is similar to structured query language (SQL). |
|
|
Term
|
Definition
An option used to deploy required applications to pertinent users and computers. |
|
|
Term
|
Definition
Stategy for enforcing restrictions that prevents any applicationfrom running that requires administrative rights but allows programs to run that only require resources that are accessible by normal users. |
|
|
Term
|
Definition
A software restiction rule that uses the signing certificate of an application to allow software from a trusted source to run or to prevent software that does not come from a trusted source from running. Certificate rules also can be used to run programs in disallowed areas of the operating system. |
|
|
Term
|
Definition
Strategy for enforcing restictions that prevents all applications from running except those that are specifically allowed. |
|
|
Term
|
Definition
The shared folder that is a network location from which users can download software. Also known as the software distribution point. |
|
|
Term
file-activated installation |
|
Definition
A method of distributing applications whereby an application is installed when a user opens a file associated with an application that does not currently exist. |
|
|
Term
|
Definition
A series of bytes with a fixed length that uniquely identifies a program or file. |
|
|
Term
|
Definition
A formula that generates a hash value. |
|
|
Term
|
Definition
A sotrware-restriction rule applied to an appllication executable that will check the file's hash value and prevent the application from running if the hash value is incorrect. |
|
|
Term
|
Definition
A value generated by a formula that makes it nearly impossible for another program to have the same hash. |
|
|
Term
Install This Application At Logon |
|
Definition
A deployment option that allows the application to be installed immediately, rahter than advertising on the Start menu. |
|
|
Term
|
Definition
A relational database file that is copied to the target computer system, with the program files it deploys. In addition to providing installation information, this database file assits in the self-healing process for damaged applications and clean application removal. |
|
|
Term
|
Definition
A software restiction rule that allows only Windows Installer packages to be installed if they come from a trusted area of the network. |
|
|
Term
|
Definition
Windows Installer files with the .msp extension that are used to apply service packs and hotfixes to installed soft |
|
|
Term
|
Definition
A software restriction rule that identifies software by specifiying the directory path where the application is stored in the file system. |
|
|
Term
|
Definition
1) An option that allows users to access network resoufces by searching the Active Directory database for the desired resource. (See lesson 1). _x000D_ 2) An option used to deploy application. It allows users to install the applications that they consider useful to them. (See lesson 9) |
|
|
Term
|
Definition
The process of preparing software for .msi distribution, which includes taking a snapshot of a clean computer system before the application is installed, installing the application as desired and taking a snapshot of the computer after the application is installed. |
|
|
Term
|
Definition
A function that allows software to detect and correct problems, such as missing or deleted files. |
|
|
Term
|
Definition
A process that takes place from the time anapplication is evaluated for deployment in an organization until the time when it is deemed old or no longer suitable for use. |
|
|
Term
|
Definition
Stategy for enforcing restictions that allows all applications to run, except those that are specifically excluded. |
|
|
Term
|
Definition
A non-Windows Installer package that can be created in a text editor. |
|
|
Term
|
Definition
Software Development Live Cycle A structured process used to develop information systems software, projects, or components; phases include analysis, design, implementation and maintenance. |
|
|
Term
|
Definition
A subcategory in the Account Policies category that specifies the number of unsuccessful logon attempts that, if made within a contiguous timeframe, might constitute a potential security threat from an intrruder. An Account Lockout Policy can be set to lock the account in question after a specified number ofinvalid attempts. Additionally, the policy specifies how long the account will remain locked. |
|
|
Term
|
Definition
Setting that logs events related to successful user logons to a domain. |
|
|
Term
account management events |
|
Definition
Setting that triggers an event that is written based on changes to account properties and group properties. Log entries written due to this policy setting reflect events related to user or group account creation, deletion, renaming, enabling, or disabling. |
|
|
Term
|
Definition
Th section of GPO Local Policies that enables administrators to log successful and failed security events, such as logon events, account access, and object access. |
|
|
Term
|
Definition
Tracking events that take place on the local computer. |
|
|
Term
|
Definition
A setting that limits the amount of space available on the server for user data. |
|
|
Term
|
Definition
Group Policy setting that indicates the number of passwords that Active Directory should retain in memory before allowing someone to reuse a previously used password. |
|
|
Term
|
Definition
A command-line tool used to force a manual Group Policy refresh. Thistool was introduced in Windows Server 2003, and it is used in Windows Server 2003, and it is used in Windows Server 2003 and Windows Server 2008 to replace the secedit/refreshpolicy command that was used in Windows 2000. |
|
|
Term
|
Definition
For domain accounts only, this policy enables administrators to configure settings that govern how Active Directory authentication functions. |
|
|
Term
|
Definition
Policies that enable administrators to set user privileges on the local computer that govern what users can do on the computer and determine if these actions are tracked within an event log. |
|
|
Term
|
Definition
The setting logs events related to successful user logons on a computer. |
|
|
Term
|
Definition
A new object type in Windows Server 2008 that enables the use of Fine-Grained Password Policies. Also know as a Password Setting Object (PSO). |
|
|
Term
|
Definition
A separate Group Policy category that can allow files to be available to users, even when users are disconnected from the network. |
|
|
Term
|
Definition
A subcategovy in the Account Policies category that enforces password length, password history and so on. Password Policies can be applied to domain and local user accoutns. |
|
|
Term
|
Definition
By default, this policy is set to audit successes in the Default Domain Controllers GPO. Policy change audit log entries are triggered by events such as user rights assignment changes, establishement or removal of trust relationships, IPSec policy agent changes, and grants or removals of system access privileges. |
|
|
Term
|
Definition
A subcategory in the Account Policies category that enforces password length, password history, and so on. Password Policies can be applied to domain and local user accounts. |
|
|
Term
|
Definition
By default, this policy is set to audit successes in the Default Domain Controllers GPO. Policy change audit log entries are triggered by events such as user rights assignment changes, establishment or removal of trust relationsips, IPSec policy agent changes, and grants or removals of system access privileges. |
|
|
Term
|
Definition
The available period that each background refresh process that can set to ranges from 0 to 64,800 minutes (45 days). |
|
|
Term
|
Definition
Policy settings that enables an administrator to specify group membership lists. |
|
|
Term
|
Definition
A subcategory of the Local Policies setting area of a Group Policy Object that includes security settings related to interactive log on, digital signing of data, restrictions for access to floppy and CD-ROM drives, unsigned driver installation behavior, and logon dialog box behavior. |
|
|
Term
|
Definition
Events that rigger a log entry in this category include system startups and shutdowns; system time changes; system event resources exhaustion, such as when an event log is filled an can no longer append entries; security log cleaning; or any event that affects system security or the security log. In the Default Domain Controllers GPO, this setting is set tolog success by default. |
|
|
Term
|
Definition
The category that is used to configure the startup and security settings for services running on a computer. |
|
|
Term
|
Definition
An Administrative Template setting that continues to apply until it is revised using a policy that overwrites the setting. |
|
|
Term
|
Definition
A subcategory of the Local Policies setting area of a Group Policy Object that includes settings for items that pertain to rights needed by users to perform system-related tasks. |
|
|
Term
|
Definition
Fine-Grained Password Policies A policy that can be applied to one or more users or groups of users, allowing the administrator to specify a more or less stringent password policy for the subset than the password policy defined for the entire domain. |
|
|
Term
|
Definition
Key Distribution Center Used to issue Kerberos tickets to users for domain accesss. |
|
|
Term
|
Definition
Password Settings Object A new object type in Windows Server 2008 that enables the use of Fine-Grained Password Policies. Also know as msDS-PasswordSettings. |
|
|
Term
|
Definition
Files used to generate the user interface for the Group Policy settings that can be set using the Group Policy Management Editor. |
|
|
Term
|
Definition
Windows Server 2008 Administrative Templates using the .admx extension. |
|
|
Term
|
Definition
A method of processing multiple scripts at the same time, without waiting for the outcome of a previously launched script to occur. |
|
|
Term
|
Definition
A setting on a contianer object, such as a site, domain, or Organizational Unit, that will block all policies from parent containers from flowing to this container. It is not policy specific; it applies to all policies applied at parent levels. |
|
|
Term
|
Definition
Single location in a SYSVOL directory containing Administrative Templates with the .admx extension. |
|
|
Term
Default Domain Controller Policy |
|
Definition
A policy linked to the Domain Controllers OU; its settings affect all domain controllers in the domain. |
|
|
Term
|
Definition
A type of Group Policy Object associated with a domain. |
|
|
Term
|
Definition
A setting on an individual GPO link that forces a particular GPO's settings to flow down through the Active Directory, without being blocked by any child Organizational Units. |
|
|
Term
|
Definition
A setting that allows files to be redirected to a network drive for backup and makes them accessible from anywhere on the network. |
|
|
Term
|
Definition
The process of applying Group Policy to all domains and the child objects contained within them. |
|
|
Term
|
Definition
Group Policy container An Active Directory object that stores the properties of the GPO. |
|
|
Term
|
Definition
Group Policy Management Console The Microsoft Management Console (MMC) snap-in that is used to create and modify Group Policies and their settings. |
|
|
Term
|
Definition
Group Policy Object Objects that contain all of the Group Policy settings that will be implemented on all user and computer objects within a site, domain, or OU. |
|
|
Term
|
Definition
Group Policy template A folder located in the Policies subfolder of the SYSVOL share that stores policy setting, such as security settings and script files. |
|
|
Term
|
Definition
Return on investment The amount of money gained (or lost) relative to the amount of money that was invested in a particular project or technology. Can be measured by tangible benefits, such as implementation costs and ongoing support. In addition, it can also be measured by intangible benefits, such as increased user ptoductivity, and other factors that are difficult to measure from a financial standpoint. |
|
|
Term
|
Definition
Total cost of ownership A value used to assess the cost of implementaing computer software or hardware, both in terms of direct and indirect costs. TCO can be calculated based on how much ownership costs over the lifetime of a business resource. |
|
|
Term
|
Definition
Windows Deployment Services A managed setting that can be defined or changed through Group Policies. This setting assists in rebuilding or deploying workstations quickly and efficiently in an eveterprise environment. |
|
|
Term
Group Policy Management Editor |
|
Definition
The Microsoft Management console (MMC) fsnap-in that is used to create and modify Group Policies and their settings. |
|
|
Term
|
Definition
A process that applies Group Policy setting sto various containers within Active Directory. |
|
|
Term
|
Definition
A type of Group Policy Object associated with the local computer. |
|
|
Term
|
Definition
A Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace. |
|
|
Term
|
Definition
The sequence used to process policies: local policies, site policies, domain policies and then Organization Unit policies. |
|
|
Term
|
Definition
A Loopback Processing option. After all user policies run, the computer policy settings are reapplied, which allows all current GPO setting sto merge with the reapplied computer policy settings. In instances where conflicts arise between computer and user settings, the computer policy supersedes the user policy. This occurs before the desktop is presented to the user. |
|
|
Term
|
Definition
A new feature in Windows Vista where by administrators can specify a different local GPO for administrators and create specific GPO settings for one or more local users configured on a wrokstation. |
|
|
Term
|
Definition
A subcategory of Group Policy settings. |
|
|
Term
|
Definition
This feature works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible. |
|
|
Term
|
Definition
Settings that provide a consistent, sevure, manageable environment that addresses the users' needs and the organization's administrative goals. |
|
|
Term
|
Definition
A Loopback Processing option. This option overwrites the GPO list for a user object with the GPO list for the user's logon computer. This means that the computer policy settings remove any conflicting user policy settings. |
|
|
Term
|
Definition
A managed setting that can be defined or changed through Group Policies. Scripts, including logon, logoff, startup, and shutdown commands, can assist in configurint the user environment. |
|
|
Term
securtity group filtering |
|
Definition
An advanced technique that enables you to apply GPO setting to only one or more users or groups within a container by selectively granting the "Apply _x000D_ Group Policy" permissions to one or more user or security groups. |
|
|
Term
|
Definition
A subnode within the Computer Configuration and User Configuration nodes. The Software Settings folder located under the under the User Configuration node contains settings that are appplied to users designated by the Group Policy, regardless of the computer from which they log on to Active Directory. |
|
|
Term
|
Definition
A type of Group Policy that enables administrators to configure a standard set of items that will be configured by default in any GPO that is derived from a starter GPO. Starter GPOs area new feature in Windows Server 2008. |
|
|
Term
|
Definition
Processing method whereby each policy must be read and applied completely before the next policy can be invoked. |
|
|
Term
|
Definition
A Group Policy setting that enables administrators to customize the configuration of a user's desktop, environment, and security settings. Enforced policies are based on the user rather than on the computer used. |
|
|
Term
|
Definition
A subnode within the Computer Configuration and User Configuration nodes. The Windows Settings folder located under the Computer Computer Configuration node in the Group Policy Management Editor contains security settings and scripts that apply to all users who log on to Active Directory from that specific computer. The Windows Settings folder located under the User Configuration node contains settings related to folder redirection, security settings and scripts that are applied to associated users. |
|
|
Term
What is the order of group policies? |
|
Definition
1 Local Policies _x000D_ 2 Site Policies _x000D_ 3 Domain Policies _x000D_ 4 OU Policies _x000D_ _x000D_ LSDOU |
|
|
Term
Comma-Separated Value Directory Exchange |
|
Definition
CSVDE The command line utility used to import or export Active Directory information from a comma-separated value (.csv) file. |
|
|
Term
|
Definition
CSV Format that contains a comma between each value. The CSV format can be used to import and export information from other third-party applications |
|
|
Term
LDAP Data Interchange Format |
|
Definition
LDIF The format for the data file containing the object records to be created. |
|
|
Term
LDAP Data Interchange Format Directory Exchange |
|
Definition
LDIFDE A command-line utility used to import or export Active Directory information and create, modify, and delete Active Directory objects. |
|
|
Term
|
Definition
SAM A database containing userr accounts and security information that is located on a server. |
|
|
Term
|
Definition
WSH Allows scripts to be run from a Windows desktop or a command prompt. The runtime programs provided to do this are WScript.exe and CScript.exe, respectively. |
|
|
Term
|
Definition
Created when a user logs on, this value identifies the user and all of the user's group memberships. Like a club membership card, it verifies a user's permissions when the user attempts to access a local or network resource. |
|
|
Term
|
Definition
Special identity that refers to users who have not supplied a username and password. |
|
|
Term
|
Definition
To gain access to the network, prospective network users must identify themselves to a network using specific user accounts. |
|
|
Term
|
Definition
The process of confirming a user's identity using a known value, such as a password, a pin number on a smart card, or, in the case of biometric authentication, the user's fingerprint or hand print. |
|
|
Term
|
Definition
The process of confirming that an authenticated user has the correct permissions to access one or more network resources. |
|
|
Term
|
Definition
Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks. |
|
|
Term
|
Definition
The accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account. |
|
|
Term
|
Definition
Non-security-related groups created for the distribution of information to one or more persons. |
|
|
Term
|
Definition
The accounts used to access Active Directory or network-based resources, such as shared folders or printers. |
|
|
Term
|
Definition
A group used to assign permissions to resources that reside only in the same domain as the domain local group. They can contain user accounts, computer accounts, global groups, and universal groups from any domain, in addition to other domain local groups from the same domain. |
|
|
Term
|
Definition
A command-line tool used to create, delete, view, and modify Active Directory objects, including users, groups and Organizational Units. |
|
|
Term
|
Definition
A special identity group that contains all authenticated users and domain guests. |
|
|
Term
|
Definition
A group used to grant or deny permissions to any resource located in any domain in the forest. Global groups can contain user accounts, computer accounts, and/or other global groups only from within the same domain as the global group. |
|
|
Term
|
Definition
A collection of user or computer accounts that is used to simplify the assignment of permissions to network resources. |
|
|
Term
|
Definition
The process of configuring one or more groups as members of another group. |
|
|
Term
|
Definition
Group characteristic that controls which objects the group can contain, limiting the objects to the same domain or permitting objects from remote domains as well, and controls the location in the domain or forest where the group can be used. |
|
|
Term
|
Definition
Group characteristic that defines how a group is to be used within Active Directory. |
|
|
Term
|
Definition
The first line of the imported or exported text file that uses proper attribute names. |
|
|
Term
|
Definition
The accounts used to access the local computer only. They are stored in the local Security Account Manager (SAM) database on the computer where they reside. Local accounts are never replicated to other computers, not do these accounts have domain access. |
|
|
Term
|
Definition
A collection of user accounts that are local to one specific workstation or member server. Local groups are created in the security database of a local computer and are not replicated to Active Directory or to any other computers on the network. |
|
|
Term
|
Definition
An object placed inside another object of the same type. |
|
|
Term
|
Definition
When a group is placed in a second group, the members of the first group become members of the second group. |
|
|
Term
|
Definition
Each user's login name--the portion to the left of the '@' within a User Principle Name. The SAM account name must be unique across a domain. |
|
|
Term
|
Definition
Security-related groups created for purposes of granting resource access permissions to multiple users. |
|
|
Term
|
Definition
Group used to define permission assignments. Adminitrators cannot manually modify the group membership of special identity groups, nor can they view their membership lists. |
|
|
Term
Active Directory Migration Tool |
|
Definition
ADMT A free tool used to move objects between domains. |
|
|
Term
Delegation of Control Wizard |
|
Definition
A simple interface used to delegate permissions for domains, Organizational Units, and containers. |
|
|
Term
|
Definition
Automated pass-word-cracking tools that try every possible combination of characters until the correct sequence of characters is finally discoverer. |
|
|
Term
|
Definition
User interface enabling the user to drag on object and drop it on a target. This feature was introduced in Windows Server 2003. |
|
|
Term
|
Definition
A command-line utility used to move an object from one location to another. |
|
|
Term
|
Definition
An alphanumeric sequence of characters entered with a username to access a server, workstation, or shared resource. |
|
|
Term
|
Definition
An attempt to discover a user's password. |
|
|
Term
personal identification number |
|
Definition
PIN Typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or a smart card. |
|
|
Term
|
Definition
Option that enables administrators to maintain their primary logon as a standard user and create a secondary session for access to an administrative tool. |
|
|
Term
|
Definition
A command-line tool that enables administrators to log on with alternate credentials. |
|
|
Term
|
Definition
A feature that provides the ability to log on with an alternate set of credentials to that of the primary logon. |
|
|
Term
|
Definition
A password that follows guidelines that make it difficult for a potential hacker to determine that user's password. Password guidelines include a minimum required password length, a password history, requiring multiple types of characters within a password, and setting a minimum password age. |
|
|
Term
|
Definition
|
|
Term
What are the Sytem Requirements to run AD RMS? |
|
Definition
-Pentium 4.3 GHz or higher _x000D_ -512MB RAM _x000D_ -40GB HDD _x000D_ -OS of Windows Server 2008 except Web Edition or Itanium Based systems _x000D_ -FAT32 or NTFS file system _x000D_ -Message Queing _x000D_ -IIS with ASP.NET enabled web service |
|
|
Term
What is a Server License certificate (SLC)? |
|
Definition
it is a self-signed certificate generated during the AD RMS cetup of the frst server in a root cluster. |
|
|
Term
What is a Rights Account Certificate (RAC)? |
|
Definition
issued to trusted users who have an email enabled account in AD DS. _x000D_ -RACs are generated when the user first tries to open rights-protected content. _x000D_ -have a duration of 365 days _x000D_ -Temp RACs do not tie the user to a specific computer and are valid for only 15 minutes _x000D_ -contains the public key of the user as well as his or her private key. |
|
|
Term
What is a Client Licensor certificate (CLC)? |
|
Definition
After the user has a RAC and launches an AD RMS-enabled application the application automatically sends a request for a CLC to the AD RMS cluster. _x000D_ -includes the client licensor public key, the client licensor private key that is encyrpted by the user's public key, and the AD RMS cluster's public key. |
|
|
Term
What is a Machine Certificate? |
|
Definition
The first time an AD RMS enabled applicaton is used a machine certificate is created. _x000D_ -contains the public key for the activated computer. Private key is containted within the lockbox on the computer. |
|
|
Term
What is a Publishing License? |
|
Definition
created when the user saves content in a rights protected mode. the license lists which users can use the content and under which conditions as well s the rights each user has to the content. _x000D_ -includes the symmetric content key for decrypting content as well as the public key of the cluster. |
|
|
Term
|
Definition
The use license is assigned to a user wh opens rights-protected content. |
|
|
Term
What is a Federated Web SSO? |
|
Definition
usually spans firewalls because it links applications contained within an extranet in a resource organization to the internal directory stores of account organizations. _x000D_ The only trust that exists in this model is the federation trust.. It is always a one-way trust from the resource organization to the account organizations. _x000D_ -This is the most common deployement scenario. |
|
|
Term
What is a Federated Web SSO with Forest Trust? |
|
Definition
the organization uses two AD DS forests. One is internal and the is an external forest located with in a perimeter network. _x000D_ -internal users have access to the applications from both the internal newtork and internet. _x000D_ -external users have access to the applications only from the internet |
|
|
Term
|
Definition
use when all the users for an extranet application are external and do not have accounts within an AD DS domain. |
|
|
Term
What kind of certificate does a Federation server need in an AD FS environment? |
|
Definition
server authentication certificate and a token signing certificate |
|
|
Term
What kind of certificate does a Federation Service Proxy use? |
|
Definition
must have a server authentication certificate to support SSL-encrypted communications with Web clients _x000D_ -must also have a client authentication certificate to authenticate the federation server during communications. |
|
|
Term
What kind of certificate des an AD FS Web Agent use? |
|
Definition
server authentication certificate to secure its communications with web clients. |
|
|
Term
Is publisng CA configuration to AD DS directories optional or mandatory for a Standalone CA? |
|
Definition
optional _x000D_ _x000D_ Mandatory for Enterprise |
|
|
Term
|
Definition
An administratively defined collection of network resources that share a common directory database and security policies. |
|
|
Term
|
Definition
Within an active directory, each resource is identified as an object. _x000D_ _x000D_ -Each object contains attributes _x000D_ -Active Directory uses DNS for locating and naming objects _x000D_ -Container objects hold or group other objects, either other containers or leaf objects |
|
|
Term
|
Definition
The schema identifies the object classes that exist in the tree and the attributes of the object. |
|
|
Term
|
Definition
An organizational unit is like folder that subdivides and organizes network resources within a domain. _x000D_ -is a container object _x000D_ -can be used to logically organize network resources _x000D_ simplifies security administration _x000D_ -first level ous are called parents _x000D_ -second level ous are called children _x000D_ -ous can contain other ous or any type of leaf object. |
|
|
Term
What are Generic Containers? |
|
Definition
used to organize Active Directory objects. _x000D_ -created by default _x000D_ -cannot be created, moved, renamed, or deleted. _x000D_ -have very few editable properties. |
|
|
Term
|
Definition
A group of related domains tha share the same contiguous DNS name space. |
|
|
Term
|
Definition
a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces. |
|
|
Term
What is a Domain Controller? |
|
Definition
a server that holds a copy of the Active directory database that can be written to. |
|
|
Term
What is a Global Catalog? |
|
Definition
A database that contains a partial replica of every object from every domain within a forest. |
|
|
Term
|
Definition
a distributed database that stores and manages information about network resources, such as users, computers and printers. |
|
|
Term
|
Definition
An LDAP directory service that you can use to create a directory store for use by directory-enabled applications. _x000D_ -formerly known as ADAM. |
|
|
Term
|
Definition
a feature that enables secure access to web applications outside of a user's home domain or forest. _x000D_ -provides web SSO |
|
|
Term
|
Definition
a feature that safeguards digital information from unauthorized use. |
|
|
Term
|
Definition
an identity and access control feature that creates and manages public key certificates used in software security systems. |
|
|
Term
What are the steps to prevent objects from accidental deletion? |
|
Definition
In AD Users and Computers or Active Directory Sites and Services...do either or... _x000D_ -On the object tab, select the Protect object from accidental deletion check box. _x000D_ -On Security tab, select the Deny Delete All Child Objects advanced permission for Everyone. |
|
|
Term
Where does Windows store standard zone data? |
|
Definition
|
|
Term
How do you change the replication scope for a zone using an application partition? |
|
Definition
dnscmd/zonechangedirectorypartition _x000D_ _x000D_ /foest _x000D_ /domain |
|
|
Term
How do you perform and offline domain join? |
|
Definition
Djoin.exe/provision then copy resulting file to the computer that you want to join to the domain. _x000D_ run Djoin.exe/requestI=ODJ |
|
|
Term
Can you convert a group from global to domain local or domain global? |
|
Definition
No. Not directly. First convert the group to a universal group and apply the changes, then convert the group to the desired scope. |
|
|
Term
What are the requirements to join a computer to a domain? |
|
Definition
You must be a member of the Administrators group on the local computer or be given necessary rights. |
|
|
Term
What utilities do you use to create computer accounts from a command prompt or script? |
|
Definition
|
|
Term
What is a managed service account? |
|
Definition
a new account type available in Windows Server 2008 R2 and Windows 7. Provides the same benefits of using a domain user account with these improvements. _x000D_ -passwords managed and reset automatically _x000D_ -when running at Win Server 2008 R2 functional level the SPN does not need to be managed as with local accounts. |
|
|
Term
What is a Virtual Account? |
|
Definition
a new account type that are not created deleted. |
|
|
Term
|
Definition
a strategy to manage users, groups, and permissions. _x000D_ -A place user accounts _x000D_ -G into Global groups _x000D_ -DL into Domain Local groups _x000D_ -P assign permissions to domain local groups. _x000D_ _x000D_ Used in mixed mode. Universal groups not available in mixed mode. |
|
|
Term
|
Definition
Same as AGDLP except Universal groups are used. _x000D_ _x000D_ Used in nateve mode where this more than one domain and you need to grand access to similar groups defined in multiple domains. |
|
|
Term
What do you use Active Directory Users and Computers for? |
|
Definition
Use it to create, organize, and delete objects in Active Directory. |
|
|
Term
How do you access Active Directory Users and Computers? |
|
Definition
-Server Manager _x000D_ -Admin Tools _x000D_ -Running dsa.msc |
|
|
Term
|
Definition
It is the Active Directory Service Interfaces Editor. _x000D_ -use it to query, view, and edit attributes that are not exposed through other MMC snap-ins. |
|
|
Term
|
Definition
creates a new object in Active Directory |
|
|
Term
What is Dsquery used for? |
|
Definition
finds objects that match the search criteria. Returns a list of objects that match the search criteria. |
|
|
Term
|
Definition
retrieves property info about an object. |
|
|
Term
|
Definition
used to import and export Active Directory objects using a comma-seperated list file. _x000D_ -PASSWORD ARE NOT EXPORTED. |
|
|
Term
|
Definition
imports, exports, modifies, and deletes objects in Active Directory using LDAP Data Interchange Format (LDIF) files. _x000D_ -passwords are NOT exported. |
|
|
Term
|
Definition
a command line environment designed for automating administration and maintenance for Windows Server 2008 and Windows Server 2008 R2. |
|
|
Term
What is the general syntax of Powershell cmdlts? |
|
Definition
|
|
Term
|
Definition
allows you to search for and view the properties of multiple Active Directory objects. _x000D_ -GUI based |
|
|
Term
|
Definition
-Active Directory Migration tool. _x000D_ GUI based utility that helps you restructure your Active Directory organization or migrate objects from one domain to another. |
|
|
Term
What is the Active Directory Administrative Center? |
|
Definition
an Active Directory management GUI tool built on Windows Powershell. _x000D_ -Creates or manages new or existing user accounts groups, computer accounts, organizational units and containers _x000D_ -Connect to one or several domains or domain controllers in the same instance of AD Admin Center. _x000D_ -Change domain and forest functional levels _x000D_ -Filter Active Directory data by using queries. |
|
|
Term
|
Definition
-Start of Authority record. _x000D_ -first record in any DNS database file. _x000D_ -defines general paremeters for DNS zone. _x000D_ -only one SOA |
|
|
Term
|
Definition
-Name Server _x000D_ -identifies all name servers that can perform name resolution for the zone. |
|
|
Term
|
Definition
maps an IPv4 DNS host name to an IP address. |
|
|
Term
|
Definition
maps an IPv6 DNS host name to an IP address. |
|
|
Term
|
Definition
provides alternative names to hosts that already have a host record. |
|
|
Term
|
Definition
provides alternative names to domains that already have a host record. |
|
|
Term
|
Definition
used by Windows Server 2008 to register network services. |
|
|
Term
|
Definition
in a reverse lookup zone, the PTR reodrd maps an IP address to a host name. |
|
|
Term
What does a full zone transfer copy? |
|
Definition
It copies all of the zone data with each zone transfer. |
|
|
Term
Who initiates a zone transfer? |
|
Definition
the secondary server ALWAYs initiates the zone transfer. |
|
|
Term
How do you improve DNS performance? |
|
Definition
place multiple DNS servers on your network. |
|
|
Term
What does a caching only server do? |
|
Definition
runs DNS but has no zones configured. _x000D_ -Use a caching only server to improve performance while eliminating zone transfers. |
|
|
Term
When can you disable zone transfers? |
|
Definition
If a zone is AD-integrated and has no secondary servers, you can disable zone transfers. |
|
|
Term
|
Definition
a DNS server that can be used by another DNS server to resolve queries for records that cannot be resolved through the cache. |
|
|
Term
What is a secondary zone? |
|
Definition
you can eliminate the need for a forwarder for a specific zone by adding a secondary zone to the server. |
|
|
Term
|
Definition
a zone with only a partial copy of the zone database. It holds only the following _x000D_ -SOA record for the zone _x000D_ -NS records for all authoritative DNS servers for the zone. _x000D_ -A records for authoritative name servers identified in the NS records. |
|
|
Term
What is a conditional forwarder? |
|
Definition
a forwarder that is used for a specific domain. |
|
|
Term
When should you use a conditional forwarder? |
|
Definition
use a conditional forwarder to eliminate all zone transfer traffic, or in conditions where you are not allowed to transfer data from a zone. |
|
|
Term
|
Definition
the process by which a DNS server or host uses root name servers and subsequent servers to perform name resolution. |
|
|
Term
|
Definition
pointers to top level DNS servers on the internet. |
|
|
Term
|
Definition
a local balancing mechanism used by DNS servers to share and distribute network resorce loads. |
|
|
Term
What is Background Zone Loading? |
|
Definition
DNS servers loads zone data from AD DS in the background while the server restarts. |
|
|
Term
|
Definition
-Read Only Domain Controller _x000D_ -an additional domain controller for a domain that hosts read-only partitions of the Active Directory database. |
|
|
Term
What is the No-refresh interval? |
|
Definition
the time between the record's last refresh and when it can next be refreshed. |
|
|
Term
What is the refresh-interval? |
|
Definition
identifies a period of time when a record can be refreshed. It begins when the no-refresh interval ends. |
|
|
Term
What is the command adprep/forestprep used for? |
|
Definition
used to update the Windows Server 2003 or Windows 2000 Server Active Directory schema for Windows Server 2008 or Windows Server 2008 R2. _x000D_ -run it only once in the forest _x000D_ -run on the domain controller that holds the schema master. _x000D_ -must be a member of the Admins group, Schema Admnis group, and the Domain Admins group. |
|
|
Term
What is the adprep/rodcprep used for? |
|
Definition
use if you plan on installing an RODC in any domain in the forest. _x000D_ -run only once in the forest. _x000D_ -can run this command on any computer in the forest. _x000D_ -must be a member of the Enterprise Admins. |
|
|
Term
When installing a new Windows Server 2008 or 2008 R2, what must the first domain controller be? |
|
Definition
It must be a Global catalog server. |
|
|
Term
What are the methods that can be used for installing AD DS? |
|
Definition
-Active Directory Domain Services Installation Wizard _x000D_ -Command line (dcpromo) _x000D_ -Answer file _x000D_ -AD DS installation (media) (use ntdsutil.exe) |
|
|
Term
What command is used to remove AD DS? |
|
Definition
|
|
Term
What do you do if you are removing the last domain controller from a FOREST? |
|
Definition
wizard...select Delete the domain and forest |
|
|
Term
What is available at 2000 Native Domain functional level? |
|
Definition
-universal groups are available for security and distribution _x000D_ -group nesting _x000D_ -Group converting _x000D_ -Security Identifyer history |
|
|
Term
What is available at the 2008 domain functional level? |
|
Definition
includes all features available in 2003 and adds following... _x000D_ -DFS for SYSVOL _x000D_ -AES _x000D_ -Last Interactive Logon Info. _x000D_ -Fine-grained password policies that allow you to specify password and account lockout policies for users and global security groups in a domain. |
|
|
Term
What is available at the 2008 R2 domain functional level? |
|
Definition
includes all previous features and adds... _x000D_ -Authentication Mechanism Assurance (AMA) allowing you to control access to network resources based on the type of certificate used during logon. _x000D_ -Automatic Service Principle Name (SPN) management when using managed service and virtual accounts. |
|
|
Term
What forest functional level must you be at to use the Active Directory Recycle Bin? |
|
Definition
|
|
Term
What is a Site Link Bridge? |
|
Definition
a collection of two or more site links that can be grouped as a single logical link. _x000D_ -enabled by default _x000D_ -if disabled, you must manually specify site link bridges |
|
|
Term
What is a Bridgehead server? |
|
Definition
a domain controller in a site that replicates with domain controllers in other sites. _x000D_ -REPLICATION WITHIN A SITE DOES NOT USE BRIDGEHEAD SERVERS |
|
|
Term
What can be used to allow replication within mail messages in environments where WAN links are not available? |
|
Definition
SMTP _x000D_ -cannot replicate only the configuration and schema directory partitions and global catalog read only replicas. _x000D_ -requires an enterprise CAwhen you use it over site links. |
|
|
Term
|
Definition
a number assigned to a site link that identifies the overall relative cost of using that site link. _x000D_ -default is 100 _x000D_ -the lower the number, the more preferred the site link. |
|
|
Term
What commands can you use to force replication? |
|
Definition
-Replicate now _x000D_ -repadmin.exe/replicate |
|
|
Term
What are the stages of of DFS migration? |
|
Definition
1. Not initiated _x000D_ 2. Global state 0...this stage DFS replication has not started yet. FRS is still being used _x000D_ 3. Global State 1...DFS begins to replicate but FRS is still the main replication method. _x000D_ 4. Global State 2....FRS continues to replicate but DFS becomes master _x000D_ 5. Global State 3...FRS completely stops and DFS becomes sole source of replication. |
|
|
Term
What does the schema master do? |
|
Definition
Maintains the AD schema for the forest. |
|
|
Term
What does the Domain Naming Master do? |
|
Definition
Adds new domains to and removes existing domains from the forest. _x000D_ -ensures that domain names are unique |
|
|
Term
What does the RID master do? |
|
Definition
It allocates pools or blocks of numbers that are used by the domain controller when creating new security principles. |
|
|
Term
What does the PDC emulator do? |
|
Definition
acts like a Windows NT 4.0 Primary Domain Controller. It performs other tasks normally associated with NT domain controllers. |
|
|
Term
What is the Infrastructure Master responsible for? |
|
Definition
It is responsible for updating changes made to objects. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The Domain Name System (DNS) is a hierarchical, distributed database that maps logical host names to IP addresses |
|
|
Term
What does a DNS server hold? |
|
Definition
A DNS server holds a database of hostnames and their corresponding IP addresses. Clients query the DNS server to get the IP address of a given host. |
|
|
Term
What was used before DNS? |
|
Definition
a hosts file saved on each host computer |
|
|
Term
What makes up the DNS hierarchy? |
|
Definition
The DNS hierarchy is made up of the following components: _x000D_ - . (dot) domain (also called the root domain) _x000D_ - Top Level Domains (TLDs) (.com, .edu, .gov) _x000D_ - Second-level and additional domains _x000D_ - Hosts |
|
|
Term
|
Definition
Fully Qualified Domain Name - includes the host name and the name of all domains back to root. |
|
|
Term
What makes DNS a distributed database? |
|
Definition
DNS is a distributed database because no one server holds all of the DNS information. Instead, multiple servers hold portions of the data. |
|
|
Term
|
Definition
Zones typically contain one or more domains, although additional servers might hold information for child domains. |
|
|
Term
|
Definition
DNS servers hold zone files and process name resolution requests from client systems. |
|
|
Term
What is a DNS forward lookup? |
|
Definition
A forward lookup uses the host name (or the FQDN) to find the IP address |
|
|
Term
What is a DNS reverse lookup? |
|
Definition
A reverse lookup uses the IP address to find the host name (or FQDN). |
|
|
Term
|
Definition
The A record maps a host name to an IP address and is used for forward lookups. |
|
|
Term
|
Definition
The PTR record maps an IP address to a host name and is used for reverse lookups. |
|
|
Term
|
Definition
The CNAME record provides an alternate name (an alias) for a host. |
|
|
Term
|
Definition
The SRV record identifies a service, such as an Active Directory domain controller. |
|
|
Term
How are DNS records created? |
|
Definition
Manually, or dynamically using Dynamic DNS (DDNS). With DDNS, hosts automatically register and update their corresponding records with the DNS server. |
|
|
Term
What is the process followed when a client computer needs to find an IP address? |
|
Definition
- The client examines its HOSTS file for the IP address. _x000D_ - If the IP address is not in the HOSTS file, it examines its local DNS cache for the IP address. _x000D_ - If the IP address is not in the cache, the client sends the request to a DNS server. |
|
|
Term
What is the process when a DNS server received a name resolution request? |
|
Definition
1) The DNS server examines its local DNS cache for the IP address _x000D_ 2) If the IP address is not in the server cache, it checks its HOSTS file. _x000D_ 3) If the information is not in the HOSTS file, the server checks any zones for which it is authoritative. _x000D_ 4) Forwarding or Recursion _x000D_ 5) After the information is found or received from another server, the DNS server returns the result to the client, and places the information in its server cache. |
|
|
Term
What is an authoritative DNS server? |
|
Definition
a DNS server that has a full, complete copy of all the records for a particular zone. |
|
|
Term
|
Definition
Where the DNS server forwards the name resolution request to another DNS server, then waits for a response from that server |
|
|
Term
|
Definition
Where the DNS server queries root domain servers, top-level domain server and other DNS servers in an iterative manner until it finds the one that hosts the target domain. |
|
|
Term
What is a caching-only DNS server? |
|
Definition
A caching-only DNS server has no zone information; it is not authoritative for any domains. It uses information in its server cache, or forwarding or recursion, to respond to client queries. |
|
|
Term
Who can install DNS in Server 2008? |
|
Definition
Members of the Domain Admins group |
|
|
Term
Which versions of server 2008 can have DNS installed on them? |
|
Definition
You can install DNS on any version of Windows Server 2008 except for the Windows Server 2008 Web Server edition. |
|
|
Term
What type of IP address must the DNS server have? |
|
Definition
|
|
Term
How would you add the DNS role from a command prompt (or on a server core)? |
|
Definition
start /w ocsetup DNS-Server-Core-Role |
|
|
Term
What command will give a list of installed services on a server? |
|
Definition
Run the oclist command to get a list of services (including DNS) installed on a server. |
|
|
Term
What can be used to manage DNS on Server 2008? |
|
Definition
Use the DNS snap-in or the dnscmd command to manage DNS. |
|
|
Term
What is a primary DNS zone? |
|
Definition
the master copy of a zone database |
|
|
Term
What is a secondary DNS zone? |
|
Definition
A secondary zone is a read-only copy of the zone database. |
|
|
Term
What is an Active Directory-integrated DNS zone? |
|
Definition
An Active Directory-integrated zone holds zone data in Active Directory instead of a text file. |
|
|
Term
|
Definition
A stub zone is a zone with only a partial copy of the zone database. |
|
|
Term
What is the GlobalNames DNS zone? |
|
Definition
The GlobalNames zone is a special zone in the DNS database that is used for single-label name resolution. |
|
|
Term
What is a forward lookup DNS zone? |
|
Definition
A forward lookup zone provides hostname-to-IP address resolution. Clients query the DNS server with the hostname, and receive the IP address in return. |
|
|
Term
What is a reverse lookup DNS zone? |
|
Definition
A reverse lookup zone provides IP address-to-hostname resolution. Clients query the DNS server with the IP address, and receive the hostname in return. |
|
|
Term
How many servers can hold the primary zone file? |
|
Definition
Only one server can hold the primary zone file. To place zone data on multiple servers, configure secondary servers. |
|
|
Term
Where does Windows store standard zone data? |
|
Definition
Windows stores standard zone data in the %windir%\System32\Dns directory. The file is a text file with .dns added to the zone name. |
|
|
Term
Which types of zone support dynamic updates? |
|
Definition
Primary and Active Directory-integrated zones support dynamic updates. Use an Active Directory-integrated zone to use secure dynamic updates. |
|
|
Term
What types of record does a reverse lookup zone hold? |
|
Definition
Reverse lookup zones hold PTR (pointer) records. The PTR record maps the IP address to an A record. |
|
|
Term
What type of zones can a reverse lookup zone be? |
|
Definition
A reverse lookup zone can be a primary zone, a secondary zone, or an Active Directory integrated zone. |
|
|
Term
What is the SOA (Start of Authority) record? |
|
Definition
The first record in any DNS database file is the SOA. It defines the general parameters for the DNS zone, and it is assigned to the DNS server hosting the primary copy of a zone. There is only one SOA record, and it is the first record in the zone database file. The SOA record includes parameters such as the authoritative server and the zone file serial number. |
|
|
Term
What is an NS (Name Server) record? |
|
Definition
The NS resource record identifies all name servers that can perform name resolution for the zone. Typically, there is an entry for the primary server and all secondary servers for the zone (all authoritative DNS servers). |
|
|
Term
What is an A (Host Address) record? |
|
Definition
The A record maps an IPv4 (32-bit) DNS host name to an IP address. This is the most common resource record type. |
|
|
Term
What is an AAAA (Quad A) record? |
|
Definition
The AAAA record maps an IPv6 (128-bit) DNS host name to an IP address. |
|
|
Term
What is an MX (Mail Exchanger) Record? |
|
Definition
The MX record identifies servers that can be used to deliver e-mail. |
|
|
Term
|
Definition
The CNAME record provides alternate names (or aliases) to hosts that already have a host record. Using a single A record with multiple CNAME records means that when the IP address changes, only the one A record needs to be modified. |
|
|
Term
|
Definition
The DNAME record provides alternate names (or aliases) to domains that already have a host record. |
|
|
Term
What is a SRV (Service Locator) record? |
|
Definition
The SRV record is used by Windows Server 2008 to register network services. This allows clients to find services (such as domain controllers) through DNS. Windows 2008 automatically creates these records as needed and during domain controller installation. |
|
|
Term
What is a PTR (Pointer) record? |
|
Definition
In a reverse lookup zone, the PTR record maps an IP address to a host name (i.e. "points" to an A record). Where IPv4 PTR records are created in the in-addr.arpa namespace, reverse lookup zones for IPv6 addresses should be created in the ip6.arpa namespace. |
|
|
Term
What are WINS and WINS-R records? |
|
Definition
Add these records to a zone when you want to allow DNS to use WINS resolution. The WINS resource record allows DNS queries that fail to resolve to be forwarded to the WINS servers in the WINS resource record. The WINS-R resource record allows the resolution of a reverse query that is not resolvable through DNS. |
|
|
Term
How can DNS records be automatically created on a DNS server? |
|
Definition
By using Dynamic DNS. Dynamic DNS is required to support Active Directory. |
|
|
Term
Which Windows clients support DDNS? |
|
Definition
Windows clients (2000 and above) create their A records with the DNS server. Windows 9x/Me/NT clients do not support dynamic DNS. |
|
|
Term
How does the DHCP server tie in with DDNS? |
|
Definition
The DHCP server registers the PTR record with the DNS server for clients capable of dynamic updates. The DHCP server updates both the A and PTR records for clients that do not support dynamic updates. |
|
|
Term
Are dynamic updates enabled by default on a primary zone? |
|
Definition
Dynamic updates are not enabled on primary zones. You can enable dynamic updates when you create the zone or modify the zone properties later to enable this feature. |
|
|
Term
Are dynamic updates enabled by default on an Active Directory-integrated zone? |
|
Definition
Dynamic updates are enabled on Active Directory-integrated zones. Note: When you convert a primary zone to an Active Directory-integrated zone, the current dynamic update setting is retained. |
|
|
Term
What are secure dynamic updates? |
|
Definition
With secure dynamic updates, only domain members can create records, and only the original client can modify or remove records. |
|
|
Term
What is used to keep track of changes to a DNS zone? |
|
Definition
The zone serial number keeps track of changes to the zone. When you make changes to the zone, the serial number is incremented. |
|
|
Term
What is a DNS master server? |
|
Definition
A master server is the server from which the secondary copies the zone data. The master server can be the primary server or another secondary server. |
|
|
Term
What are the two types of zone transfer? |
|
Definition
Zone transfers can copy all records or only changed records: _x000D_ - A full zone transfer (AXFR) copies all of the zone data with each zone transfer. _x000D_ - A partial (or incremental) zone transfer (IXFR) copies only the changed records. This is the default method on Windows Server 2008. |
|
|
Term
Are zone transfers enabled in Server 2008 by default? |
|
Definition
By default, zone transfer in Windows Server 2008 is disabled for security reasons. To use zone transfers, manually enable the feature in the DNS settings in Server Manager. |
|
|
Term
How can you restrict the servers to which zone transfers are allowed? |
|
Definition
- Allow zone transfers only to servers that are listed as name servers. _x000D_ - Allow zone transfers only to servers you specifically identify. |
|
|
Term
|
Definition
Windows DNS servers support the use of DNS Notify. With DNS Notify, master servers are configured with a list of slave DNS servers. |
|
|
Term
How does DNS notify work? |
|
Definition
- When a change takes place, the master notifies the slave servers that the zone has changed. _x000D_ - The secondary server then initiates zone transfer, first checking the serial number, then requesting changes. |
|
|
Term
What is a DNS caching server? |
|
Definition
A caching only server runs DNS but has no zones configured. Use a caching only server to improve performance while eliminating zone transfers. |
|
|
Term
How does an Active Directory-integrated zone store DNS information? |
|
Definition
An Active Directory-integrated zone stores DNS information in Active Directory rather than in a zone file. Zone information is copied automatically when Active Directory replicates. |
|
|
Term
How can you secure zone transfers to secondary servers? |
|
Definition
Active Directory replication traffic is automatically secured. To secure zone transfers to secondary servers, use IPsec between servers. |
|
|
Term
How can you force an update of DNS zone data? |
|
Definition
You can force an update of zone data through the DNS console or by using the Dnscmd command |
|
|
Term
|
Definition
A cached copy of a user's logon credentials that have been stored on the user's local workstation. |
|
|
Term
|
Definition
The time difference between any client or member server and the domain controllers in a domain. |
|
|
Term
|
Definition
A role that has the quthority tomanage the creation and deletion of domains, domain trees, and application data partitions in the forest. Upon creation of any of these, the Domain Naming Master ensures that the name assigned is unique to the forest. |
|
|
Term
|
Definition
Global catalog service that listens on port 3268 to respond to requests to search for an object in Active Directory. |
|
|
Term
|
Definition
An attribute has been stored in the partial attribute set replicated to all global catalog servers in the forest. |
|
|
Term
|
Definition
A domain-specific role that is responsible for reference updates from its domain objects to other domains. This assists in tracking which domains own which objects. |
|
|
Term
|
Definition
A forced, ungraceful transfer of a role. This procedure is used only in the event of a catastrophic failure o a domain controller that holds an FSMO role. |
|
|
Term
|
Definition
Move a role to a new domain controller. |
|
|
Term
|
Definition
Memberships stored in the global catalog. A universal group can contain users, groups and computers from any domain in the forest. In addition, universal groups through their membership in domain local groups, can receive permissions for any resource anywhere in the forest. |
|
|
Term
universal group membership caching |
|
Definition
This feature stores universal group memberships on a local domain controller that can be used for logon to the domain, eliminating the need for frequent access to a global catalog server. |
|
|
Term
|
Definition
PAS A partial copy of all objects from other domains within the same forest. This partial copy of forest-wide data includes a subset of each object's attributes. |
|
|
Term
Primary Domain Controller Emulator |
|
Definition
PDC Emulator A role that provides backward compatibility from Microsoft Windows NT 4.0 domains and other down-level clients. |
|
|
Term
|
Definition
RID A variable length number that is assigned to objects as created and becomes part of the object's security identifier (SID). |
|
|
Term
Relative Identifier Master |
|
Definition
RID Master Role that is responsible for assigning relative identifiers to domain controllers in the domain. Relative identifiers are variable-length numbers assigned by a domain controller when a new object is created, |
|
|
Term
|
Definition
SID A variable length number used to uniquely identify an object throughout the Active Directory domain. Part of the SID identifies the domain to which the object belongs and the other part is the RID. |
|
|
Term
|
Definition
Active Directory Domain Services Windows Server 2008 service that provides a centralized authentication service for Microsoft networks. Provides the full-fledged directory service that is called Active Directory in Windows Server 2008 and previous versions of Windows Server. |
|
|
Term
|
Definition
Distinguished Name The full name of the object that includes all hierarchical containers leading up to the root domain. The xxxxxxxxxxx begins with the object's common name and appends each succeeding parent contain object, reflecting the object's location in the Active Directory structure |
|
|
Term
|
Definition
Domain Controller A server that stores the Active Directory database and authenticates users with the network during logon. |
|
|
Term
|
Definition
Knowledge Consistency Checker An internal Active Directory process tha automatically creates and maintains the replication topology. The xxxxxxxxxxx operates based on the information provided by an administrator in the Active Directory Sites and Services snap-in, which is located in the Administrative Tools folder on the domain controller, or an administrative workstation that has the Administrative Tools installed. |
|
|
Term
|
Definition
Naming Context An active Directory partition. |
|
|
Term
|
Definition
Domain Name System The name resolution mechanism computers use for all Internet communications and for private networks that use the Active Directory domain services included with Microsoft Windows Server 2008, Windows Server 2003 and Windows 2000 Server. |
|
|
Term
|
Definition
Globally Unique Identifier A 128-bit hexadecimal number that is assigned to every object in the Active Directory forest upon its creation. This number does not change even when the object itself is renamed. |
|
|
Term
|
Definition
Lightweight Directory Access Protocol The protocol that has become an industry standard that enables data exchange between directory services and applications. The xxxxxxxxx standard defines the naming of all objects in the Active Directory database and therefore, provides a directory that can be integrated with other directory services such as Novell eDeirectory, and Active Directory --aware applications, such as Microsoft Exchange. |
|
|
Term
|
Definition
Organizational Unit A container that represents a logical grouping of resources that have similar security or administrative guidelines. |
|
|
Term
|
Definition
Read-Only Domain Controller A domain controller that contains a copy of the ntds.dit file that cannot be modified and that does not replicate its changes to other domain controllers within Active Directory. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
A partition that allows information to be replicated to administratively chosen domain controllers. An example of information that is commonly stored in an application partition is DNS data. xxxxxxxxx offer control over the scope and placement of information that is to be replicated |
|
|
Term
|
Definition
Characteristics associated with an object class in Active Directory that make the object class unique within the database. The list of xxxxxxxs is defined only once in the schema, but the same xxxxxxxx can be associated with more than one object class. |
|
|
Term
|
Definition
The configuration partition contains information regarding the physical topology of the network, as well as other configuration data that must be replicated throughout the forest. |
|
|
Term
|
Definition
An object, such as a domain or an Organizational Unit, that is used to organize other objects. Also known as a leaf object. |
|
|
Term
|
Definition
Trust type that allows resources to be shared between Active Directory forests. |
|
|
Term
|
Definition
Administration of an Organizational Unit is tasked to a department supervisor or manager, thus allowing that person to manage day-to-day resource access as well as more mundane tasks, such as resetting passwords. |
|
|
Term
|
Definition
Allow businesses to define, manage, access, and secure network resources, including files, printers, people, and applications. |
|
|
Term
|
Definition
A grouping of objects in Active Directory that can be namaged together. A domain can function as a security boundary for access to resources, such as computers, printers, servers, applications, and file systems. |
|
|
Term
|
Definition
Active Directory domain partition that is replicated to each domain controller within a particular domain. Each domain's xxxxxxx contains information about the objects that are stored within that domain; users, groups, computers, printers, Organization Units, and more. |
|
|
Term
|
Definition
In Active Directory, a logical grouping of network resources and devices that can contain one or more domains configured in a parent-child relationship. Each Active Directory forest can contain one or more xxxxxxxs, each of which can, in turn, contain one or more domains. |
|
|
Term
|
Definition
A one-way, nontransitive trust that is established with a Windows NT domain or a Windows 2000 domain in a separate forest |
|
|
Term
|
Definition
The ability to respond gracefully to a software or hardware failure. In particular, a system is considered to be xxxxxxxx when it has the ability to continue providing authentication services after the failure of a domain controller. |
|
|
Term
|
Definition
The largest container object within Active Directory. The xxxxxxxx container defines the fundamental security boundary within Active Directory, which means that a user can access resources across an entire Active Directory xxxxxxxx using a single logon/password combination. |
|
|
Term
|
Definition
The first domain created within an Active Directory forest. |
|
|
Term
|
Definition
Designed to offer support for Active Directory domain controllers running various supported operating systems by limiting functionality to specific software versions. As legacy domain controllers are decommissioned, administrators can modify the xxxxxxxxx to expose new functionality within Active Directory. Some features in Active Directory cannot be activated, for example, until all domain controllers in a forest are upgraded to a specific level. |
|
|
Term
|
Definition
Occurs sehan a domain controller receives updates to the Active Directory database from other domain controllers on the network |
|
|
Term
|
Definition
A unique number used to identify all devices on an IP network. xxxxxxxxxxs are four octets long an commonly expressed in dotted-decimal notation, such as 192.168.10.1. |
|
|
Term
|
Definition
An object, such as a domain or an Organizational Unit, that is used to organize other objects. Also known as a container object. |
|
|
Term
|
Definition
An improvement to replication that is available after the forest functional level has been raised to Windows Server 2003, or higher, enabling a single membership change to a group to trigger the replication of only the change to each member in the list, rather than the entire membership list. |
|
|
Term
|
Definition
Active Directory DNS provides direction for network clients that need to know which server performs what function. |
|
|
Term
|
Definition
Individual domain controllers in an Active Directory database may contain slightly different information, because it can take anywhere from a few seconds to several hours for changes to replicate throughout a given environment. |
|
|
Term
|
Definition
An element in Active Directory that refers to a resource. Xxxxxxxs can be container xxxxxxs or leaf xxxxxs. Containers are used to organize resources for security or organizational purposes; leaf xxxxxxs refer to the end-node resources, such as users,computers, and printers. |
|
|
Term
|
Definition
Occurs when a domain controller transmits replication information to other domain controllers on the network. |
|
|
Term
|
Definition
Portion of Active Directory database used to divide the database into manageable pieces. |
|
|
Term
|
Definition
1)An option that allows users to access network resources by searching the Active Directory database for the desired resource _x000D_ 2) An option used to deploy applications. It allows users to install the applications that they consider useful to them. |
|
|
Term
|
Definition
The process of keeping each domain controller in sync with changes made elsewhere on the network. |
|
|
Term
|
Definition
Upgrade strategy based on functional levels that allows enterprises to migrate their Active Directory domain controllers gradually, based on the need and desire for the new functionality. |
|
|
Term
|
Definition
Master database that contains definitions of all objects in the Active Directory. |
|
|
Term
|
Definition
The partition that contains the rules and definitions used for creating and modifying, object classes and attributes within Active Directory. |
|
|
Term
|
Definition
A manually created nontransitive trust that allows child domains in separate trees to communicate more efficiently by eliminating the tree-walking of a trust path. |
|
|
Term
|
Definition
One or more IP subnets connected by fast links. |
|
|
Term
|
Definition
The locator records within DNS that allows clients to locate an Active Directory domain controller or global catalog. |
|
|
Term
|
Definition
Enables administrators from a particular domain to grant access to their domain's resources to users in other domains. |
|
|
Term
|
Definition
The building block of the DNS that maps a single IP address to a DNS hostname. |
|
|
Term
|
Definition
Feature offered by Read-Only Domain Controllers (RODCs) that enables an administrator to configure a user as the local administrator of a specific RODC without making the user a Domain Admin with far-reaching authority over all domain controllers in the entire domain and full access to the Active Directory domain data. |
|
|
Term
|
Definition
The dynamic update feature that places a timestamp on record, bases on the current server time, when the IP address is added. This is part of the aging ans scavenging process. |
|
|
Term
|
Definition
The executable files needed to install Windows. |
|
|
Term
|
Definition
The active Directory Installation Wizard. |
|
|
Term
|
Definition
Domain name limited to 15 characters that is maintained for legacy compatibility with older applications that cannot use DNS for their name resolution. |
|
|
Term
|
Definition
Enables the DNS database to be updated with the changed information when the Internet Protocol (IP) address if a host changes. |
|
|
Term
|
Definition
Zones necessary for computer hostname-to-IP address mapping, which are used for name resolution by various services. |
|
|
Term
|
Definition
A domain controller that contains a partial relica of every domain in Active Directory. The xxxxxxxxx stores those attributes most frequently used in search operations (such as a user's first and last names) and those attributes required t locate a full replica of the object. The Active Directory replication system builds the global catalog automatically. |
|
|
Term
incremental zone transfers |
|
Definition
Method of conserving bandwidth by transferring part of a zone. |
|
|
Term
|
Definition
Active Directory Lightweight Directory Services Role that provides developers the ability to store data for directory-enabled applications without incurring the overhead of extending the Active Directory schema to support their applications. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
Directory Services Restore Mode A Special startup mode used to run an offline defragmentation. |
|
|
Term
|
Definition
Flexible Single Master Operations The specific server roles that work together to enable the multimaster functionality of Active Directory. |
|
|
Term
|
Definition
fully qualified domain name The complete DNS name used to reference a host's location in the DNS structure. |
|
|
Term
|
Definition
Object Identifier A unique string used to identify every class or attribute added to a schema. OIDs must be globally unique, and they are represented by a heriarchical dotted-decimal notation string. |
|
|
Term
|
Definition
pointer The resource record that is the functional opposite of the A record, providing an IP address-to-name mapping for the system identified in the Name field using the inaddr.arpa domain name. |
|
|
Term
|
Definition
User Principal Name A naming format that simplifies access to multiple services such as Active Directory and email. A xxxxxxxxx follows a naming convention that can reflect the forest root domain or another alias that follows the format of username@domain-name. |
|
|
Term
|
Definition
A single occurence of an element. |
|
|
Term
|
Definition
The amount of time or delay it takes to replicate information throughout the network. |
|
|
Term
|
Definition
A command-line tool that is used to create, delete, verify, and reset trust relationships from the Windows Server 2008 command line. |
|
|
Term
|
Definition
A command-line tool that is critical for working with DNS on Serve Core. |
|
|
Term
Password Replication Policy |
|
Definition
A list of user or group accounts whose passwords should be stored on a particular Read-Only Domain Controller (RODC) or should not be stored on the specific RODC. |
|
|
Term
|
Definition
A mechanism to set up load balancing between multiple servers that are advertising the same SRV records. Clients will always use the record with the lowest numbered priority first. The will only use an SRV record with a higher-number priority if the lower-numbered priority record is unavailable. |
|
|
Term
restartable Active Directory |
|
Definition
Feature that enables administrators to place the NTDS.DIT file in an offline mode without rebooting the domain controller outright. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
Zone that answer queries in which a client provides an IP address and DNS resolves the IP address to a hostpage. |
|
|
Term
|
Definition
The process of removing records that were not refreshed or updated within specified time intervals. |
|
|
Term
|
Definition
A special installation option that creates a minimal environment for running only specific services and roles. Server Core runs without the Windows Desktop shell, which means that it must be administered exclusively from the command line or using Group Policy. This feature was introduced in Windows Server 2008. |
|
|
Term
|
Definition
A unility that enables ainistrators to view any other roles the server might be performing. The Server Manager utility launches automatically at startup after the Initial Configuration Tasks utility is closed. It can be accessed manually through the shortcut provided in the Administrative Tools folder or directly from the Start menu. |
|
|
Term
|
Definition
To begin the Active Directory installation at a central location, such as a data center, and then allow a local administrator to complete the configuration. |
|
|
Term
|
Definition
A shared folder that exists on all domain controllers and is used to store Group Policy Objects, login scripts, and other files that are replicated domain-wide. |
|
|
Term
|
Definition
The length of time a record is valid., after which it needs to be reregistered. |
|
|
Term
|
Definition
Running dcpromo from the command line using a specially formatted text file to specify the necessary installation options. |
|
|
Term
|
Definition
A relative weighting for SRV records that have the same priority. For exampl, consider three SRV records with the same priority with relative weights of 60, 20 and 20. Because 60 + 20 + 20 +100, the record with the weight of 60 will be used 60/100, or 60%, of the time, whereas each of the other two records will be used 20/100, or 20 percent, of the time. |
|
|
Term
|
Definition
The process fo replicating DNS information from the DNS server to another. |
|
|
Term
|
Definition
Each replication transaction does not need to complete before another can start because the transaction can be stored until the destination server is available. |
|
|
Term
|
Definition
The server at each site that acts as a gatekeeper in managing site-to-site replication. This allows intersite replication to update only one domain controller within a site. After a xxxxxxxx is updated, it updates the remainder of its domain controller partners with the newly replicated information. |
|
|
Term
|
Definition
Method used by domain controllers to inform one another of when changes need to be replicated. Each domain controller will hold a change for 45 seconds before forwarding it, after which it will transmit the change to each of its replication partners in 3 second intervals. |
|
|
Term
|
Definition
To reduce the size of transmitted data to decrease the use of network bandwidth. |
|
|
Term
|
Definition
The link, created by the Knowledge Consistency Checker, between domain controllers that replicate with one another in a site. |
|
|
Term
|
Definition
The amount of time required for replication so that all domain controllers in the environment contain the most up-to-date information. |
|
|
Term
|
Definition
Value assigned to a site link object to define the push that relication will take. If more than one path can be used to replicate information, cost assignments will determine which path is chosen first. A lower-numbered cost value. |
|
|
Term
|
Definition
A command-line tool used for monitoring Active Directory. |
|
|
Term
dual counter-rotating ring |
|
Definition
Created by the Knowledge Consistency Checker for the replication path. If one domain controller in the ring fails, traffic is routed in the opposite direction to allow replication to continue. |
|
|
Term
|
Definition
A value assigned to a site link that determines how often information will be replicated over the site link. |
|
|
Term
|
Definition
Classless Inter-Domain Routing Form of notation that shows the number of bits being used for the subnet mask. For example, for an IP address of 192.168.64.0 with a mask of 255.255.255.0, the CIDR representation would be 192.168.64.0/24. |
|
|
Term
|
Definition
Intersite Topology Generator A process that selects a bridgehead server and maps the topology to be used for intersite replication. |
|
|
Term
|
Definition
linked-value replication An improvement to replication that is available for use after the forest functional level has been raised to Windows Server 2003 or higher, enabling a single membership change to a group to trigger the replication of only this change to each member in the list, rather than the entire membership list. |
|
|
Term
|
Definition
Remote Procedure Calls over Internet Protocol Default protocol used for all replication traffic. |
|
|
Term
|
Definition
Simple Mail Transport Protocol Transport protocol used for intersite replication when a direct or reliable IP connection is unavailable. |
|
|
Term
|
Definition
update sequence number A local value, maintained by each domain controller, that tracks the changes that are made at each DC, thus tracking which updates should be replicated to other domain controllers. |
|
|
Term
|
Definition
The process of replicating Active Directory information between domain controllers within a site. |
|
|
Term
|
Definition
The process of replicating Active Directory information from one site to another. |
|
|
Term
preferred bridgehead servers |
|
Definition
The administrator's list of servers to be used as bridgehead servers. A bridgehead server is the server at each site that acts as a gatekeeper in managing site-to-site replication. |
|
|
Term
|
Definition
A command-line tool that can check replication sonsistency between replication partners, monitor replication status, display replication metadata, and force replication events and Knowledge Consistency Check (KCC) recalculation. |
|
|
Term
|
Definition
Servers that inform each other when updates are necessary. The Knowledge Consistency Checker (KCC) selects one or more replication partners for each domain controller in the site. |
|
|
Term
|
Definition
Defines the path used by replicatin traffic. |
|
|
Term
|
Definition
Determines the time when a site link object is available to replicate information. |
|
|
Term
|
Definition
Defines a chain of site links by which domain controllers from different sites can communicate. |
|
|
Term
|
Definition
A connection between two or more sites that enables intersite replication |
|
|
Term
|
Definition
An attribute set on an object to indicate when it was last updated. Timestamps are used to assist in the resolution of conflicts during replication. If a change was made to an attribute of the same object, the timestamp can help determine which object is the most up-to-date. |
|
|
Term
|
Definition
Default characteristic of site links that use the same transport protocol. A domain controller inany site can connect to a domain controller in any other site by navigating a chain of site links. |
|
|
Term
|
Definition
The change will be placed at the "beginning of the line" and it will be applied before any other changes that are waiting to be replicated. |
|
|
Term
|
Definition
A value associated with each Active Directory attribute that keeps track of how many times that attribute has been changed. |
|
|
Term
|
Definition
The network infrastructure between sites defined by fast and reliable IP subnets. |
|
|
Term
What is a Certificate Revocation List (CRL) ? |
|
Definition
A Certificate Revocation List (CRL) is a digitally signed list of unexpired certificates that a particular CA has revoked. |
|
|
Term
AD CS supports two types of CRLs ? |
|
Definition
The AD CS supports two types of CRLs. _x000D_ _x000D_ A Base CRL is a full, initial set of revoked certificates. _x000D_ _x000D_ A Delta CRL lists only certificates that have been revoked since the last full Base CRL was implemented. |
|
|
Term
|
Definition
CRL Distribution Point (CDP) |
|
|
Term
What is a CRL Distribution Point (CDP) ? |
|
Definition
A CRL Distribution Point (CDP) is a certificate extension that indicates where the CRL for a particular CA can be retrieved. |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
Using CDPs enables PKI administrators to locate and access a relevant CRL so they can manually update the entries it contains. These entries are valid only for a specified time period. |
|
|
Term
|
Definition
Active Directory (AD) : You use the AD as the CDP to publish and store CRLs for enterprise CAs, which use certificate templates. PKI users can retrieve CRL data from an AD CDP using LDAP. _x000D_ _x000D_ Accessing CRLs via a directory service uses more bandwidth than accessing CRLs directly because it requires that every client be able to authenticate to every server. Directories must be linked so that results can be located and passed back to the requesting PKI client. _x000D_ _x000D_ A local directory: _x000D_ You use the local directory of a CA server as the CDP to store CRLs on standalone CAs, which don't require AD or use certificate templates. By default, standalone CAs hold all certificate requests in a pending queue until a CA approves them. _x000D_ _x000D_ PKI users can access CRL data in a local directory via the Internet or an extranet, using HTTP or FTP. |
|
|
Term
|
Definition
Online Certificate Status Protocol |
|
|
Term
|
Definition
The OCSP enables you to manage and distribute the revocation status of a certificate via the Online Responder service. |
|
|
Term
|
Definition
you use the OCSP to submit a certificate status request to an Online Responder. The Online Responder service uses the OCSP to issue a digitally signed certificate status response, based on the CRLs that are provided to it by CAs. |
|
|
Term
configure an Online Responder |
|
Definition
You can use the following sets of properties to configure an Online Responder: _x000D_ _x000D_ Web Proxy _x000D_ Audit _x000D_ Security |
|
|
Term
To validate whether AD replicated fine between to DCs run command ? |
|
Definition
|
|
Term
If users at a Branch are to log onto a Domain using RODC ? |
|
Definition
Password Replication Policy should be configured. |
|
|
Term
|
Definition
Active Directory Certificate Services |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
|
Definition
Certification Authorities |
|
|
Term
|
Definition
A CA is used to issue digital certificates and the directories are used to store policies and certificates. |
|
|
Term
|
Definition
Certificate Revocation List |
|
|
Term
|
Definition
A CRL is a digitally signed list of unexpired certificates revoked by a CA. |
|
|
Term
What are Certificate Templates ? |
|
Definition
Certificate templates give instructions to users about procedures for creating and submitting a valid certificate request. This is an essential part of an enterprise CA and enables an administrator to recognize, configure, and issue certificates that have been pre-configured for selected tasks. |
|
|
Term
Where are Certificate templates stored ? |
|
Definition
Certificate templates are stored in Active Directory Domain Services (AD DS). _x000D_ _x000D_ This enables them to be used by all CAs in a forest and ensures that the CAs have access to the current standard templates. |
|
|
Term
Benefits of using Certificate Templates ? |
|
Definition
consistent application of the certificate policy across the forest. _x000D_ _x000D_ There are default templates that can be used. |
|
|
Term
Default Certificate Templates Available are ? |
|
Definition
Computer _x000D_ Cross Certification Authority _x000D_ Directory Email Replication _x000D_ CEP Encryption _x000D_ Code Signing _x000D_ Domain Controller _x000D_ Domain Controller Authentication _x000D_ EFS Recovery Agent |
|
|
Term
How many versions of Certificate Templates are available ? |
|
Definition
Version 1 _x000D_ Version 2 _x000D_ Version 3 |
|
|
Term
Explain Version 1 certificate Template ? |
|
Definition
Version 1certificate templates are available in a Windows Server 2000 PKI. When a CA is installed, these templates are created by default and cannot be removed or modified. However, you can create a duplicate copy of a version 1 template and change it to a modifiable version 2 or version 3 template. _x000D_ _x000D_ Version 1 templates are supported by CAs configured for Windows Server 2000 and Windows Server 2003 Standard Edition, which only support version 1 templates. |
|
|
Term
Explain Version 2 certificate Template ? |
|
Definition
Version 2 certificate templates enable you to customize the settings and permissions of a template based on your needs. These templates are only issued by Enterprise CAs installed on Windows Server 2003 Enterprise Edition or higher. |
|
|
Term
Explain Version 2 certificate Template ? |
|
Definition
Version 3 certificate templates enable an administrator to add the advanced Suite B cryptographic settings to their certificates. These settings contain advanced options for digital signatures, encryption, hashing, and key exchange. Administrators can only issue certificates based on version 3 certificate templates from CAs installed on Windows Server 2008 servers. These certificates can only be used on clients running Windows Server 2008 or Windows Vista. |
|
|
Term
Windows Server 2000 and Windows Server 2003 Standard Edition CAs support which version of certificate templates? |
|
Definition
|
|
Term
Windows Server 2003 Datacenter and Enterprise Edition CAs – support which version of certificate templates ? |
|
Definition
|
|
Term
Windows Server 2008 CAs support which version of certificate templates ? |
|
Definition
support for versions 1, 2, and 3 |
|
|
Term
What are the permissions that you can assign to a certificate template ? |
|
Definition
The permissions that you can assign to a certificate template are : _x000D_ _x000D_ Full Control _x000D_ Enroll _x000D_ Autoenroll _x000D_ Read _x000D_ Write |
|
|
Term
Note : Windows Server 2008 enables key archival and recovery to prevent potential loss of data that can result from the loss of a key. |
|
Definition
Note : This process enables a Key Recovery Agent (KRA) to retrieve private keys, original certificates, and public keys from a database. |
|
|
Term
|
Definition
|
|
Term
Note : Enterprise CAs can archive a user's private key in their database when certificates are issued. These private keys are encrypted and stored by a CA. |
|
Definition
Note :A private key can be recovered at a later time by using the private key archive. |
|
|
Term
How do you configure your environment for key archival ? |
|
Definition
To configure your environment for key archival, you will need to _x000D_ _x000D_ * configure a KRA certificate template and enroll the KRA for a KRA certificate _x000D_ _x000D_ * enable key archival for a CA |
|
|
Term
How do you configure a KRA certificate template ? |
|
Definition
you need to add the certificate template to a CA. _x000D_ _x000D_ _x000D_ If the certificate is configured with Read and Enroll permissions, the new KRA can use the Certificates snap-in and the Certificate Import Wizard to create a KRA certificate. _x000D_ _x000D_ If the certificate is configured with the Autoenroll permission, it will be issued automatically the next time the user logs on to the network |
|
|
Term
Restricted groups policy settings enable you to manage the membership of groups. |
|
Definition
Restricted groups policy settings enable you to manage the membership of groups. |
|
|
Term
Remember that _x000D_ Member Of settings are cumulative and that if GPOs use the Members setting, only the Members _x000D_ setting with the highest GPO processing priority will be applied, and its list of members will prevail. |
|
Definition
Remember that _x000D_ Member Of settings are cumulative and that if GPOs use the Members setting, only the Members _x000D_ setting with the highest GPO processing priority will be applied, and its list of members will prevail. |
|
|
Term
Delegating Administration Using Restricted Groups Policies with the _x000D_ Member Of Setting. |
|
Definition
In Group Policy Management Editor, navigate to Computer Configuration\Policies\ _x000D_ Windows Settings\Security Settings\Restricted Groups. |
|
|
Term
You want to add a group to the local Administrators group on computers without _x000D_ removing accounts that already exist in the group. Describe the restricted groups _x000D_ policy you should create. |
|
Definition
Create a restricted groups policy for the group you wish to add. Use the Member Of policy setting (This Group Is A Member Of) and specify Administrators |
|
|
Term
|
Definition
|
|
Term
|
Definition
Group Policy Management Console |
|
|
Term
|
Definition
Group Policy Management Editor |
|
|
Term
|
Definition
A policy setting can have three states: _x000D_ _x000D_ Not Configured, _x000D_ Enabled, _x000D_ and Disabled. |
|
|
Term
A single GPO can be linked to more than one site or OU. |
|
Definition
A single GPO can be linked to more than one site or OU. |
|
|
Term
What is the Scope of the GPO : Security Filters ? |
|
Definition
You can narrow the _x000D_ _x000D_ Security Filters that specify global security groups to which the GPO should or should not apply. |
|
|
Term
|
Definition
Windows Management Instrumentation |
|
|
Term
What do Windows Management Instrumentation (WMI) filters do for the scope of a GPO ? |
|
Definition
Windows Management Instrumentation (WMI) filters that specify a scope, _x000D_ using characteristics of a system such as operating system version or free disk space. |
|
|
Term
|
Definition
|
|
Term
What is the Resultant Set of Policy (RSoP) ? |
|
Definition
Users or Computers are likely to be within the scope of multiple GPOs linked to the sites, domain, or OUs in which the users or computers exist. _x000D_ _x000D_ This leads to the possibility that policy settings might be configured differently in multiple GPOs. _x000D_ _x000D_ You must be able to understand and evaluate the Resultant Set of Policy (RSoP), which determines the settings that are applied by a client when the settings are configured divergently in more than one GPO. |
|
|
Term
Refresh settings for Policy settings in the Computer Configuration node ? |
|
Definition
Policy settings in the Computer Configuration node are applied at _x000D_ system startup and every 90–120 minutes thereafter. |
|
|
Term
Policy Refresh settings User Configuration policy settings ? |
|
Definition
User Configuration policy settings are _x000D_ applied at logon and every 90–120 minutes thereafter. |
|
|
Term
Manual Refresh of Group policy settings is done using ? |
|
Definition
gpupdate.exe _x000D_ /force _x000D_ /logoff _x000D_ /target: { computer | user } _x000D_ /wait: value _x000D_ /boot |
|
|
Term
What are the tools associated with Group Policy Updation ? |
|
Definition
Gpupdate _x000D_ Secedit _x000D_ FLEX COMMAND _x000D_ _x000D_ FLEX COMMAND: Help in group updates of workstation. It can be applied directly to OUs etc |
|
|
Term
|
Definition
|
|
Term
Security settings are reapplied every 16 hours even if a GPO has not changed. |
|
Definition
Security settings are reapplied every 16 hours even if a GPO has not changed. |
|
|
Term
Always Wait For Network At Startup And Logon policy setting |
|
Definition
Without this setting, by default, Windows XP and Windows Vista clients perform only background refreshes, meaning that a client might start up and a user might log on without receiving the latest policies from the domain. |
|
|
Term
|
Definition
Group Policy Software Installation |
|
|
Term
startup,logon, logoff, and shutdown scripts will not run _x000D_ if the user is disconnected from the Enterprise Network. |
|
Definition
startup,logon, logoff, and shutdown scripts will not run _x000D_ if the user is disconnected from the Enterprise Network. |
|
|
Term
If a user is disconnected from the Enterprise network does group policy still apply itself ? |
|
Definition
Yes, The previously applied group policy settings are still applied. |
|
|
Term
The local GPO exists whether or not _x000D_ the computer is part of domain, workgroup, _x000D_ or a non-networked environment. |
|
Definition
The local GPO exists whether or not _x000D_ the computer is part of domain, workgroup, _x000D_ or a non-networked environment. |
|
|
Term
By default, only the Security Settings policies _x000D_ are configured on a system’s local GPO. _x000D_ _x000D_ All other policies are set at Not Configured |
|
Definition
By default, only the Security Settings policies _x000D_ are configured on a system’s local GPO. _x000D_ _x000D_ All other policies are set at Not Configured |
|
|
Term
When AD DS is installed, _x000D_ two default GPOs are created _x000D_ _x000D_ â– Default Domain Policy _x000D_ â– Default Domain Controllers Policy |
|
Definition
â– Default Domain Policy : This GPO is linked to the domain and has no security group or WMI filters. _x000D_ _x000D_ â– Default Domain Controllers Policy : This GPO is linked to the Domain Controllers OU. Because computer accounts for domain controllers are kept exclusively in the Domain Controllers OU, and other computer accounts should be kept in other OUs, this GPO affects only domain controllers. |
|
|
Term
|
Definition
globally unique identifier |
|
|
Term
By default, when Group Policy refresh occurs, the CSEs apply settings in a GPO only if the GPO has been updated |
|
Definition
By default, when Group Policy refresh occurs, the CSEs apply settings in a GPO only if the _x000D_ GPO has been updated |
|
|
Term
Describe the default Group Policy processing behavior, including refresh intervals and CSE application of policy settings |
|
Definition
Every 90–120 minutes, the Group Policy Client service determines which GPOs are scoped to the user or computer and downloads any GPOs that have been updated, based on the GPOs’ version numbers. _x000D_ _x000D_ CSEs process the policies in the GPOs according to their policy processing configuration. _x000D_ _x000D_ By default, most CSEs apply policy settings only if a GPO has been updated. _x000D_ _x000D_ Some CSEs also do not apply settings if a slow link is detected. |
|
|
Term
|
Definition
Directory Replication Agent |
|
|
Term
|
Definition
The GPC is an Active Directory object stored in the Group Policy Objects container _x000D_ within the domain naming context of the directory. Like all Active Directory objects, each GPC _x000D_ includes a globally unique identifier (GUID) attribute that uniquely identifies the object _x000D_ within Active Directory. The GPC defines basic attributes of the GPO, but it does not contain _x000D_ any of the settings. The settings are contained in the GPT, a collection of files stored in the SYSVOL _x000D_ of each domain controller in the %SystemRoot%\SYSVOL\Domain\Policies\GPO GUID _x000D_ path, where GPO GUID is the GUID of the GPC. When you make changes to the settings of a _x000D_ GPO, the changes are saved to the GPT of the server from which the GPO was opened |
|
|
Term
Scripting Languages that can be used to write code for Group Policy in Windows Server 2008 |
|
Definition
Microsoft Visual Basic, Scripting Edition (VBScript), Microsoft JScript, Perl, and Microsoft MS DOS style batch files (.bat and .cmd). |
|
|
Term
GPO is actually two components: a _x000D_ Group Policy Container (GPC) _x000D_ and Group Policy Template (GPT) |
|
Definition
GPO is actually two components: a _x000D_ Group Policy Container (GPC) _x000D_ and Group Policy Template (GPT) |
|
|
Term
|
Definition
Knowledge Consistency Checker |
|
|
Term
How is Group Policy Container GPC of GPO replicated ? |
|
Definition
The GPC in Active Directory is replicated by the Directory Replication Agent (DRA) using a topology generated by the Knowledge Consistency Checker (KCC). |
|
|
Term
The GPT in the SYSVOL is replicated using one of two technologies. _x000D_ _x000D_ The File Replication Servicev(FRS) is used to replicate SYSVOL in domains running Windows Server 2008, Windows _x000D_ Server 2003, and Windows 2000. _x000D_ _x000D_ If all domain controllers are running Windows Server 2008, you can configure SYSVOL replication, using Distributed File System Replication (DFS-R), a much more efficient and robust mechanism. |
|
Definition
The GPT in the SYSVOL is replicated using one of two technologies. _x000D_ _x000D_ The File Replication Servicev(FRS) is used to replicate SYSVOL in domains running Windows Server 2008, Windows _x000D_ Server 2003, and Windows 2000. _x000D_ _x000D_ If all domain controllers are running Windows Server 2008, _x000D_ you can configure SYSVOL replication, using Distributed File System Replication (DFS-R), a much more efficient and robust mechanism. |
|
|
Term
What does the Group Policy Verification Tool Gpotool.exe do ? |
|
Definition
Gpotool.exe is used to troubleshoot GPO status, _x000D_ including problems caused by the replication _x000D_ of GPOs, leading to inconsistent versions of a GPC and GPT |
|
|
Term
In both the Computer Configuration and User Configuration nodes, _x000D_ the Administrative Templates node contains _x000D_ registry-based Group Policy settings. |
|
Definition
In both the Computer Configuration and User Configuration nodes, _x000D_ the Administrative Templates node contains _x000D_ registry-based Group Policy settings. |
|
|
Term
Policies in the Administrative Templates node in the Computer Configuration node modify _x000D_ registry values in the HKEY_LOCAL_MACHINE (HKLM) k |
|
Definition
Policies in the Administrative Templates node in the Computer Configuration node modify _x000D_ registry values in the HKEY_LOCAL_MACHINE (HKLM) k |
|
|
Term
Policies in the Administrative Templates node in the _x000D_ User Configuration node modify registry values in the HKEY_CURRENT_USER (HKCU) key. |
|
Definition
Policies in the Administrative Templates node in the _x000D_ User Configuration node modify registry values in the HKEY_CURRENT_USER (HKCU) key. |
|
|
Term
ADM and ADMX/ADML administrative templates can coexist. _x000D_ These are administrative templates files |
|
Definition
ADM and ADMX/ADML administrative templates can coexist. _x000D_ These are administrative templates files |
|
|
Term
Another new Group Policy feature in Windows Server 2008 is starter GPOs. _x000D_ A starter GPO contains Administrative Template settings |
|
Definition
Another new Group Policy feature in Windows Server 2008 is starter GPOs. _x000D_ A starter GPO contains Administrative Template settings |
|
|
Term
Starter GPOs can contain only Administrative Templates policy settings. |
|
Definition
Starter GPOs can contain only Administrative Templates policy settings. |
|
|
Term
You can centralize the management of administrative templates by creating a central store |
|
Definition
You can centralize the management of administrative templates by creating a central store |
|
|
Term
Windows Server 2008 also adds the ability to attach comments to GPOs and policy settings |
|
Definition
Windows Server 2008 also adds the ability to attach comments to GPOs and policy settings |
|
|
Term
1. Litware, Inc., has three business units, _x000D_ each represented by an OU in the litwareinc.com domain. _x000D_ The business unit administrators want the ability to manage Group Policy for the users and computers in their OUs. Which actions do you perform to give the administrators the ability to manage Group Policy fully for their business units? (Choose all _x000D_ that apply. Each correct answer is a part of the solution.) _x000D_ _x000D_ A. Copy administrative templates from the central store to the Policy Definitions folder on the administrators’ Windows Vista workstations. _x000D_ _x000D_ B. Add business unit administrators to the Group Policy Creator Owners group. _x000D_ _x000D_ C. Delegate Link GPOs permission to the administrators in the litwareinc.com domain. _x000D_ _x000D_ D. Delegate Link GPOs permission to the each business unit’s administrators in the business unit’s OU. |
|
Definition
1. Correct Answers: B and D _x000D_ _x000D_ A. Incorrect: The central store is used to centralize administrative templates so that they do not have to be maintained on administrators’ workstations. _x000D_ _x000D_ B. Correct: To create GPOs, the business unit administrators must have permission to access the Group Policy Objects container. By default, the Group Policy Creator Owners group has permission, so adding the administrators to this group will _x000D_ allow them to create new GPOs. _x000D_ _x000D_ C. Incorrect: Business unit administrators require permission to link GPOs only to their business unit OU, not to the entire domain. Therefore, delegating permission to link GPOs to the domain grants too much permission to the administrators. _x000D_ _x000D_ D. Correct: After creating a GPO, business unit administrators must be able to scope the GPO to users and computers in their OU; therefore, they must have the Link GPOs permission. |
|
|
Term
You are an administrator at Contoso, Ltd. At a recent conference, you had a conversation _x000D_ with administrators at Fabrikam, Inc. You discussed a particularly successful set of configurations _x000D_ you have deployed using a GPO. The Fabrikam administrators have asked _x000D_ you to copy the GPO to their domain. Which steps can you and the Fabrikam administrators _x000D_ perform? _x000D_ A. Right-click the Contoso GPO and choose Save Report. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Import. _x000D_ B. Right-click the Contoso GPO and choose Back Up. Right-click the Group Policy _x000D_ Objects container in the Fabrikam domain and choose Restore From Backup. _x000D_ C. Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Paste. _x000D_ D. Right-click the Contoso GPO and choose Back Up. Create a GPO in the Fabrikam _x000D_ domain, right-click it, and choose Import Settings. |
|
Definition
Correct Answer: D _x000D_ A. Incorrect: A saved report is an HTML or XML description of a GPO and its settings. _x000D_ It cannot be imported into another GPO. _x000D_ B. Incorrect: The Restore From Backup command is used to restore a GPO in its _x000D_ entirety. _x000D_ C. Incorrect: You cannot paste settings into a GPO. _x000D_ D. Correct: You can import settings to an existing GPO from the backed-up settings _x000D_ of another GPO. |
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is a single Active Directory domain in the _x000D_ company network. Windows Server 2008 is run by all domain controllers that are configured as DNS servers. A _x000D_ domain controller named DC01 has a standard primary zone for wiikigo.com. A domain controller named DC02 _x000D_ has a standard secondary zone for wiikigo.com. You have to make sure that the replication of the wiikigo.com _x000D_ zone is encrypted. You must not lose any zone data. So what action should you perform? _x000D_ _x000D_ A. The zone transfer settings of the standard primary zone should be configured. The Master Servers lists on _x000D_ the secondary zone should be modified. _x000D_ _x000D_ B. The interface that the DNS server listens on should be modified on both servers. _x000D_ _x000D_ C. The primary zone should be converted into an Active Directory-integrated zone. The secondary zone should _x000D_ be deleted. _x000D_ _x000D_ D. The primary zone should be converted into an Active Directory-integrated stub zone. The secondary zone _x000D_ should be deleted. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is an organizational unit named Production in _x000D_ your company. The Production organizational unit has a child organizational unit named R D. After a GPO _x000D_ named Software Deployment is created by you, you link it to the Production organizational unit. You create a _x000D_ shadow group for the R D organizational unit. You have to deploy an application to users in the Production _x000D_ organizational unit. You also need to make sure that the application is not deployed to users in the R D _x000D_ organizational unit. What are two possible ways to achieve this goal? _x000D_ _x000D_ A. In order to achieve this goal, security filtering on the Software Deployment GPO should be configured to _x000D_ Deny Apply group policy for the R D security group. _x000D_ _x000D_ B. In order to achieve this goal, the Enforce setting should be configured on the software deployment GPO. _x000D_ _x000D_ C. In order to achieve this goal, the Block Inheritance setting should be configured on the R D organizational _x000D_ unit. _x000D_ _x000D_ D. In order to achieve this goal, the Block Inheritance setting should be configured on the Production _x000D_ organizational unit. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. You have a domain controller named DC01. Windows _x000D_ Server 2008 is run by this domain controller. DC01 is configured as a DNS server for wiikigo.com. You have the _x000D_ DNS Server server role installed on a member server which is named Server01 and then you create a standard _x000D_ secondary zone for wiikigo.com. DC01 is configured as the master server for the zone. You have to make sure _x000D_ that Server01 receives zone updates from DC01. What action should you perform? _x000D_ _x000D_ A. The zone transfer settings for the wiikigo.com zone should be modified on DC01. _x000D_ _x000D_ B. The Server01 computer account should be added to the DNSUpdateProxy group. _x000D_ _x000D_ C. A conditional forwarder should be added on S01. _x000D_ 70-640 3D. The permissions of wiikigo.com zone should be modified on DC01. _x000D_ _x000D_ D. The permissions of wiikigo.com zone should be modified on DC01. |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There are two domain controllers named DC01 and _x000D_ DC02 in your company. All domain and forest operations master roles are hosted by DC01. _x000D_ A problem occurred that DC01 fails. _x000D_ Since you are the technical support, you are required to reinstall the operating system to rebuild DC01. In _x000D_ addition, you are required to have all operations master roles rollbacked to their original state. A metadate _x000D_ cleanup is performed and all references of DC01 are removed. Which action should be performed to achieve _x000D_ the goal? (Choose three from the options below, and then put them in a correct order) _x000D_ 1/ Operations master roles should be transferred from DC01 to DC02. _x000D_ 2/ Operations master roles should be transferred from DC02 to DC01. _x000D_ 3/ Operations master roles should be seized from DC01 to DC02. _x000D_ 4/ Operations master roles should be seized from DC02 to DC01 _x000D_ 5/ DC01 should be rebuilt as a replica domain controller. _x000D_ 6/ DC02 should be rebuilt as a domain controller. _x000D_ _x000D_ A. 3->5->2 _x000D_ B. 3->6->1 _x000D_ C. 4->5->2 _x000D_ D. 4->6->1 |
|
Definition
|
|
Term
You work as a technology specialist in an international company named Wiikigo. Your major job is to configure _x000D_ Windows Server 2008 Active Directory. And you are experienced in configuring the Active Directory _x000D_ infrastructure and maintaining Active Directory objects. There is an Active Directory forest in the company. Not _x000D_ all domain controllers in the forest are configured as Global Catalog Servers. One root domain and one child _x000D_ domain is contained in your domain structure. You modify the folder permissions on a file server that is in the _x000D_ child domain. You find that some Access Control entries start with S-1-5-21 and that no account name is listed. _x000D_ You have to list the account names. So what action should you perform? _x000D_ _x000D_ A. The schema should be modified to enable replication of the friendlynames attribute to the Global Catalog. _x000D_ _x000D_ B. The RID master role in the child domain should be moved to a domain controller that holds the Global _x000D_ Catalog. _x000D_ _x000D_ C. The infrastructure master role in the child domain should be moved to a domain controller that does not _x000D_ hold the Global Catalog. _x000D_ _x000D_ D. The RID master role in the child domain should be moved to a domain controller that does not hold the _x000D_ Global Catalog. |
|
Definition
|
|
Term
How would you delegate control of an AD OU to a user? |
|
Definition
- Right Click on OU _x000D_ - Delegate Control _x000D_ - Choose User _x000D_ - Choose the appropriate option _x000D_ - Finish |
|
|
Term
|
Definition
An Organizational Unit (OU) is similar to a folder that subdivides and organizes network resources within a domain. |
|
|
Term
What are the different types of OU? |
|
Definition
Parent OUs are OUs that contain other OUs. _x000D_ Child OUs are OUs within other OUs. |
|
|
Term
What organisational structures can you not apply GPO's to? |
|
Definition
|
|
Term
What is group policy inheritance? |
|
Definition
Through inheritance, settings applied to the domain or parent OUs apply to all child OUs and objects within those OUs. |
|
|
Term
What setting should be set at creation to prevent an AD OU being accidentally deleted? |
|
Definition
When you create an organizational unit, leave the Protect container from accidental deletion check box selected. This is the default. Other types of objects do not have this default setting and must be manually configured. |
|
|
Term
How would you delete an AD object that is protected from deletion? |
|
Definition
To delete on abject that is protected, first clear the Protect container from accidental deletion setting, then delete the object. |
|
|
Term
What is delegation of authority? |
|
Definition
Delegating authority is the assignment of administrative tasks, such as resetting passwords or creating new users, to appropriate users and groups. |
|
|
Term
What is the Builtin Default Container? |
|
Definition
The Builtin container holds default service administrator accounts and domain local security groups. These groups are pre-assigned permissions needed to perform domain management tasks. |
|
|
Term
What is the Computers default container? |
|
Definition
The Computers container holds all computers joined to the domain without a computer account. It is the default location for new computer accounts created in the domain. |
|
|
Term
What is the Domain Controllers detault container? |
|
Definition
The Domain Controllers OU is the default location for the computer accounts for domain controllers. |
|
|
Term
What is the LostAndFound default container? |
|
Definition
The LostAndFound container holds objects moved or created at the same time an Organizational Unit is deleted. Because of Active Directory replication, the parent OU can be deleted on one domain controller while administrators at other domain controllers can add or move objects to the deleted OU before the change has been replicated. During replication, new objects are placed in the LostAndFound container. |
|
|
Term
What is the NTDS Quotas default container? |
|
Definition
The NTDS Quotas container holds objects that contain limits on the number of objects users and groups can own. |
|
|
Term
What is the Program Data default container? |
|
Definition
The Program Data container holds application-specific data created by other programs. This container is empty until a program designed to store information in Active Directory uses it. |
|
|
Term
What is the System default container? |
|
Definition
The System container holds configuration information about the domain including security groups and permissions, the domain SYSVOL share, DFS configuration information, and IP security policies. |
|
|
Term
What is the Users default container? |
|
Definition
The Users container holds additional predefined user and group accounts (besides those in the Builtin container). Users and groups are pre-assigned membership and permissions for completing domain and forest management tasks. |
|
|
Term
What is special about AD containers? |
|
Definition
They are automatically created and cannot be deleted |
|
|
Term
What is special about the Domain Controllers OU |
|
Definition
It is the only default OU, and it can have a GPO applied, whereas the other default containers cannot have a GPO applied |
|
|
Term
How would you view hidden containers in AD Users and Computers? |
|
Definition
Click Advanced Features from the View menu |
|
|
Term
Which containers are hidden by default in AD Users and Computers? |
|
Definition
- LostAndFound _x000D_ - NTDS Quotas _x000D_ - Program Data _x000D_ - System |
|
|
Term
What is special about AD containers and how do they differ from OU's? |
|
Definition
They are automatically created and cannot have GPO's applied to them. |
|
|
Term
What is the SAM database? |
|
Definition
A local database that allows users to access local resources on the machine |
|
|
Term
What are the two types of user account? |
|
Definition
|
|
Term
What is a local user account? |
|
Definition
A local user account is created and stored on a local system and is not distributed to any other system. _x000D_ _x000D_ - Local user accounts are created with the Computer Management console. _x000D_ - The local Security Accounts Manager (SAM) manages the user account information. _x000D_ - Only local resources are accessible with local user accounts. |
|
|
Term
What is a domain user account? |
|
Definition
A domain user account is created and centrally managed through Active Directory, and is replicated between domain controllers in the domain. |
|
|
Term
How can domain user accounts be created? |
|
Definition
Domain user accounts are created with Active Directory Users and Computers, command line tools, and PowerShell. |
|
|
Term
What is unique to each domain user account? |
|
Definition
Each domain user account has a unique security identifier (SID) to identify the user. A user can log on to the domain from any computer that is a member of the domain and can access resources on that computer or on other computers for which the domain user account has permissions. |
|
|
Term
How can external users with email accounts be represented in AD? |
|
Definition
External users which need an e-mail account, can be represented through a contact object |
|
|
Term
What is a contact object? |
|
Definition
an account that does not have any security permissions. Users represented as contact objects cannot log on to the domain. Use contacts to add information about individuals, such as e-mail or phone number, to Active Directory. Applications, such as Exchange, can search for attributes of contact objects. |
|
|
Term
What is the user or logon name? |
|
Definition
The user or logon name is the name of the user account |
|
|
Term
What is the user principle name (UPN)? |
|
Definition
The User Principle Name (UPN) combines the user account name with the DNS domain name _x000D_ _x000D_ - The UPN format is also known as the SMTP address format. _x000D_ - The DNS domain name in the UPN is known as the UPN suffix. _x000D_ - By default, the domain that holds the user account is selected for the UPN suffix. However, you can configure different UPN suffixes to use instead of the domain name. |
|
|
Term
What is the LDAP Distinguished Name (DN)? |
|
Definition
The LDAP Distinguished Name (DN) references the domain and related container(s) where the object resides. It has three basic attributes: _x000D_ Domain Component (DC) _x000D_ Organizational Unit (OU) _x000D_ Common Name (CN) |
|
|
Term
What is the Relative Distinguished Name (RDN) |
|
Definition
The Relative Distinguished Name (RDN) is used to identify the object within its container. The RDN needs to be unique only within the object’s container. |
|
|
Term
When would you use the Ãœser cannot change password"option? |
|
Definition
when you want to maintain control over a Guest, service, or temporary account. For example, many applications use service accounts for performing system tasks. The application must be configured with the user account name and password. If you allow changing the user account password for the service account, you would also need to change the password within every application that uses that account. |
|
|
Term
How would you unlock an account? |
|
Definition
To unlock an account, go to the Account tab in the account object's Properties dialog box, and select the Unlock Account box. Resetting the password on the account also unlocks a user account. |
|
|
Term
What should you do if a user account is accidentally deleted? |
|
Definition
Restore it from backup rather than creating a new one with the same name. Creating a new account with the same name results in a user account with a different SID and will not automatically assume the permissions and memberships of the previously deleted account. |
|
|
Term
How would you add a User Principal Name (UPN) suffix to a forest? |
|
Definition
1) Open Active Directory Domains and Trusts. _x000D_ 2) Right-click Active Directory Domains and Trusts in the Tree window pane, then select Properties. _x000D_ 3) Type the new UPN suffix that you would like to add to the forest on the UPN Suffixes tab. _x000D_ 4) Click Add. _x000D_ 5) Click OK. |
|
|
Term
What is a computer account? |
|
Definition
A computer account is an Active Directory object that identifies a network computer. The account in Active Directory is associated with a specific hardware device |
|
|
Term
How would you prestage a computer account? |
|
Definition
From Active Directory Users and Computers, create a computer account. This process is called prestaging computer accounts. From the workstation, join the domain. The workstation will be associated with the computer account you created previously. |
|
|
Term
Where is the computer account created when you join a workstation to the domain? |
|
Definition
In the Computers built-in container |
|
|
Term
How would you control where computer accounts are placed when a computer joins the domain? |
|
Definition
Create computer account ahead of time (pre-stage them) |
|
|
Term
Which groups have permissions to create a computer account? |
|
Definition
- Account Operators _x000D_ - Domain Admins _x000D_ - Enterprise Admins |
|
|
Term
How many computers are the Authenticated Users group members allowed to join to the domain (from a workstation)? |
|
Definition
10 - this wil also create the computer account automatically if it doesn't already exist. This ability comes from the Add workstations to a domain user right. |
|
|
Term
How would you allow a specific user to join a specific computer to the domain? |
|
Definition
You can also allow specific users to join specific computers to a domain by selecting The following user or group can join this computer to a domain when creating the computer account. |
|
|
Term
How would you give other users permissions to create computer accounts in AD? |
|
Definition
By giving them the Create Computer Objects right over the Active Directory OU. This permission does not have a limit on the number of accounts that can be created. Note: You must grant this right to the domain or specific OUs. |
|
|
Term
Will a computer receive group policy settings once the computer account is created? |
|
Definition
No, the computer must be joined to the domain before it receives any GPO settings or AD receives any workstation-specific information |
|
|
Term
What commands can be used to create computer accounts from a command prompt or script? |
|
Definition
dsadd or netdom. (Use netdom join to jion a computer to the domain) |
|
|
Term
What establishes a secure channel between a computer and the domain controller? |
|
Definition
The computer password (authomatically generated when the computer joins the domain). |
|
|
Term
Where is the computer account password saved? |
|
Definition
On the local computer and in AD. BY default, it is changed every 30 days |
|
|
Term
What might cause a computer to fail to authenticate to the domain? |
|
Definition
If the two computer passwords (on the local machine and in AD) become unsychronised. _x000D_ _x000D_ This problem will also occur if you have rebuilt the computer, or if you are replacing the computer with another one using the same computer account name. |
|
|
Term
|
Definition
Local groups exist only on the local computer, and control access to local resources. |
|
|
Term
|
Definition
Domain groups exist in Active Directory, and can be used to control access to domain and local resources. In an Enterprise environment, you will work mainly with domain groups. |
|
|
Term
|
Definition
Active Directory groups have a group scope. The scope defines the potential group membership and the resource access that can be controlled through the group. The following table lists the different security group scopes and their membership and use. |
|
|
Term
What membership can a global group have? |
|
Definition
Global groups can contain members within the same domain. These include: _x000D_ _x000D_ - Global groups in the same domain (in native mode only). _x000D_ - Users and computers within the same domain. |
|
|
Term
What should a global group be used for? |
|
Definition
Use global groups to group users and computers within the domain who have similar access needs. |
|
|
Term
What membership can a domain local group have? |
|
Definition
Domain local groups can contain members from any domain in the forest. These include: _x000D_ _x000D_ - Domain local groups in the same domain (in native mode only). _x000D_ - Global groups within the forest. _x000D_ Universal groups within the forest (in native mode only). _x000D_ - Users and computers within the forest. |
|
|
Term
What membership can a universal group have? |
|
Definition
Universal groups can contain members from any domain in the forest. These include: _x000D_ _x000D_ - Universal groups within the forest. _x000D_ - Global groups within the forest. _x000D_ - Users and computers within the forest. |
|
|
Term
What resources can global groups permission? |
|
Definition
Global groups can be assigned permissions to resources anywhere in the forest. |
|
|
Term
What resources can domain local groups permission? |
|
Definition
Domain local groups can be assigned permissions within a domain. |
|
|
Term
What resources can universal groups permission? |
|
Definition
Universal groups can be assigned permissions to resources anywhere in the forest. |
|
|
Term
What should global groups be used for? |
|
Definition
Create global groups to organize users (e.g., Sales or Development). |
|
|
Term
What should domain local groups be used for? |
|
Definition
Create domain local groups representative of the domain controller resources to which you want to control access, and then assign permissions on the resource to the group. |
|
|
Term
What should universal groups be used for? |
|
Definition
Universal group membership should be relatively stable. For this reason, you should only add global or universal groups to universal groups. Avoid adding user accounts directly to universal groups. |
|
|
Term
What is a security group? |
|
Definition
A security group is one that can be used to manage rights and permissions. _x000D_ _x000D_ - Group members get the permissions that are granted to the group. _x000D_ - A security group represents an object with a security identifier (SID), which through the member attribute, collects other objects, such as users, computers, contacts, and other groups. |
|
|
Term
Which type of AD group should be used for assiging permissions? |
|
Definition
|
|
Term
What is a ditribution group? |
|
Definition
A distribution group is used to maintain a list of users and is typically used for sending e-mails to all group members. Distribution groups cannot be used for assigning permissions. |
|
|
Term
What happens if you convert a security group to a distribution group? |
|
Definition
This would remove the permissions assigned to the group. _x000D_ _x000D_ This could prevent or allow unwanted access. |
|
|
Term
How would you convert a global group to a domain local group? |
|
Definition
First convert to a universal group, then to a domain local. |
|
|
Term
Can you convert a global group nested in another global group into a universal group? |
|
Definition
No - a universal group cannot be a member of a global group |
|
|
Term
Can you make a universal group a member of a global group? |
|
Definition
|
|
Term
What happens when a group is deleted? |
|
Definition
All information about the group - including any permissions assigned - is deleted. |
|
|
Term
How can you recover a deleted group? |
|
Definition
- Re-create the group, add all the original group members, and reassign any permissions granted to the group. _x000D_ - Restore the group from a recent backup. |
|
|
Term
When are the default local groups created? |
|
Definition
During Windows installation |
|
|
Term
Can you rename or delete the default local groups? |
|
Definition
CAN rename them _x000D_ _x000D_ CANNOT delete them |
|
|
Term
What is the Administrators default local group? |
|
Definition
Members of the Administrators group have complete and unrestricted access to the computer, including every system right. The group contains the Administrator user account (by default) and any account designated as a computer administrator. |
|
|
Term
What is the Backup Operators default local group? |
|
Definition
Members of the Backup Operators group can back up and restore files (regardless of permissions), log on locally, and shut down the system. However, members cannot change security settings. |
|
|
Term
What is the User default local group? |
|
Definition
Members of the Users group: _x000D_ _x000D_ - Can use the computer but cannot perform system administration tasks and might not be able to run legacy applications. _x000D_ - Cannot share directories or install printers if the driver is not yet installed. _x000D_ - Cannot view or modify system files. |
|
|
Term
What group do "limited use"accounts become a member of automatically |
|
Definition
Users default local group |
|
|
Term
What is the Power Users default local group? |
|
Definition
Members of the Power Users group have no more user rights or permissions than a standard user account, by default. For legacy applications requiring the same Power User rights and permissions that were present in previous versions of Windows, administrators can apply a security template that enables the Power Users group to assume the same rights and permissions present in previous versions of Windows |
|
|
Term
What is the Guests default local group? |
|
Definition
Members of the Guests group have limited rights (similar to members of the Users group), such as shutting down the system. Members of the Guests group have a temporary profile created at log on, that is then deleted when the member logs off. |
|
|
Term
What is the Administrators default domain group? |
|
Definition
Full control over the computer, including every available right in the system (the only built-in account that automatically has all rights), including the Take ownership of files or other objects right. |
|
|
Term
What is the Server Operators default domain group? |
|
Definition
Log on locally, back up and restore files and directories, change the system time, and force a local or remote shutdown. Can also create and delete shared resources, format the hard disk, and start and stop some services. Abilities extend to domain controllers. |
|
|
Term
What is the Backup Operators default domain group? |
|
Definition
Back up, copy, and restore files on the computer (regardless of permissions). Log on to and shut down the computer. Cannot change security settings. |
|
|
Term
What is the Account Operators default domain group? |
|
Definition
Create, delete, and modify domain user accounts and groups. Cannot modify the Administrators group or any Operators groups. |
|
|
Term
What is the Guests default domain group? |
|
Definition
The domain Guest account is a member of this group. The group does not have any default rights. |
|
|
Term
What is the Network Configuration Operators default domain group? |
|
Definition
Change TCP/IP settings including changes on domain controllers. |
|
|
Term
What is the Print Operators default domain group? |
|
Definition
Create, share, manage, and delete printers on domain controllers. Manage Active Directory printer objects. Log on locally, add or remove device drivers, and shut down domain controllers. |
|
|
Term
What is the Users default domain group? |
|
Definition
Perform common tasks such as running applications, using local and remote printers, and locking workstations. By default, all domain members are members of this group. |
|
|
Term
Which default domain groups are created in the Built-In Container? |
|
Definition
Administrators _x000D_ Server Operators _x000D_ Backup Operators _x000D_ Account Operators _x000D_ Guests _x000D_ Network Configuration Operators _x000D_ Print Operators _x000D_ Users |
|
|
Term
What default domain groups are created in the Users container in AD? |
|
Definition
Domain Admins _x000D_ Domain Computers _x000D_ Comain Controllers _x000D_ Comain Guests _x000D_ Domain Users _x000D_ Enterprise Admins _x000D_ Schema Admins _x000D_ Read-Only Domain Controllers _x000D_ DHCP Administrators _x000D_ Cert Publishers |
|
|
Term
What is the Domain Admins default domain group? |
|
Definition
Full control over the domain. This group is a member of the Administrators group on all computers when they are joined to the domain. This means that members of the Domain Admins group can perform all tasks on any computer in the domain (including domain controllers). |
|
|
Term
What is the Domain Computers default domain group? |
|
Definition
Contains all computers that are a member of the domain. When you join a computer to the domain, it becomes a member of this group. |
|
|
Term
What is the Domain Controllers default domain group? |
|
Definition
Contains all domain controllers. When a computer is made a domain controller, it is added to this group. |
|
|
Term
What is the Domain Guests default domain group? |
|
Definition
Contains all domain guests. It does not have any default rights |
|
|
Term
What is the Domain Users default domain group? |
|
Definition
Contains all domain users. This group can be used to give access to all users in a domain. |
|
|
Term
What is the Enterprise Admins default domain group? |
|
Definition
Full control over all domains in the forest. This group is a member of the Administrators group on all computers in the forest, allowing them to perform any task on any computer in the forest. |
|
|
Term
What is the Schema Admins default domain group? |
|
Definition
Full control over the Active Directory schema. By default, the Administrator account is a member of this group. |
|
|
Term
What is the Read-Only Domain Controllers default domain group? |
|
Definition
Contains all members who have administrative access to the Read-Only Domain Controllers in the domain. |
|
|
Term
What is the DHCP Administrators default domain group? |
|
Definition
Contains all members who have administrative access to the DHCP service. |
|
|
Term
What is the Cert Publishers default domain group? |
|
Definition
Contains all members which are permitted to publish certificates to the directory. |
|
|
Term
Describe the AGDLP strategy |
|
Definition
A: Place user Accounts _x000D_ G: Into Global groups _x000D_ DL: Into Domain Local groups _x000D_ P: Assign Permissions to domain local groups |
|
|
Term
When is the AGDLP strategy used? |
|
Definition
Used in mixed mode domains and in native mode domains (does not use universal groups, which are also not available in mixed mode). |
|
|
Term
|
Definition
Nesting is the technique of making a group a member of another group. Using hierarchies of nested groups may make administration simpler--as long as you remember what permissions you have assigned at each level. |
|
|
Term
When is the AGUDLP strategy used? |
|
Definition
Used in native mode domains, when there is more than one domain, and you need to grant access to similar groups defined in multiple domains. |
|
|
Term
Describe the AGUDLP strategy |
|
Definition
A: Place user Accounts _x000D_ G: Into Global groups _x000D_ U: Into Universal groups _x000D_ DL: Into Domain Local groups _x000D_ P: Assign Permissions to domain local groups |
|
|
Term
When is the ALP strategy used? |
|
Definition
Used on workstations and member servers. _x000D_ _x000D_ ALP is best used in a workgroup environment, not in a domain. |
|
|
Term
Describe the ALP strategy |
|
Definition
A: Place user Accounts _x000D_ L: Into Local groups _x000D_ P: Assign Permissions to the local groups |
|
|
Term
When should universal groups be used? |
|
Definition
Universal groups should be used when you need to grant access to similar groups defined in multiple domains. It is best to add global groups to universal groups, instead of placing user accounts directly in universal groups. |
|
|
Term
What group should be used if both the users and resources are located in Multiple Domains? |
|
Definition
|
|
Term
What groups should not be used in a single domain design? |
|
Definition
|
|
Term
How can you start AD Users and Computers? |
|
Definition
- Server Manager _x000D_ - Administrative Tools (from the Control Panel or Start menu) _x000D_ - Running dsa.msc |
|
|
Term
|
Definition
Active Directory Service Interfaces Editor (ADSI Edit) acts as a low-level GUI editor for common administrative tasks such as adding, deleting, and moving objects. |
|
|
Term
What can you use ADSI Edit for? |
|
Definition
You can use ADSI Edit to query, view, and edit attributes that are not exposed through other MMC snap-ins (such as Active Directory Users and Computers). |
|
|
Term
What does the command ds add do? |
|
Definition
Dsadd creates a new object in Active Directory. |
|
|
Term
What does the command dsquery do? |
|
Definition
Dsquery finds objects that match the search criteria (allows a search through the whole forest). The command returns a list of objects that match the search criteria. Use Dsquery * to search all object types. |
|
|
Term
What does the Dsget command do? |
|
Definition
Dsget retrieves property information about an object. Use the -expand switch to show nested group membership for users. |
|
|
Term
What does the dsmod command do? |
|
Definition
Dsmod modifies or changes the properties of an object. |
|
|
Term
What does the dsrm command do? |
|
Definition
Dsrm removes (deletes) objects. Use the -subtree option to delete a container object and all objects below that object. |
|
|
Term
What does the movetree command do? |
|
Definition
Movetree moves an OU and its objects (it does not move computer objects). |
|
|
Term
What does the netdom command do? |
|
Definition
Netdom adds computer objects, joins a computer to a domain, and moves computer objects. |
|
|
Term
|
Definition
The Csvde command imports and exports Active Directory objects using a comma-separated list file. |
|
|
Term
|
Definition
Csvde can read existing information from Active Directory (export) or create new objects in Active Directory (import). |
|
|
Term
|
Definition
You cannot use Csvde to modify existing objects in Active Directory. |
|
|
Term
Will Csvde import passwords for user accounts? |
|
Definition
|
|
Term
What does the Ldifde command do? |
|
Definition
The Ldifde command imports, exports, modifies, and deletes objects in Active Directory using LDAP Data Interchange Format (LDIF) files. |
|
|
Term
What are some common uses for Ldifde? |
|
Definition
- Using Ldifde to export a set of Active Directory objects, modifying various attributes, and then re-importing the file to change the attributes. _x000D_ - Exporting or importing data that exists on non-Active Directory LDAP directories. |
|
|
Term
How can you manage passwords with Ldifde? |
|
Definition
Passwords are not exported with user accounts. You can change passwords for existing account with a .ldif file but you cannot create new user accounts with a password. |
|
|
Term
How would you export a user account and then import it with a password with Ldifde? |
|
Definition
1) Export the user accounts. The unicodePwd field will be blank. _x000D_ 2) Import the user accounts to create the accounts. The user accounts will be disabled, and the user will be forced to change the password at next logon. _x000D_ 3) Modify the .ldif file to change the operation to modify existing objects. Add a password for each user account and add entries to enable the account. _x000D_ 4) Run Ldifde using the file with the passwords to modify the existing user accounts. |
|
|
Term
What does the Ldp command do? |
|
Definition
The Ldp utility allows you to search for and view the properties of multiple Active Directory objects. It is a GUI-based, Windows Explorer-like utility with a scope pane on the left that is used for navigating through the Active Directory namespace, and a details pane on the right that is used for displaying results. |
|
|
Term
What is the Active Directory Migration Tool? |
|
Definition
The Active Directory Migration Tool (ADMT) is a GUI-based utility that helps you restructure your Active Directory organization or migrate objects from one domain to another. |
|
|
Term
Where can you move AD objects with ADMT? |
|
Definition
You can move objects to different domains within the same forest (intraforest), or to domains in other forests (interforest). |
|
|
Term
What must be in place for an interforest migration in ADMT? |
|
Definition
The target forest must trust the source forest. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Cscript C:\windows\system32\slmgr.vbs-ato |
|
|
Term
add server Core roles, components or features |
|
Definition
Ocsetup.exe <component> /switch |
|
|
Term
|
Definition
Active Directory Services Interface used by Windows PowerShell |
|
|
Term
|
Definition
The mechanism by which an identity is validated by comparing secrets such as passwords provided by the user or computer to secrets maintained in the identity store |
|
|
Term
|
Definition
|
|
Term
|
Definition
a command-line tool that imports or exports Active Directory objects from or to a comma-delimited text file. |
|
|
Term
|
Definition
Discretionary access control list |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
An administrative unit of Active Directory. With a domain , all domain controllers replicate information about objects such as users,, groups and computers in the domain |
|
|
Term
|
Definition
Most of the DS commands take two modifies after the command itself: the object type and the object's DN |
|
|
Term
|
Definition
creates an object in the directory IE dsadd user "user DN" -samid pre-windows 2000 logon name -pwd {Password | *} -mustchpwd yes |
|
|
Term
|
Definition
returns specified attributes of an object |
|
|
Term
|
Definition
Modifies specified attributes of an object |
|
|
Term
|
Definition
moves and object to a new container or OU |
|
|
Term
|
Definition
performs a query based on parameters provided at the command line and returns a list of matching objects |
|
|
Term
|
Definition
Removes and object, all objects in the subtree beneath a container object or both |
|
|
Term
|
Definition
the boundary of an instance of Active Directory. A forest contains one or more domains. All domains in the forest replicate the schema and configuration partitions of the directory. |
|
|
Term
|
Definition
the first domain created in a forest |
|
|
Term
|
Definition
A setting that determines which features of Active Directory are enabled within a domain or forest. The functional level limits the versions of Windows that can be used by domain controllers in a domain or forest. |
|
|
Term
global catalog or partial attribute set |
|
Definition
A partition of the Active Directory data store that contains a subset of attributes for every object in the Active Directory forest. The global catalog is used for efficient object queries and location. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A database of information regarding users, groups, computers, and other security principals. Attributes stored in an identity store include user names and passwords |
|
|
Term
|
Definition
Netdom join %computername% /domain: |
|
|
Term
|
Definition
A standard protocol used by Active Directory for authentication |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
Lightweight Directory Access Protocol Data Interchange Format is a draft internet standard for file format that can perform batch imports and exports of active directory objects including users. -i import -f filename to import to or from |
|
|
Term
|
Definition
Microsoft Management Console |
|
|
Term
|
Definition
A folder on a disk - a hierarchy that can be navigated Like a disk volume letter name or Mapped drive. |
|
|
Term
|
Definition
are administrative containers within Active Directory that are used to collect objects that share common requirements for administration, configuration or visibility. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Namespaces are created by providers, which can be thought of as drivers. Example file system has a provider as does the registry. Powershell can access and manipulate in the namespaces of those providers. |
|
|
Term
|
Definition
Windows Powershell namespaces from any provider can be represented as PSDrives Windows PowerShell automatically creates a PS Drive for each drive latter already defined by Windows |
|
|
Term
|
Definition
System Access Control List |
|
|
Term
|
Definition
Security Account Manager ID |
|
|
Term
|
Definition
a definition of the attributes and objects classes supported by Active Directory. |
|
|
Term
|
Definition
connect to the container (OU), create the object (user), populate its properties, (display name), commit the changes |
|
|
Term
set a static IPv4 configuration |
|
Definition
|
|
Term
|
Definition
An active Directory object that represents a portion of the network with reliable connectivity. Within a site, domain controllers replicate updates within seconds, and clients attempt to use the services within their site before obtaining the services from other sites |
|
|
Term
|
Definition
Transmission Control Protocol/Internet Protocol |
|
|
Term
|
Definition
Is a translator between .NET framework and Windows PowerShell. To connect to an active directory object, you submit an LDAP query string LDAP://OU=People,DC=contoso,dc=com" |
|
|
Term
|
Definition
User Principle Name The logon name plus the UPN suffix which by default is the domain to which you would logon ie: lflemingjm@hqda.army.mil Unique to entire forest. Email unique to the world! |
|
|
Term
|
Definition
Windows Management Interface |
|
|
Term
Which properties can be modified for multiple users simultaneously |
|
Definition
General, Account, Address, Profile, Organization Tabs |
|
|
Term
What are the distinctions between name of a user object and an account |
|
Definition
User Object Names sAMAccountName, User PrincipalName (UPN), display name and RDN. Account properties=an identity to which permissions and rights can be assigned. |
|
|
Term
sAMAcccountName Attribute |
|
Definition
(preWindows 2000 logo name) must be unique for the ENTIRE domain |
|
|
Term
|
Definition
Relative Distinguished Name of an object. Must be unique in an OU. |
|
|
Term
|
Definition
How users are listed in the GAL |
|
|
Term
|
Definition
Set objUser = GetObject"LDAP://UserDN") objUser.IsAccountLocked = False objUser.SetInfo() |
|
|
Term
|
Definition
the most important LDAP attribute CN="josephine fleming",ou=people,dc=contoso,dc=com |
|
|
Term
|
Definition
Security Identifier is created by the Windows 2000 security subsystem and assigned to security principal objects |
|
|
Term
|
Definition
in the context of programming or scripting, an action performed on an object. |
|
|
Term
|
Definition
In the context of programming or scripting, a data structure that represents a system resource. Objects expose properties or attributes, methods or actions. |
|
|
Term
|
Definition
Assignment of an administrative task.Delegation within Active Directory is achieved by modifying the DACL of an abject. |
|
|
Term
|
Definition
A view of Active Directory objects base on search criteria. |
|
|
Term
|
Definition
An IP (Internet Protocol) address isa 32 bit binary unique number identifier for a node or host connection on an IP network. usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. |
|
|
Term
Group policy Member Of setting |
|
Definition
Member of settings are cumulative |
|
|
Term
Group[ Policy by Members settings |
|
Definition
GPOs that use the Members setting, only the member setting with the highest GPO processing will be applied and its list of members will prevail, |
|
|
Term
|
Definition
A setting that configures the logging of security-related activities |
|
|
Term
|
Definition
An assignment of administrative responsibility. A grant of permission to perform an administrative task |
|
|
Term
Extensible Markup Language |
|
Definition
(XML) an abbreviated version of the Standard Generalized Markup Language (SGML) XML enables the flexible development of user-defined doc types, providing non-proprietary, persistent, and verifiable file format for the storage and transmission of text and data both on and off the Internet |
|
|
Term
|
Definition
A hardware or software product designed to isolate a system or network from another network. Traditionally used to protect a private network from intrusion from the Internet. A firewall inspects inbound or outbound packets or both and determines, based on rules, which packets to allow to the other side of the firewall. |
|
|
Term
|
Definition
The Primary access protocol for Active Directory. |
|
|
Term
|
Definition
used to configure the membership of groups, security settings, software management and auditing |
|
|
Term
|
Definition
Resultant Set of Policies |
|
|
Term
|
Definition
A Group Policy Object is, by itself, just a collection of configuration instructions that will be processed by the CSEs (Client Side Extensions) of computers. |
|
|
Term
|
Definition
Start of Authority, and important record type in the Domain Name System. |
|
|
Term
|
Definition
Check replication consistency between replication partners, monitor replication status, display replication metadata, force replication events and knowledge consistency checker recalculation |
|
|
Term
Will, the administrator for your organization, has decided to implement certificates for all of your internal users. What type of root certificate authority (CA) would he implement? |
|
Definition
|
|
Term
You are hired as a contractor for a new organization that has no network currently in place. You decide to implement an Active Directory domain and the Active Directory Domain Services (AD DS). Which of the follow are requirements to install Active Directory? |
|
Definition
|
|
Term
You have decided to implement certificate authority (CA) servers and you want all of your users to receive their certificates automatically without any user intervention. What two ways can you accomplish this goal? |
|
Definition
Autoenrollment _x000D_ GPO enrollment |
|
|
Term
What role provides Internet-based clients a secure identity access solution that works on both Windows and non-Windows operating systems? |
|
Definition
Active Directory Federation Services (AD FS) |
|
|
Term
You have decided to place DNS on a read-only domain controller (RODC). What type of DNS zone do you now have? |
|
Definition
|
|
Term
What AD role allows administrators to configure services for issuing and managing public key certificates, which help organizations implement network security? |
|
Definition
Active Directory Certificate Services (AD CS) |
|
|
Term
What role gives administrators the ability to enroll users into the certificate services program and allows for the issue and management of certificate requests? |
|
Definition
|
|
Term
You have decided to implement a certificate authority on your network. You have hired a third-party company to create and issue you the certificates you need to hand out to your Internet users. What type of certificate authority do you need to set up? |
|
Definition
Stand Alone Subordinate CA |
|
|
Term
Alexandria, the network administrator, has just hired a new junior administrator named Paige. Paige needs to be able to recover keys from the certificate authority server. What role does Alexandria need to give Paige so that she can recover keys? |
|
Definition
|
|
Term
What file outlines the set of rules that a Federation Service uses to recognize partners, certificates, account stores, claims, and the numerous properties that are associated with the Federation Service? |
|
Definition
|
|
Term
What is the Lightweight Directory Access Protocol (LDAP) directory service that allows directory-enabled applications to store and retrieve data without needing the dependencies AD DS requires? |
|
Definition
Active Directory Lightweight Directory Services (AD LDS) |
|
|
Term
You are the administrator of a network. Your company has decided to use server virtualization to help save money and add fault tolerance to your servers. What role-based utility is included with Windows Server 2008 making this possible? |
|
Definition
|
|
Term
Your manager has explained to you that due to security requirements, you need to secure documents and emails using Microsoft Office 2007 Enterprise. What service do you need to install to help secure documents and emails? |
|
Definition
Active Directory Rights Management Service (AD RMS) |
|
|
Term
Your company has one main location and five remote sites. One of the remote sites is having a problem with Active Directory and DNS being hacked into. What can you use to help solve this problem? |
|
Definition
Implement a _x000D_ Read-only domain controller and a _x000D_ Read-only DNS server |
|
|
Term
Your company has one main location and one remote site. The remote site is 300 miles from the main location and it has no IT staff on site. What type of domain controller can you install so that a normal user can have the rights to manage it? |
|
Definition
Read-only domain controller (RODC) |
|
|
Term
You have decided to implement a certificate authority on your network. You have hired a third-party company to create and issue you the certificates you need to hand out to your internal users. What type of certificate authority do you need to set up? |
|
Definition
Enterprise Subordinate CA |
|
|
Term
Your company has decided to install a certificate authority (CA). After you install the CA, you publish the certificate revocation list (CRL) to a central location for all CAs to use. What is this central location called? |
|
Definition
|
|
Term
Your company currently uses Windows Server 2008 domain controllers. Your company wants to use multiple account lockout policies depending on what department people are in. What does Windows Server 2008 offer so that you can do this? |
|
Definition
Fine-grained password policy |
|
|
Term
You have decided to implement certificate authority servers. You have routers located on your network. What component allows systems to receive a certificate even though they do not have an Active Directory account? |
|
Definition
Network Device Enrollment Service |
|
|
Term
What operations can you perform using the Active Directory Users And Computers tool if you need to reorganise AD based on an Organisation change? |
|
Definition
Rename an organizational unit _x000D_ Query for resources _x000D_ Rename a group _x000D_ Create a computer account |
|
|
Term
In order to restrict security for the Texas OU, you remove some permissions at that level. Later, a junior systems administrator mentions that she is no longer able to make changes to objects within the Austin OU (which is located within the Texas OU). What is the most likely cause? |
|
Definition
|
|
Term
Isabel wants to check for any objects that have not been properly replicated among domain controllers. If possible, she would like to restore these objects to their proper place within the relevant Active Directory domains. What 2 steps does she need to do to accomplish this? |
|
Definition
Select the Advanced Features item in the View menu _x000D_ Examine the contents of the LostAndFound folder using the Active Directory Users And Computers tool. |
|
|
Term
The domain contains over 200,000 objects and hundreds of OUs and takes a long time to load. _x000D_ What can you do to speed things up if you only want to view Computer objects? |
|
Definition
Use the Filter option in the Active Directory Users And Computers tool to restrict the display of objects. |
|
|
Term
Jane, a consultant, has recommended that the Windows NT 4 domains be consolidated into a single Active Directory domain. Which of the following statements provide a valid justification to support Jane's proposal? |
|
Definition
In general, OU structure is more flexible than domain structure. _x000D_ It is possible to create a distributed system administration structure for OUs by using delegation. |
|
|
Term
operations are represented as common tasks within the Delegation of Control Wizard? |
|
Definition
Reset passwords on user accounts. _x000D_ _x000D_ Manage Group Policy links. _x000D_ _x000D_ Modify the membership of a group. _x000D_ _x000D_ Create, delete, and manage groups. |
|
|
Term
New Helpdesk Op. How do you allow them to only change certain objects in the directory in certain OUs? |
|
Definition
Use the Delegation of Control Wizard to assign the necessary permissions on the OU that he or she is to administer. |
|
|
Term
You are planning an OU design. What 3 pieces of information should be considered or consulted? |
|
Definition
Business organizational requirements _x000D_ _x000D_ System administration requirements _x000D_ _x000D_ Security requirements |
|
|
Term
You want to allow the Super Users group to create and edit new objects within the Corporate OU. What option would you choose in the Delegation Wizard? |
|
Definition
Create A Custom Task To Delegate |
|
|
Term
A systems administrator is using the Active Directory Users And Computers tool to view the objects within an OU. He has previously created many users, groups, and computers within this OU, but now only the users are showing. What is a possible explanation for this? |
|
Definition
Filtering options have been set that specify that only User objects should be shown. |
|
|
Term
Two large AD Sites with 15 DCs each. Too much replication traffic between sites. What can you create at each site to reduce the bandwidth usage? |
|
Definition
Create preferred Bridgehead Servers at each site to funnel the traffic between 2 servers only. |
|
|
Term
What does not need to be manually created when you are setting up a replication scenario involving three domains and three sites? |
|
Definition
Connection objects. _x000D_ Automatically created by the Active Directory replication engine. |
|
|
Term
What services of Active Directory is responsible for maintaining the replication topology? |
|
Definition
Knowledge Consistency Checker service. |
|
|
Term
What Active Directory objects are responsible for representing a transitive relationship between sites? |
|
Definition
Site link bridges _x000D_ Default Transitive On. |
|
|
Term
______ is the protocol to use for links where the link is randomly unavailable and replication traffic must be sent whether the other end is connected or not. |
|
Definition
SMTP _x000D_ Uses Store and Forward method to ensure that information is not lost if a connection cannot be established. |
|
|
Term
You have 7 sites with different speed links. You want to keep the number of domains to a minimum. What is the smallest number of domains you can have that cover all 7 sites? |
|
Definition
|
|
Term
Changes to AD objects are only being replicated to some DCs and not all. Regarding the network links themselves what could be causing this problem? |
|
Definition
Network connectivity is unavailable _x000D_ A WAN connection has failed |
|
|
Term
Changes to AD objects are only being replicated to some DCs and not all because of a possible configuration problem with a DC or Sites. What are 4 of the possible errors that have been made? |
|
Definition
Connection objects are not properly configured. _x000D_ Sites are not properly configured. _x000D_ Site links are not properly configured _x000D_ One of the domain controllers is configured for manual replication updates. |
|
|
Term
A systems administrator suspects that there is an error in the replication configuration. How can he look for specific error messages related to replication? |
|
Definition
By going to Event Viewer -> Directory Service log |
|
|
Term
One site, 50 DCs. What the? _x000D_ How can replication traffic be reduced and controlled, and how can the structure of AD more accurately reflect the structure of the network? |
|
Definition
Create multiple site links. _x000D_ Configure one server at each of the new sites to act as a bridgehead server. |
|
|
Term
1. What tool do you use to: _x000D_ Determine replication data transfer statistics. _x000D_ 2. Collect information about multiple Active Directory domain controllers at the same time. _x000D_ 3. Measure other performance statistics, such as server CPU utilization. |
|
Definition
|
|
Term
What Active Directory objects should you modify to define the network boundaries for Active Directory sites? |
|
Definition
Subnets - Define AD Site boundaries. |
|
|
Term
|
Definition
v to disclose something secret _x000D_ _x000D_ • She believed she had been fired because she had threatened to divulge information about the company's mismanagement. _x000D_ _x000D_ • It is a basic tenet of most secret societies that members are not allowed to divulge anything about the initiation rites to outsiders. _x000D_ _x000D_ • His journal divulged a side of his personality that no one had ever seen. |
|
|
Term
Configure the costs for each link with these rules _x000D_ 1. ISDN must have default site cost link _x000D_ 2. Austin must use San Jose for replication |
|
Definition
The ISDN line is required to have the default cost of 100. That means that the T1 line's cost must be lower than 100 for this connection to be used by preference, and the only choice is 50. That leaves costs of 150 and 200 for the Austin links. Because Austin will never get replication information from Chicago, that link's cost should be 200. That only leaves 150 for the cost of the link between Austin and San Jose. |
|
|
Term
What is the default Site Link Cost? |
|
Definition
|
|
Term
You want to create a new site called San Jose. Where do you do this? |
|
Definition
AD S&S - Sites - New Site |
|
|
Term
Two sites connected via a T1 line and a dial up line for redundancy. _x000D_ You want to use the T1 line mainly. What do you do to ensure this occurs? |
|
Definition
Lower the cost of the T1 Line |
|
|
Term
Only 1 GC for 3 Sites. HQ with 100 users is connected to other 2 sites (each have 20 users) via fast T1 connections. Where would you place the GC? |
|
Definition
At HQ. _x000D_ Though ideally one GC per site. |
|
|
Term
How do you specify a server as a bridgehead server? |
|
Definition
AD S&S - DC properties - Select protocol- and click Add |
|
|
Term
The company has three domain controllers, each of which has Knowledge Consistency Checker (KCC) errors consistently popping up in the directory services Event Viewer log. What does this indicate? |
|
Definition
|
|
Term
You need to keep track of licensing with the licensing server. Where can you configure the licensing server so that as the system administrator you can ensure you are compliant? |
|
Definition
Configure licensing in the Active Directory Sites And Services tool. |
|
|
Term
You decide to create a trust relationship between Domain A and Domain B. Before you take any other actions, can users in Domain A use resources from Domain B yet? |
|
Definition
No. _x000D_ A trust relationship only allows for the possibility of sharing resources between domains; it does not explicitly provide any permissions. In order to allow users to access resources in another domain, you must configure the appropriate permissions. |
|
|
Term
Plans are to deploy four Active Directory domains with the following requirements: _x000D_ minimize the number of servers _x000D_ enough fault tolerance to survive the complete failure of one domain controller. _x000D_ What is the minimum number of domain controllers to deploy initially? |
|
Definition
8 _x000D_ Two per domain for fault tolerance |
|
|
Term
What server configurations can be directly promoted to become a domain controller for a new domain? |
|
Definition
Member servers _x000D_ Stand-alone servers |
|
|
Term
Server1: Schema Master _x000D_ Server2: RID Master _x000D_ Server3: Windows NT 4 BDC _x000D_ Server4: Infrastructure Master _x000D_ Server5: PDC Emulator Master _x000D_ Entire environment migrating to Windows Server 2008. Which Server not needed? |
|
Definition
Server3: Windows NT 4 BDC |
|
|
Term
Implicit trusts created between domains are known as ______ |
|
Definition
|
|
Term
Need to add field to the properties of a User object. _x000D_ On what servers can the change be made? |
|
Definition
The Schema Master is the only server within Active Directory on which changes to the schema can be made. |
|
|
Term
What are several Active Directory domains that share a contiguous namespace called? |
|
Definition
|
|
Term
Accidentally demoted the last domain controller of your ADTest.com domain. _x000D_ Want a complete undo. Possible? |
|
Definition
Once the last domain controller in an environment has been removed, there is no way to recreate the same domain. If adequate backups had been performed, you may have been able to recover information by rebuilding the server |
|
|
Term
Items that depend on the DNS namespace are .... |
|
Definition
Domains _x000D_ trees _x000D_ forests _x000D_ DNS zones |
|
|
Term
Which types of computers contain a copy of the Global Catalog (GC)? |
|
Definition
Specified Active Directory domain controllers |
|
|
Term
Which pieces of information should you have before you use the Active Directory Installation Wizard to install a new subdomain? |
|
Definition
name of the child domain _x000D_ name of the parent domain _x000D_ DNS configuration information _x000D_ NetBIOS name for the server |
|
|
Term
Which type of trust is automatically created between the domains in a domain tree? |
|
Definition
|
|
Term
A systems administrator wants to remove a domain controller from a domain. What is the easiest way to perform the task? |
|
Definition
Use the Active Directory Installation Wizard to demote the domain controller. |
|
|
Term
Regarding the sharing of resources between forests... |
|
Definition
A trust relationship must exist before resources can be shared between forests. |
|
|
Term
New remote location with very slow WAN link. Needs following specs: _x000D_ Fast logon times _x000D_ Reduced network bandwidth _x000D_ Ability to use existing hardware _x000D_ What can you implement to achieve the above requirements? |
|
Definition
Universal group membership caching stores information locally once a user attempts to log on for the first time. |
|
|
Term
Of the five main single master functions, two apply to an entire Active Directory forest. What are the three that apply to just the domain? |
|
Definition
RID Master _x000D_ PDC Emulator Master _x000D_ Infrastructure Master |
|
|
Term
When deploying Active Directory, you decide to create a new domain tree. What do you need to do to create this? |
|
Definition
Promote a Windows Server 2008 computer to a domain controller and select the option that makes this domain controller the first machine in a new domain that is a child of an existing one. |
|
|
Term
7 Reasons for Using Multiple Domains |
|
Definition
Scalability _x000D_ Reducing replication traffic _x000D_ Meeting Business needs hierarchy - easier data managment _x000D_ Decentralized administration _x000D_ Multiple DNS or domain namesLegality |
|
|
Term
What are some of the Drawbacks of Multiple Domains? |
|
Definition
Administrative inconsistency _x000D_ Increased management _x000D_ Decreased flexibility |
|
|
Term
Min Requirements for DC numbers |
|
Definition
|
|
Term
Recommended Req's for DC numbers |
|
Definition
|
|
Term
Reasons for adding extra DCs |
|
Definition
Fault tolerance and reliability _x000D_ Performance |
|
|
Term
Main requirement for joining a new domain to an existing forest |
|
Definition
Domain does not share a namespace with the existing Active Directory domain. |
|
|
Term
If you want to join a W2k8 server to an existing W2k3 Forest what do you need to do first? |
|
Definition
Prepare the domain by running: _x000D_ adprep /forestprep _x000D_ adprep /domainprep |
|
|
Term
What naming information do you need prior to joining a domain to a new tree? |
|
Definition
name of the parent domain _x000D_ name of the child domain _x000D_ NetBIOS name for the new server |
|
|
Term
What other information (other than the 3 names) do you need prior to joining a domain to a new tree? |
|
Definition
DNS configuration _x000D_ domain administrator username and password |
|
|
Term
DcPromo option selected to create a new domain tree. |
|
Definition
" makes this domain controller the first machine in a new domain that is a child of an existing domain" |
|
|
Term
DcPromo option selected to create a new domain tree. |
|
Definition
makes this domain controller the first machine in a new domain that is a child of an existing domain |
|
|
Term
3 Features common to all Domains in a Forest |
|
Definition
Schema _x000D_ GC _x000D_ Configuration Info |
|
|
Term
Type of trust between the Forest Root Domain and all the rest of the domains in the forest |
|
Definition
|
|
Term
How is a new Domain Tree created? |
|
Definition
Created top down - forest root domain - then child domains |
|
|
Term
How do you move a DC between domains? |
|
Definition
1. Demote it. _x000D_ 2. Move it. _x000D_ 3. Promote it |
|
|
Term
True of False? A Trust grants all users in one domain access to the other domains. |
|
Definition
False. _x000D_ Trust only provides the foundation. _x000D_ Rights must be granted to resources once Trust is established. |
|
|
Term
What 2 features of AD to ALL Trees and Forests share? |
|
Definition
Schema and _x000D_ Global Catalog |
|
|
Term
What do you always have even if you only have 1 Domain? |
|
Definition
|
|
Term
What do you need to ensure is done before you remove the last DC from a Domain? |
|
Definition
Computers no longer log on to this domain _x000D_ No user accounts are needed _x000D_ All encrypted data is decrypted _x000D_ All cryptographic keys are backed up |
|
|
Term
What are the 2 Forest Operation Master Roles? |
|
Definition
Schema Master _x000D_ Domain Naming Master |
|
|
Term
What tool is used to manage the Forest Operation Master roles? |
|
Definition
|
|
Term
What are the 3 Domain Operation master Roles? |
|
Definition
RID Master _x000D_ PDC Emulator Master _x000D_ Infrastructure Master |
|
|
Term
The Schema master holds ___ |
|
Definition
a master copy of the AD Schema |
|
|
Term
Where can changes to the AD Schema be made? |
|
Definition
Only on the Schema Master |
|
|
Term
The Domain Naming Master __ |
|
Definition
tracks domains within the AD Forest |
|
|
Term
What does the RID Master do? |
|
Definition
Creates a unique RID for every AD object |
|
|
Term
PDC Emulator is responsible for __ |
|
Definition
Maintaining backward compatibility with NT DCs - used only in Mixed Mode domains. |
|
|
Term
In a Forest running at 2k Native or later what role does the PDC play? |
|
Definition
Acts as default DC if another is not available |
|
|
Term
The Infrastructure Master ensures |
|
Definition
Ensures that group membership info stays current between DCs |
|
|
Term
How do you assign the Domain Naming Master Role? |
|
Definition
Open AD D&T _x000D_ AD D&T Properties _x000D_ Select Operations Master _x000D_ Click Change |
|
|
Term
How do you assign all of the RID, PDC and Infrastructure Roles? |
|
Definition
Open AD U _x000D_ right-click Domain _x000D_ Select Operation Masters _x000D_ Click Change |
|
|
Term
What is a transitive trust? |
|
Definition
Implied trusts. _x000D_ If domain A trusts domain B AND _x000D_ domain B trusts domain C THEN _x000D_ domain A trusts domain C |
|
|
Term
What are External Trusts used for? |
|
Definition
Used to provide access to external domain (NT) that can't use forest trusts |
|
|
Term
What type of trust are External Trusts? |
|
Definition
Non-transitive and either 1-way or 2-way (manually created) |
|
|
Term
On External Trusts, what is enabled by default to prevent hackers from using SID info to gain access? |
|
Definition
Default SID filtering _x000D_ SID History cleaned of SID history attributes that are not members of the trusted domain. |
|
|
Term
When is a Realm Trust used? |
|
Definition
Used to connect to non-Windows domain using Kerberos |
|
|
Term
What types of Realm Trusts are there? |
|
Definition
Either Transitive or Non-Transitive _x000D_ And either 1-way or 2-way |
|
|
Term
Where do you configure Trust Releationships? |
|
Definition
AD D&T - Domain Properties - Trusts Tab |
|
|
Term
What happens when Selective authentication is used with Cross Forest Trusts? |
|
Definition
users can't authenticate to DC or resource server unless explicitly enabled |
|
|
Term
What is a manually created Trust called? |
|
Definition
|
|
Term
What is a Cross Forest Trust used for? |
|
Definition
To Share resources between forests |
|
|
Term
What is the restriction on Cross Forest Trusts? |
|
Definition
They cannot be Non-transitive. |
|
|
Term
Where would you go to enable Selective Authentication? |
|
Definition
Trust properties - Selective Authentication |
|
|
Term
Where would you add a UPN suffix? |
|
Definition
AD D&T - Properties - UPN Suffixes |
|
|
Term
You need to add another Global Catalog server to an existing domain. Where would you go to do this? |
|
Definition
AD S&S _x000D_ - DC _x000D_ - NTDS Settings Properties _x000D_ - GC Checkbox |
|
|
Term
What happens when Universal Group Membership Caching is enabled on a W2k8 DC? |
|
Definition
1. User logs on - Universal Groups cached from GC _x000D_ 2. Next time user logs on - no need to contact GC |
|
|
Term
The benefits of Universal Group Membership Caching are: |
|
Definition
Faster logon times _x000D_ Reduced network bandwidth _x000D_ Ability to use existing hardware |
|
|
Term
On a W2k8 DC how do you enable Universal Group Membership Caching? |
|
Definition
AD S&S _x000D_ - Sites _x000D_ - DefaulFirstSite _x000D_ - NTDS Settings - Properties _x000D_ - checkbox |
|
|
Term
What forest and function levels does the network need for you to install RODC's? |
|
Definition
Windows 2003 functional Level or above |
|
|
Term
How many domains can a DC have or belong to at any one time? |
|
Definition
|
|
Term
Functional level if you have the following servers in your domain: _x000D_ 2003 server _x000D_ 2000 Server _x000D_ 2008 server |
|
Definition
|
|
Term
Which NTFS feature can you implement to limit the amount of disk space occupied by users? |
|
Definition
|
|
Term
What two steps need to be done to convert a disk volume from FAT to NTFS? |
|
Definition
|
|
Term
What 2 protocols are required to support AD? |
|
Definition
|
|
Term
Command used to promote or demote a DC? |
|
Definition
|
|
Term
Your organisation needs one set of credentials for multiple forests. What 2008 role do you install? |
|
Definition
|
|
Term
How do you test that DNS forward lookups are working properly prior to installing AD? |
|
Definition
ping hostname _x000D_ IP returned |
|
|
Term
What FS with these req's? _x000D_ file-level security _x000D_ efficient use of space on large partitions. _x000D_ domain controller Sysvol must be stored |
|
Definition
|
|
Term
You have decided that you must convert the system partition on your Windows Server 2008 from the FAT32 filesystem to NTFS. Which 2 steps must you take in order to convert the filesystem? |
|
Definition
CONVERT /FS:NTFS _x000D_ Reboot the computer |
|
|
Term
Name 3 protocols need for AD to work properly |
|
Definition
LDAP _x000D_ DNS _x000D_ TCP/IP |
|
|
Term
2 sites with non-communicative DCs. Names: _x000D_ server1.yourcompany.com and server1.yourcompany.com _x000D_ Problem? |
|
Definition
Yes each server needs a unique FQDN. |
|
|
Term
How can you increase the space on a volume without backup, recreate restoring? |
|
Definition
Use NTFS mounts to map new volume to existing volume. |
|
|
Term
What file system reqs exist for installation of AD? |
|
Definition
NTFS volume. _x000D_ Greater than 4GB |
|
|
Term
What 5 connectivity tests should you do prior to installing AD? (assume second site connected via VPN) |
|
Definition
Test NW adapater - drivers & config _x000D_ Check IPconfig _x000D_ Test Internet access _x000D_ Check LAN access _x000D_ Check Client Access _x000D_ Check WAN Access |
|
|
Term
How do you check the configuration of the TCP/IP protocol and output it to a text file? |
|
Definition
ipconfig /all > ipcfg.txt |
|
|
Term
What are the 3 forest functional levels in W2k8? |
|
Definition
2k Native (default) _x000D_ 2k3 _x000D_ 2k8 |
|
|
Term
5 New features in W2k8 Functional Level but not in W2k3? |
|
Definition
Fine-grained password policies. _x000D_ Read-only domain controller (RODC). _x000D_ Last interactive logon information. _x000D_ Advanced Encryption Services (AES 128 and 256) support for the Kerberos protocol. _x000D_ Distributed File System replication support for Sysvol. |
|
|
Term
What is a Defunct Schema Class? |
|
Definition
A Class of objects that has been marked as non-usable. |
|
|
Term
|
Definition
Provides way of querying names and IP addresses, replicating the info in the DB as well as the schema |
|
|
Term
Name 7 different common DNS records. |
|
Definition
SOA, NS, A, CNAME, PTR, MX, and SRV |
|
|
Term
|
Definition
Start of Authority Record. _x000D_ defines the general parameters for the DNS zone, including who the authoritative server is |
|
|
Term
|
Definition
Name Server _x000D_ list name servers for a domain; allow other name servers to look up names |
|
|
Term
|
Definition
Address Record for Host _x000D_ links hostname to ip address |
|
|
Term
|
Definition
Pointer Record. _x000D_ Links IP address to hostname for reverse lookups |
|
|
Term
|
Definition
Mail Exchange record _x000D_ Lists mail server who can accept mail for domain |
|
|
Term
|
Definition
Service record _x000D_ Maps service (eg DC ) to IP address |
|
|
Term
Name the 3 queries types when DNS is used to resolve names or IP's |
|
Definition
Iterative, Recursive, and Inverse |
|
|
Term
What is an Iterative query? |
|
Definition
Client asks Server. Server responds with best possible answer |
|
|
Term
What is a Recursive query? |
|
Definition
Client queries server, server doesn't know, asks each server up the line until answer is returned to client via server. |
|
|
Term
What is an Inverse query? |
|
Definition
Client queries IP address instead of name. |
|
|
Term
A zone used to resolve names to IP addresses is a _________? |
|
Definition
|
|
Term
A zone used to resolve IP addresses to names is a ________? |
|
Definition
|
|
Term
How do you create new zones? |
|
Definition
with the New Zone wizard. |
|
|
Term
Where do you configure a zone for Dynamic updates? |
|
Definition
Properties of the forward/reverse lookup zone - General Tab - Dynamic updates - None/Secure Only/Nonsecure and secure |
|
|
Term
What is the default setting for Dynamic updates |
|
Definition
|
|
Term
Name 5 tools used to troubleshoot DNS problems? |
|
Definition
DNS Snap-in _x000D_ DSS event log _x000D_ NSLookup _x000D_ Ipconfig _x000D_ DNS server log file |
|
|
Term
Multiple sites across Australia. _x000D_ Single AD tree required. _x000D_ What DNS and AD structures do you implement to ensure good performance? |
|
Definition
Install a DNS server at each regional location and create a single domain name for all the regions for resolution of local resources. |
|
|
Term
3 Unix DNS, print & fax servers. _x000D_ New AD domain with integrated DNS replaces Unix DNS server. _x000D_ Can't print or fax. What gives? |
|
Definition
You need to manually add A resource records for the Unix machines. |
|
|
Term
How do you configure a DNS server so that it only answers queries from hosts on your intranet and no where else? |
|
Definition
Configuring his server as a root server and leaving out root hints for the top-level domains _x000D_ And _x000D_ Leaving forwarding turned off |
|
|
Term
What must you do so that your customers can utilize all mirrored web servers? |
|
Definition
Enable Round Robin DNS to balance out the load across all the servers you have mirrored and configured in the DNS |
|
|
Term
You have multiple remote locations by slow satellite links.Need to install DNS into these offices so that clients can locate authoritative DNS servers in the main location. What type of DNS zones should be installed in the remote locations? |
|
Definition
Stub Zones - Contain: NS, A and SOA records |
|
|
Term
You have 5 W2k8 DC's. All run as primary DNS zones. Need to ensure all hold same database and use only secure updates. _x000D_ What do you do? |
|
Definition
Upgrade all servers to Active Directory Integrated servers. |
|
|
Term
Six Offices. Need single AD tree. _x000D_ How do you deploy DNS to enable efficient and responsive name/IP resolutions for this environment? |
|
Definition
Create a single second-level name and deploy a DNS server at each location in the network |
|
|
Term
What are the two main server types in an NT domain? |
|
Definition
|
|
Term
Two types of domains in and NT - Multi-master domain topology? |
|
Definition
Master Domain _x000D_ (trust) _x000D_ Resource Domain |
|
|
Term
3 Advantages of old NT over workgroups? |
|
Definition
Centralised Admin _x000D_ Database replication _x000D_ Could scale to 1000's of users |
|
|
Term
4 Limitations of NT model? |
|
Definition
Didn't scale/work well for very/large org _x000D_ Trust relationships needed a lot of work _x000D_ Excessive replication BAD for low-bandwidth WAN links _x000D_ Difficult to delegate admin duties |
|
|
Term
|
Definition
LDAP for transferring information _x000D_ Reliance on DNS for name resolution _x000D_ Ability to extend the schema |
|
|
Term
|
Definition
Create security boundaries to protect resources and ease of administration _x000D_ Ease admin of usrs, grps, comps etc _x000D_ Provide central DB of NW obj's |
|
|
Term
Type of server for remote locale with questionable security? |
|
Definition
Read-only domain Controller |
|
|
Term
True or False: _x000D_ Two objects can have the same relative distinguished name |
|
Definition
True. _x000D_ Jane Doe can be in AD twice (or more) in different OU's |
|
|
Term
True of False?: _x000D_ Two objects can have the same distinguished name. |
|
Definition
False. _x000D_ DN is unique to each AD object |
|
|
Term
AD Trust Relationships - 3 truths |
|
Definition
1. Trusts are transitive _x000D_ 2. By default, trusts are two-way relationships. _x000D_ 3. Trusts are used to allow the authentication of users between domains. |
|
|
Term
Protocol used to query AD |
|
Definition
|
|
Term
Policy that allows for different password and account lockout policies for different sets of users in the same domain? |
|
Definition
Fine-grained password policy |
|
|
Term
What is the Server role that allows/provides for single sign-on capability for multiple apps? |
|
Definition
|
|
Term
Advantages of using Server 2008 AD Certificate Services? |
|
Definition
Web enrollment _x000D_ Network Device Enrollment Service _x000D_ Online Responder |
|
|
Term
Which role allows a user to secure an email while using Microsoft Office 2007 Outlook? |
|
Definition
AD Rights Management Services (AD RMS) |
|
|
Term
Identity and access (IDA) has five distinct categories. What are they? |
|
Definition
Directory services, _x000D_ strong authentication, Federated Identities, information protection, _x000D_ and Identity Lifecycle Management |
|
|
Term
Another administrator has changed a user's group settings. What is the easiest way to get the original setting back for the user? |
|
Definition
Perform Auditing. _x000D_ Review logs. _x000D_ Undo what he did - the dunce! |
|
|
Term
What is the feature of AD that allows info to remain in sync between DC's? |
|
Definition
|
|
Term
Which component of AD should you implement at remote sites to improve the performance of searches conducted for objects in all domains? |
|
Definition
|
|
Term
Name of the server that is a repository of Active Directory topology and schema information for Active Directory? |
|
Definition
|
|
Term
You need to install the Active Directory Federation Services. What application do you use to do the install? |
|
Definition
|
|
Term
What term is used to refer to the actual structure that contains the information stored within Active Directory? |
|
Definition
|
|
Term
NW admin for a 200-node network. Only 30 need a new app. _x000D_ What can you do? |
|
Definition
Create an OU with the 30 in it. _x000D_ Deploy app/update to the OU |
|
|
Term
Used to create a logical structure in AD is an ______? |
|
Definition
|
|
Term
|
Definition
Heirarchical Organisation _x000D_ Extensible Schema _x000D_ Centralised Data Storage _x000D_ Replication - DNS & AD _x000D_ Ease of Admin _x000D_ Network Security _x000D_ Scalability _x000D_ Search |
|
|
Term
|
Definition
a minimal install of Windows Server 2008, without GUI or .NET Framework |
|
|
Term
What are the hardware requirements for Server Core? |
|
Definition
|
|
Term
What are 2 advantages of Server Core? |
|
Definition
more secure (fewer services and components) and requires less management |
|
|
Term
What 9 server roles are supported in Core? |
|
Definition
AD Domain Services (AD DS), AD Lightweight Directory Services (AD LDS), DHCP Server, DNS Server, file server, print server, Streaming Media Services, IIS (doesn't support ASP.NET), Hyper-V (server virtualization) |
|
|
Term
What 11 optional features are available in Server Core? |
|
Definition
failover cluster, network load balancing, subsystem for UNIX, windows backup, multipath I/O, removeable storage management, Windows Bitlocker drive encryption, SNMP, WINS, Telnet, QoS |
|
|
Term
What command is used to change the administrator password? |
|
Definition
|
|
Term
What command is used in Core to set IPv4 configuration? |
|
Definition
|
|
Term
What command is used to join a domain? |
|
Definition
|
|
Term
What command is used in Core to add roles, components, and features? |
|
Definition
|
|
Term
What command is used in Core to view roles, components, and features? |
|
Definition
|
|
Term
What command is used in Core to enable Remote Desktop? |
|
Definition
cscript c:\windows\system32\scregedit.wsf /AR0 |
|
|
Term
What command is used to promote a domain controller? |
|
Definition
|
|
Term
What command is used in Core to configure DNS? |
|
Definition
|
|
Term
What command is used in Core to configure DFS? |
|
Definition
|
|
Term
What command is used to add Active Directory Domain services? |
|
Definition
|
|
Term
What is the one AD server role available in Core that can't be added with ocsetup.exe? |
|
Definition
AD Domain Services (added with dcpromo.exe) |
|
|
Term
What command is used to remove a domain controller? |
|
Definition
|
|
Term
What piece of information is required when removing a domain controller? |
|
Definition
the password of the local admin account |
|
|
Term
What 2 directory partitions do all domains in a forest share? |
|
Definition
|
|
Term
How does Dynamic DNS (DDNS) differ from standard DNS? |
|
Definition
DDNS allows real-time DNS updates |
|
|
Term
What command will send DNS registration info to a DNS server? |
|
Definition
|
|
Term
How is DNS information replicated in DDNS? |
|
Definition
|
|
Term
How was DNS information replicated in standard DNS? |
|
Definition
through manual copies of the zone file |
|
|
Term
What two name resolution technologies does DDNS cover? |
|
Definition
|
|
Term
When does DDNS update the record? |
|
Definition
when a client leases an IP address |
|
|
Term
What is Scope Option 003? |
|
Definition
|
|
Term
What is Scope Option 006? |
|
Definition
|
|
Term
What is the scope for default gateway? |
|
Definition
|
|
Term
What is the scope for preferred DNS server? |
|
Definition
|
|
Term
Where does non-dynamic DNS store data? |
|
Definition
in a text file located at %SystemRoot%\System32\DNS |
|
|
Term
What are the 3 types of DNS zones? |
|
Definition
primary, secondary, and stub zone |
|
|
Term
What is a primary DNS zone? |
|
Definition
a DNS zone which stores a copy of the zone that can be directly updated |
|
|
Term
What is a secondary DNS zone? |
|
Definition
a copy of a primary DNS zone |
|
|
Term
What are secondary DNS zones used for? |
|
Definition
load balancing, fault tolerance, and increasing capacity |
|
|
Term
|
Definition
a copy of a DNS zone containing only NS, SOA, and sometimes glue A records; it is not authoritative |
|
|
Term
What limitation exists on a DNS server storing its data in AD? |
|
Definition
the DNS server must be a DC |
|
|
Term
|
Definition
a DNS system where updates occur over a secure channel |
|
|
Term
How does secure DNS work? |
|
Definition
when a DNS transfer is initiated, the DNS server verifies that the DNS server sending the update is on an approved list |
|
|
Term
What is the purpose of secure DNS? |
|
Definition
to prevent poison entries |
|
|
Term
How is secure DNS set up in an Active Directory domain? |
|
Definition
it is set up automatically |
|
|
Term
What are 3 reasons to use a stub zone? |
|
Definition
keep delegated zone info current, improve name resolution, simplify administration |
|
|
Term
What does a Start of Authority (SOA) record do? |
|
Definition
specifies the DNS server in charge of a zone |
|
|
Term
What 4 items does an SOA record specify? |
|
Definition
primary server for the zone, zone administrator's email address, secondary zone expiration values, minimum default TTL values |
|
|
Term
What is the Global Name Zone designed to do? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What 3 types of records are stored in a Forward Lookup Zone? |
|
Definition
LDAP, Global Catalog, and Name Server records |
|
|
Term
How can repopulation be forced if a Forward Lookup Zone does not appear in AD? |
|
Definition
use net stop logon and net start logon |
|
|
Term
What do Forward Lookup Zones do? |
|
Definition
store domain name-to-IP address mappings |
|
|
Term
What do Reverse Lookup Zones do? |
|
Definition
store IP address-to-domain name mappings |
|
|
Term
At what 3 times are Reverse Lookup Zones populated? |
|
Definition
when IP addresses are leased, when machines are restarted, when ipconfig /registerdns is executed |
|
|
Term
|
Definition
provide a link between DNS servers and top-level DNS servers |
|
|
Term
What are 3 reasons to divide namespaces into more than 1 zone? |
|
Definition
delegate responsibility, break up large namespaces for management, extend namespace to add subdomains |
|
|
Term
When creating subdomains, what needs to be done to make sure that all zone records stay current? |
|
Definition
delegation records need to be added to other DNS servers to point to the authoritative server |
|
|
Term
How does round robin DNS work? |
|
Definition
when an IP address for a server in a round robin pool is given out, that address is moved to the bottom of the list |
|
|
Term
What sort of servers most often utilize round robin DNS? |
|
Definition
|
|
Term
|
Definition
forwarding requests to other servers for fulfillment |
|
|
Term
When is DNS recursion usually disabled? |
|
Definition
When the network is sensitive |
|
|
Term
What is server scavenging? |
|
Definition
process of getting rid of stale DNS records |
|
|
Term
What 2 containers are created when DNS is integrated with AD? |
|
Definition
forestDNSzone and domainDNSzone |
|
|
Term
What do incremental zone transfers do? |
|
Definition
replicate only changes to DNS (rather than all records) |
|
|
Term
Does DNS work on a push or pull basis? |
|
Definition
pull: when changes are made, the DNS server notifies other servers that changes are available |
|
|
Term
What directory format does Active Directory use? |
|
Definition
|
|
Term
What do AD tree structures share? |
|
Definition
The same contiguous name space? |
|
|
Term
|
Definition
A Read Only Domain Controller |
|
|
Term
Do different forests share the same name space? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
A domain is an administratively-defined collection of network resources that share a common directory database and security policies |
|
|
Term
What is an AD object attribute? |
|
Definition
Information about the object such as a user's name, phone number, and email address) which is used for locating and securing resources. |
|
|
Term
What does an object schema identify? |
|
Definition
The schema identifies the object classes (the type of objects) that exist in the tree and the attributes (properties) of the object. |
|
|
Term
What does AD use DNS for? |
|
Definition
Active Directory uses DNS for locating and naming objects. |
|
|
Term
|
Definition
First-level OUs can be called parents. _x000D_ Second-level OUs can be called children. _x000D_ OUs can contain other OUs or any type of leaf object (e.g. users, computers, and printers). |
|
|
Term
|
Definition
A tree is a group of related domains that share the same contiguous DNS name space. |
|
|
Term
|
Definition
A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces. |
|
|
Term
What is the forest root domain? |
|
Definition
The forest root domain is the top-level domain in the top tree. It is the first domain created in the Active Directory forest. |
|
|
Term
What is the tree root domain? |
|
Definition
The tree root domain is the highest level domain in a tree. |
|
|
Term
|
Definition
Each domain in the tree that is connected to the tree root domain is called a child domain. |
|
|
Term
|
Definition
A domain tree is a group of domains based on the same name space. Domains in a tree: _x000D_ - Are connected with a two-way transitive trust. _x000D_ - Share a common schema. _x000D_ - Have common global catalogs. |
|
|
Term
What is a domain controller? |
|
Definition
A domain controller is a server that holds a copy of the Active Directory database that can be written to |
|
|
Term
|
Definition
Replication is the process of copying changes to Active Directory between the domain controllers. |
|
|
Term
What two objects does AD use to represent the physical structure of the network? |
|
Definition
- A subnet represents a physical network segment. Each subnet possesses its own unique network address space. _x000D_ - A site represents a group of well-connected networks (networks that are connected with high-speed links). |
|
|
Term
What manages AD replication between locations? |
|
Definition
Sites and subnets are used to manage Active Directory replication between locations. |
|
|
Term
What does an AD site differ from a domain? |
|
Definition
A site differs from a domain in that it represents the physical structure of your network, while a domain represents the logical structure of your organization. |
|
|
Term
How are clients assigned to AD sites? |
|
Definition
Clients are assigned to sites dynamically according to their Internet Protocol (IP) address and subnet mask. |
|
|
Term
How are domain controllers assigned to AD sites? |
|
Definition
Domain controllers are assigned to sites according to the location of their associated server object in Active Directory. |
|
|
Term
What does the Global Catalog server do? |
|
Definition
Responsible for replicating a subset of attributes throughout Active Directory |
|
|
Term
What are FSMO roles/What do they do? |
|
Definition
Flexible Single-Master Operation roles are specialized domain controller tasks assigned to a domain controller in the domain or forest. Operations master roles are useful because certain domain and enterprise-wide operations are not well suited for the multi-master replication performed by Active Directory to replicate objects and attributes |
|
|
Term
|
Definition
- Schema Master _x000D_ - Domain Naming Master _x000D_ - RID Master (Relative Identifier) _x000D_ - PDC Emulator _x000D_ - Infrastructure Master |
|
|
Term
What does the schema master do? |
|
Definition
Maintains the schema (the mapping of all the different object types) |
|
|
Term
What does the RID master do? |
|
Definition
The RID master allocates pools or blocks of numbers (called relative IDs or RIDs) that are used by the domain controller when creating new security principles (such as user, group, or computer accounts). |
|
|
Term
What does the PDC Emulator do? |
|
Definition
The PDC emulator acts like a Windows NT 4.0 Primary Domain Controller (PDC) and performs other tasks normally associated with NT domain controllers. (eg - time services) |
|
|
Term
What does the Infrastructure Master do? |
|
Definition
Provides a mapping of all the container objects in AD. The infrastructure master is responsible for updating changes made to objects. |
|
|
Term
Which level do the Schema and Domain Naming Master roles operate at? |
|
Definition
|
|
Term
What level do the RID, PDC and Infrastructure Master roles operate at? |
|
Definition
|
|
Term
What is the Global Catalog? |
|
Definition
The Global Catalog (GC) is a database that contains a partial replica of every object from every domain within a forest. A server that holds a copy of the Global Catalog is a global catalog server. The Global Catalog facilitates faster searches because different domain controllers do not have to be referenced. |
|
|
Term
What is an Operations Master? |
|
Definition
A domain controller that performs an operations master role is known as an operations master or operations master role owner. |
|
|
Term
What does the Domain Naming Master do? |
|
Definition
The domain naming master adds new domains to and removes existing domains from the forest. |
|
|
Term
What is a functional level? |
|
Definition
A functional level is a set of operation constraints that determine the functions that can be performed by an Active Directory domain or forest |
|
|
Term
Which domain functional levels does Server 2008 support? |
|
Definition
Windows 2000 Native _x000D_ Windows Server 2003 _x000D_ Windows Server 2008 |
|
|
Term
Which forest functional levels does Server 2008 support? |
|
Definition
Windows 2000 _x000D_ Windows Server 2003 _x000D_ Windows Server 2008 |
|
|
Term
|
Definition
A policy is a set of configuration settings that must be applied to users or computers. Collections of policy settings are stored in a Group Policy object (GPO). The GPO is a collection of files that includes registry settings, scripts, templates, and software-specific configuration values. |
|
|
Term
What are new services in AD 2008? |
|
Definition
- AD Domain Services _x000D_ - AD Lightweight Directory Services _x000D_ - AD Certificate Services _x000D_ - AD Federation Services _x000D_ - AD Rights Management Services |
|
|
Term
|
Definition
A role is a set of software features that provides a specific server function. Examples of roles include DNS server, DHCP server, File Server, and Print Server. |
|
|
Term
What is an AD role service? |
|
Definition
Role services are specific programs that provide the functions of a role. Some roles, like DNS, have a single role service. Other roles, like Print Server, have multiple role services such as the LPD Service for Unix printing and Internet Printing. You can think of a role as a group of programs, with each role service being a sub-component of the role. |
|
|
Term
|
Definition
A feature is a software program not directly related to a server role but which adds functionality to the entire server. Features include management tools, communication protocols or clients, and clustering support. |
|
|
Term
What is Active Directory Domain Services (AD DS) |
|
Definition
AD DS is a distributed database that stores and manages information about network resources, such as users, computers, and printers. The AD DS role: _x000D_ - Helps administrators securely manage information. _x000D_ - Facilitates resource sharing and collaboration between users. _x000D_ - Is required to be installed on the network to install directory-enabled applications such as Microsoft Exchange Server and for applying other Windows Server technologies, such as Group Policy. |
|
|
Term
What is Active Directory Lightweight Directory Service (AD LDS) |
|
Definition
Active Directory Lightweight Directory Services (AD LDS), formerly known as Active Directory Application Mode (ADAM), is an LDAP directory service that you can use to create a directory store (database) for use by directory-enabled applications. AD LDS is very similar to Active Directory Domain Services (AD DS), but is customizable and can be much smaller than an AD DS database. |
|
|
Term
What is Active Directory Federation Services (AD FS) |
|
Definition
AD FS is a feature which enables secure access to web applications outside of a user's home domain or forest. The AD FS role: _x000D_ _x000D_ - Provides Web Single-Sign-On (SSO) technologies to authenticate a user to multiple Web applications using a single user account. _x000D_ - Securely federates (shares) user identities and access rights in the form of digital claims between partner organizations. |
|
|
Term
What is Active Directory Rights Management Service (AD RMS) |
|
Definition
AD RMS is a feature which safeguards digital information from unauthorized use. The AD RMS role: _x000D_ _x000D_ - Can define exactly how a recipient can use information, specifying who can open, modify, print, forward, and/or take other actions. _x000D_ - Allows organizations to create custom usage rights templates (such as "Confidential - Read Only") that can be applied directly to information such as product specifications, financial reports, e-mail messages, and customer data. |
|
|
Term
What is Active Directory Certificate Services (AD CS) |
|
Definition
AD CS is an identity and access control feature that creates and manages public key certificates used in software security systems. The AD CS role: _x000D_ _x000D_ - Provides customizable services for creating and managing public key certificates. _x000D_ - Enhances security by binding the identity of a person, device, or service to a corresponding private key. _x000D_ - Includes features that allow you to manage certificate enrollment and revocation in a variety of scalable environments. |
|
|
Term
Name some things that AD Certificate Services supports |
|
Definition
Digital signatures _x000D_ Encrypting File System (EFS) _x000D_ Internet Protocol security (IPsec) _x000D_ Secure/Multipurpose Internet Mail Extensions (S/MIME) _x000D_ Secure Socket Layer/Transport Layer Security (SSL/TLS) _x000D_ Secure wireless networks _x000D_ Smart card logon _x000D_ Virtual Private Networks (VPN) |
|
|
Term
What AD roles are not supported on Server 2008 Standard? |
|
Definition
AD FS requires the DataCenter or Enterprise editions for deployment. |
|
|
Term
WHich server roles can Server 2008 core run? |
|
Definition
Active Directory _x000D_ Active Directory Lightweight Directory Services (AD LDS) _x000D_ Dynamic Host Configuration Protocol (DHCP) Server _x000D_ DNS Server _x000D_ File Server _x000D_ Print Server _x000D_ Media Services _x000D_ Web Server (IIS) |
|
|
Term
What are the limitations of Server 2008 core? |
|
Definition
There is no Windows Shell. _x000D_ There is no managed code support (no .NET framework). All code has to be native Windows API code. _x000D_ There is only MSI support for unattended mode installs. |
|
|
Term
What methods can you use to manage a Server 2008 core system? |
|
Definition
Log on and use the command prompt. _x000D_ Log on using Remote Desktop to gain access to the command prompt. _x000D_ Use Windows Remote Shell (winrm). _x000D_ Run Server Manager or another tool on another computer and connect to the server core system. This method allows you to use a GUI interface for managing the server core system. |
|
|
Term
How would you add server roles to a Server 2008 core system? |
|
Definition
Run start /w ocsetup to add server roles to the server core system. Switches for the role or service must be typed exactly as they are listed, and role names are case-sensitive. |
|
|
Term
How would you see a list of roles, role services and features that can be installed on Server 2008 core? |
|
Definition
|
|
Term
What does AD Domain Services (AD DS) do? |
|
Definition
provides Identity and Access (IDA) solutions for enterprise networks |
|
|
Term
|
Definition
|
|
Term
What 4 things should an IDA infrastructure do? |
|
Definition
store information about users, groups, computers, and objects; authenticate identities; control access; provide and audit trail |
|
|
Term
What 5 technologies comprise a Microsoft IDA solution? |
|
Definition
AD Domain Services; AD Lightweight Directory Services; AD Certificate Services; AD Rights Management Services _x000D_ *AD Federation Services |
|
|
Term
What part of IDA does AD Domain Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Lightweight Directory Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Certificate Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Rights Management Services provide? |
|
Definition
|
|
Term
What part of IDA does AD Federation Services provide? |
|
Definition
partnership with external organizations |
|
|
Term
What did AD Lightweight Directory Services used to be called? |
|
Definition
Active Directory Application Mode |
|
|
Term
What does AD Lightweight Directory Services do? |
|
Definition
stores and replicates application-related database information |
|
|
Term
What best practice should be used when using AD Certificate Services to provide certificate services to external communities? |
|
Definition
get a root certificate from a trusted third-party CA |
|
|
Term
What does AD Rights Management Services do? |
|
Definition
provides persistent rights management, even after authentication (similar to Acrobat controls) |
|
|
Term
What 5 components does AD Rights Management Services require to function? |
|
Definition
AD domain with Server 2000 SP3 or higher DC's, IIS, database server AD RMS client, RMS-enabled browser |
|
|
Term
What does AD Federation Services do? |
|
Definition
allows organizations to project rights and access controls across organizational boundaries |
|
|
Term
|
Definition
a set of rules that defines classes of objects and attributes in a directory |
|
|
Term
What do replication services do? |
|
Definition
distribute directory data across a network |
|
|
Term
What does a global catalog contain? |
|
Definition
limited information about every object in the directory |
|
|
Term
What is another name for a global catalog? |
|
Definition
|
|
Term
What command is used to launch configuration of a domain controller? |
|
Definition
|
|
Term
What are the components of an AD infrastructure? |
|
Definition
AD data store, DC's, domains, forest, trees, functional level, OU's, sites |
|
|
Term
What is the directory also known as? |
|
Definition
|
|
Term
How is the directory stored? |
|
Definition
as a single file (Ntds.dit) |
|
|
Term
Where is the directory located by default? |
|
Definition
%SystemRoot%\Ntds folder on all domain controllers |
|
|
Term
What 4 partitions are usually found in the AD data store? |
|
Definition
schema, configuration, global catalog, domain naming context |
|
|
Term
What important authentication service is run by all domain controllers? |
|
Definition
Kerberos Key Distribution Center (KDC) |
|
|
Term
Where can a user receive authentication from? |
|
Definition
|
|
Term
What serves as a scope for administrative policies (password expiration, etc.)? |
|
Definition
|
|
Term
What is considered best practice when replication cannot occur reliably between domain controllers? |
|
Definition
place them in separate domains |
|
|
Term
|
Definition
a collection of one or more Active Directory domains |
|
|
Term
What is the first domain in a forest known as? |
|
Definition
|
|
Term
What entity defines a security boundary? |
|
Definition
|
|
Term
What is a security boundary? |
|
Definition
an entity outside which no data is replicated |
|
|
Term
|
Definition
|
|
Term
What determines whether domains are part of the same tree? |
|
Definition
whether those domains are part of a contiguous DNS namespace |
|
|
Term
What are the 3 domain functional levels? |
|
Definition
Windows 2000 native, Windows Server 2003, and Windows Server 2008 |
|
|
Term
What are the 2 forest functional levels? |
|
Definition
Windows Server 2003 and Windows Server 2008 |
|
|
Term
What requirement exists for the Windows Server 2008 domain functional level? |
|
Definition
all DC's must be running Server 2008 |
|
|
Term
What requirement exists for the Windows Server 2008 forest functional level? |
|
Definition
all domains must be Windows Server 2008 domains |
|
|
Term
What MMC is used to administer roles? |
|
Definition
|
|
Term
What are the two primary steps in creating a new DC? |
|
Definition
add roles through Server Manager and promote server to DC |
|
|
Term
What command-line command can be used to promote a server to DC? |
|
Definition
|
|
Term
What two names do all DC's require? |
|
Definition
a valid DNS name and a valid NetBIOS name |
|
|
Term
|
Definition
A command-line tool that enables administrators to create and display a Resultant Set of Policy (RSoP) query from the command line. |
|
|
Term
|
Definition
A Group Policy Management feature that uses the Resultant Set of Policy snap-in to simulate the effect of a policy on the user environment. |
|
|
Term
|
Definition
A feature in Group Policy Management that is equivalent to the Logging mode within Resultant Set of Policy MMC snap-in. Rather than simulating policy effects like the Group Policy Modeling Qizard, Group Policy Results obtains Resultant Set of Policy (RSoP) information from the client computer to show the actual effects that policies have on the client computer and user environment. |
|
|
Term
|
Definition
The Resultant Set of Policy (RSoP) mode that queries existing policies in the hierarchy that are linked to sites, domains, domain controllers, and Organization Units. This mode is useful for documenting and understanding how combined policies are affecting users and computers. The results are returned in an MMC window that can be saved for later reference. |
|
|
Term
|
Definition
The Resultant Set of Policy (RSoP) mode that allows administrators to simulate the effect of policy settings prior to implementing them on a computer or user. |
|
|
Term
|
Definition
A filtering method that method uses filters written in the WMI Query Language (WQL) to control GPO application. |
|
|
Term
|
Definition
Common Information Management Object Model A database used through Windows Management Instrumentation that contains information gathered when a computer starts and becomes part of the network. This information includes hardware, Group Policy Software Installation settings, Internet Explorer Maintenance settings, scripts, Folder Redirection settings, and Security settings. |
|
|
Term
|
Definition
REsultant Set of Policy Query engine that looks at GPOs and then reports its findings. Use this tool to determine the effective settings for a user or a computer based on the combination of the local, site, domain, domain controller, and OU policies. |
|
|
Term
|
Definition
Windows Management Instrumentation A component of the Microsoft Windows operating system that provides management information and control in an enterprise environment. It allows administrators to create queries based on hardware, software, operating systems, and services. |
|
|
Term
|
Definition
WMI Query Language A language that is similar to structured query language (SQL). |
|
|
Term
|
Definition
An option used to deploy required applications to pertinent users and computers. |
|
|
Term
|
Definition
Stategy for enforcing restrictions that prevents any applicationfrom running that requires administrative rights but allows programs to run that only require resources that are accessible by normal users. |
|
|
Term
|
Definition
A software restiction rule that uses the signing certificate of an application to allow software from a trusted source to run or to prevent software that does not come from a trusted source from running. Certificate rules also can be used to run programs in disallowed areas of the operating system. |
|
|
Term
|
Definition
Strategy for enforcing restictions that prevents all applications from running except those that are specifically allowed. |
|
|
Term
|
Definition
The shared folder that is a network location from which users can download software. Also known as the software distribution point. |
|
|
Term
file-activated installation |
|
Definition
A method of distributing applications whereby an application is installed when a user opens a file associated with an application that does not currently exist. |
|
|
Term
|
Definition
A series of bytes with a fixed length that uniquely identifies a program or file. |
|
|
Term
|
Definition
A formula that generates a hash value. |
|
|
Term
|
Definition
A sotrware-restriction rule applied to an appllication executable that will check the file's hash value and prevent the application from running if the hash value is incorrect. |
|
|
Term
|
Definition
A value generated by a formula that makes it nearly impossible for another program to have the same hash. |
|
|
Term
Install This Application At Logon |
|
Definition
A deployment option that allows the application to be installed immediately, rahter than advertising on the Start menu. |
|
|
Term
|
Definition
A relational database file that is copied to the target computer system, with the program files it deploys. In addition to providing installation information, this database file assits in the self-healing process for damaged applications and clean application removal. |
|
|
Term
|
Definition
A software restiction rule that allows only Windows Installer packages to be installed if they come from a trusted area of the network. |
|
|
Term
|
Definition
Windows Installer files with the .msp extension that are used to apply service packs and hotfixes to installed soft |
|
|
Term
|
Definition
A software restriction rule that identifies software by specifiying the directory path where the application is stored in the file system. |
|
|
Term
|
Definition
1) An option that allows users to access network resoufces by searching the Active Directory database for the desired resource. (See lesson 1). _x000D_ 2) An option used to deploy application. It allows users to install the applications that they consider useful to them. (See lesson 9) |
|
|
Term
|
Definition
The process of preparing software for .msi distribution, which includes taking a snapshot of a clean computer system before the application is installed, installing the application as desired and taking a snapshot of the computer after the application is installed. |
|
|
Term
|
Definition
A function that allows software to detect and correct problems, such as missing or deleted files. |
|
|
Term
|
Definition
A process that takes place from the time anapplication is evaluated for deployment in an organization until the time when it is deemed old or no longer suitable for use. |
|
|
Term
|
Definition
Stategy for enforcing restictions that allows all applications to run, except those that are specifically excluded. |
|
|
Term
|
Definition
A non-Windows Installer package that can be created in a text editor. |
|
|
Term
|
Definition
Software Development Live Cycle A structured process used to develop information systems software, projects, or components; phases include analysis, design, implementation and maintenance. |
|
|
Term
|
Definition
A subcategory in the Account Policies category that specifies the number of unsuccessful logon attempts that, if made within a contiguous timeframe, might constitute a potential security threat from an intrruder. An Account Lockout Policy can be set to lock the account in question after a specified number ofinvalid attempts. Additionally, the policy specifies how long the account will remain locked. |
|
|
Term
|
Definition
Setting that logs events related to successful user logons to a domain. |
|
|
Term
account management events |
|
Definition
Setting that triggers an event that is written based on changes to account properties and group properties. Log entries written due to this policy setting reflect events related to user or group account creation, deletion, renaming, enabling, or disabling. |
|
|
Term
|
Definition
Th section of GPO Local Policies that enables administrators to log successful and failed security events, such as logon events, account access, and object access. |
|
|
Term
|
Definition
Tracking events that take place on the local computer. |
|
|
Term
|
Definition
A setting that limits the amount of space available on the server for user data. |
|
|
Term
|
Definition
Group Policy setting that indicates the number of passwords that Active Directory should retain in memory before allowing someone to reuse a previously used password. |
|
|
Term
|
Definition
A command-line tool used to force a manual Group Policy refresh. Thistool was introduced in Windows Server 2003, and it is used in Windows Server 2003, and it is used in Windows Server 2003 and Windows Server 2008 to replace the secedit/refreshpolicy command that was used in Windows 2000. |
|
|
Term
|
Definition
For domain accounts only, this policy enables administrators to configure settings that govern how Active Directory authentication functions. |
|
|
Term
|
Definition
Policies that enable administrators to set user privileges on the local computer that govern what users can do on the computer and determine if these actions are tracked within an event log. |
|
|
Term
|
Definition
The setting logs events related to successful user logons on a computer. |
|
|
Term
|
Definition
A new object type in Windows Server 2008 that enables the use of Fine-Grained Password Policies. Also know as a Password Setting Object (PSO). |
|
|
Term
|
Definition
A separate Group Policy category that can allow files to be available to users, even when users are disconnected from the network. |
|
|
Term
|
Definition
A subcategovy in the Account Policies category that enforces password length, password history and so on. Password Policies can be applied to domain and local user accoutns. |
|
|
Term
|
Definition
By default, this policy is set to audit successes in the Default Domain Controllers GPO. Policy change audit log entries are triggered by events such as user rights assignment changes, establishement or removal of trust relationships, IPSec policy agent changes, and grants or removals of system access privileges. |
|
|
Term
|
Definition
A subcategory in the Account Policies category that enforces password length, password history, and so on. Password Policies can be applied to domain and local user accounts. |
|
|
Term
|
Definition
By default, this policy is set to audit successes in the Default Domain Controllers GPO. Policy change audit log entries are triggered by events such as user rights assignment changes, establishment or removal of trust relationsips, IPSec policy agent changes, and grants or removals of system access privileges. |
|
|
Term
|
Definition
The available period that each background refresh process that can set to ranges from 0 to 64,800 minutes (45 days). |
|
|
Term
|
Definition
Policy settings that enables an administrator to specify group membership lists. |
|
|
Term
|
Definition
A subcategory of the Local Policies setting area of a Group Policy Object that includes security settings related to interactive log on, digital signing of data, restrictions for access to floppy and CD-ROM drives, unsigned driver installation behavior, and logon dialog box behavior. |
|
|
Term
|
Definition
Events that rigger a log entry in this category include system startups and shutdowns; system time changes; system event resources exhaustion, such as when an event log is filled an can no longer append entries; security log cleaning; or any event that affects system security or the security log. In the Default Domain Controllers GPO, this setting is set tolog success by default. |
|
|
Term
|
Definition
The category that is used to configure the startup and security settings for services running on a computer. |
|
|
Term
|
Definition
An Administrative Template setting that continues to apply until it is revised using a policy that overwrites the setting. |
|
|
Term
|
Definition
A subcategory of the Local Policies setting area of a Group Policy Object that includes settings for items that pertain to rights needed by users to perform system-related tasks. |
|
|
Term
|
Definition
Fine-Grained Password Policies A policy that can be applied to one or more users or groups of users, allowing the administrator to specify a more or less stringent password policy for the subset than the password policy defined for the entire domain. |
|
|
Term
|
Definition
Key Distribution Center Used to issue Kerberos tickets to users for domain accesss. |
|
|
Term
|
Definition
Password Settings Object A new object type in Windows Server 2008 that enables the use of Fine-Grained Password Policies. Also know as msDS-PasswordSettings. |
|
|
Term
|
Definition
Files used to generate the user interface for the Group Policy settings that can be set using the Group Policy Management Editor. |
|
|
Term
|
Definition
Windows Server 2008 Administrative Templates using the .admx extension. |
|
|
Term
|
Definition
A method of processing multiple scripts at the same time, without waiting for the outcome of a previously launched script to occur. |
|
|
Term
|
Definition
A setting on a contianer object, such as a site, domain, or Organizational Unit, that will block all policies from parent containers from flowing to this container. It is not policy specific; it applies to all policies applied at parent levels. |
|
|
Term
|
Definition
Single location in a SYSVOL directory containing Administrative Templates with the .admx extension. |
|
|
Term
Default Domain Controller Policy |
|
Definition
A policy linked to the Domain Controllers OU; its settings affect all domain controllers in the domain. |
|
|
Term
|
Definition
A type of Group Policy Object associated with a domain. |
|
|
Term
|
Definition
A setting on an individual GPO link that forces a particular GPO's settings to flow down through the Active Directory, without being blocked by any child Organizational Units. |
|
|
Term
|
Definition
A setting that allows files to be redirected to a network drive for backup and makes them accessible from anywhere on the network. |
|
|
Term
|
Definition
The process of applying Group Policy to all domains and the child objects contained within them. |
|
|
Term
|
Definition
Group Policy container An Active Directory object that stores the properties of the GPO. |
|
|
Term
|
Definition
Group Policy Management Console The Microsoft Management Console (MMC) snap-in that is used to create and modify Group Policies and their settings. |
|
|
Term
|
Definition
Group Policy Object Objects that contain all of the Group Policy settings that will be implemented on all user and computer objects within a site, domain, or OU. |
|
|
Term
|
Definition
Group Policy template A folder located in the Policies subfolder of the SYSVOL share that stores policy setting, such as security settings and script files. |
|
|
Term
|
Definition
Return on investment The amount of money gained (or lost) relative to the amount of money that was invested in a particular project or technology. Can be measured by tangible benefits, such as implementation costs and ongoing support. In addition, it can also be measured by intangible benefits, such as increased user ptoductivity, and other factors that are difficult to measure from a financial standpoint. |
|
|
Term
|
Definition
Total cost of ownership A value used to assess the cost of implementaing computer software or hardware, both in terms of direct and indirect costs. TCO can be calculated based on how much ownership costs over the lifetime of a business resource. |
|
|
Term
|
Definition
Windows Deployment Services A managed setting that can be defined or changed through Group Policies. This setting assists in rebuilding or deploying workstations quickly and efficiently in an eveterprise environment. |
|
|
Term
Group Policy Management Editor |
|
Definition
The Microsoft Management console (MMC) fsnap-in that is used to create and modify Group Policies and their settings. |
|
|
Term
|
Definition
A process that applies Group Policy setting sto various containers within Active Directory. |
|
|
Term
|
Definition
A type of Group Policy Object associated with the local computer. |
|
|
Term
|
Definition
A Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace. |
|
|
Term
|
Definition
The sequence used to process policies: local policies, site policies, domain policies and then Organization Unit policies. |
|
|
Term
|
Definition
A Loopback Processing option. After all user policies run, the computer policy settings are reapplied, which allows all current GPO setting sto merge with the reapplied computer policy settings. In instances where conflicts arise between computer and user settings, the computer policy supersedes the user policy. This occurs before the desktop is presented to the user. |
|
|
Term
|
Definition
A new feature in Windows Vista where by administrators can specify a different local GPO for administrators and create specific GPO settings for one or more local users configured on a wrokstation. |
|
|
Term
|
Definition
A subcategory of Group Policy settings. |
|
|
Term
|
Definition
This feature works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible. |
|
|
Term
|
Definition
Settings that provide a consistent, sevure, manageable environment that addresses the users' needs and the organization's administrative goals. |
|
|
Term
|
Definition
A Loopback Processing option. This option overwrites the GPO list for a user object with the GPO list for the user's logon computer. This means that the computer policy settings remove any conflicting user policy settings. |
|
|
Term
|
Definition
A managed setting that can be defined or changed through Group Policies. Scripts, including logon, logoff, startup, and shutdown commands, can assist in configurint the user environment. |
|
|
Term
securtity group filtering |
|
Definition
An advanced technique that enables you to apply GPO setting to only one or more users or groups within a container by selectively granting the "Apply _x000D_ Group Policy" permissions to one or more user or security groups. |
|
|
Term
|
Definition
A subnode within the Computer Configuration and User Configuration nodes. The Software Settings folder located under the under the User Configuration node contains settings that are appplied to users designated by the Group Policy, regardless of the computer from which they log on to Active Directory. |
|
|
Term
|
Definition
A type of Group Policy that enables administrators to configure a standard set of items that will be configured by default in any GPO that is derived from a starter GPO. Starter GPOs area new feature in Windows Server 2008. |
|
|
Term
|
Definition
Processing method whereby each policy must be read and applied completely before the next policy can be invoked. |
|
|
Term
|
Definition
A Group Policy setting that enables administrators to customize the configuration of a user's desktop, environment, and security settings. Enforced policies are based on the user rather than on the computer used. |
|
|
Term
|
Definition
A subnode within the Computer Configuration and User Configuration nodes. The Windows Settings folder located under the Computer Computer Configuration node in the Group Policy Management Editor contains security settings and scripts that apply to all users who log on to Active Directory from that specific computer. The Windows Settings folder located under the User Configuration node contains settings related to folder redirection, security settings and scripts that are applied to associated users. |
|
|
Term
What is the order of group policies? |
|
Definition
1 Local Policies _x000D_ 2 Site Policies _x000D_ 3 Domain Policies _x000D_ 4 OU Policies _x000D_ _x000D_ LSDOU |
|
|
Term
Comma-Separated Value Directory Exchange |
|
Definition
CSVDE The command line utility used to import or export Active Directory information from a comma-separated value (.csv) file. |
|
|
Term
|
Definition
CSV Format that contains a comma between each value. The CSV format can be used to import and export information from other third-party applications |
|
|
Term
LDAP Data Interchange Format |
|
Definition
LDIF The format for the data file containing the object records to be created. |
|
|
Term
LDAP Data Interchange Format Directory Exchange |
|
Definition
LDIFDE A command-line utility used to import or export Active Directory information and create, modify, and delete Active Directory objects. |
|
|
Term
|
Definition
SAM A database containing userr accounts and security information that is located on a server. |
|
|
Term
|
Definition
WSH Allows scripts to be run from a Windows desktop or a command prompt. The runtime programs provided to do this are WScript.exe and CScript.exe, respectively. |
|
|
Term
|
Definition
Created when a user logs on, this value identifies the user and all of the user's group memberships. Like a club membership card, it verifies a user's permissions when the user attempts to access a local or network resource. |
|
|
Term
|
Definition
Special identity that refers to users who have not supplied a username and password. |
|
|
Term
|
Definition
To gain access to the network, prospective network users must identify themselves to a network using specific user accounts. |
|
|
Term
|
Definition
The process of confirming a user's identity using a known value, such as a password, a pin number on a smart card, or, in the case of biometric authentication, the user's fingerprint or hand print. |
|
|
Term
|
Definition
The process of confirming that an authenticated user has the correct permissions to access one or more network resources. |
|
|
Term
|
Definition
Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks. |
|
|
Term
|
Definition
The accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account. |
|
|
Term
|
Definition
Non-security-related groups created for the distribution of information to one or more persons. |
|
|
Term
|
Definition
The accounts used to access Active Directory or network-based resources, such as shared folders or printers. |
|
|
Term
|
Definition
A group used to assign permissions to resources that reside only in the same domain as the domain local group. They can contain user accounts, computer accounts, global groups, and universal groups from any domain, in addition to other domain local groups from the same domain. |
|
|
Term
|
Definition
A command-line tool used to create, delete, view, and modify Active Directory objects, including users, groups and Organizational Units. |
|
|
Term
|
Definition
A special identity group that contains all authenticated users and domain guests. |
|
|
Term
|
Definition
A group used to grant or deny permissions to any resource located in any domain in the forest. Global groups can contain user accounts, computer accounts, and/or other global groups only from within the same domain as the global group. |
|
|
Term
|
Definition
A collection of user or computer accounts that is used to simplify the assignment of permissions to network resources. |
|
|
Term
|
Definition
The process of configuring one or more groups as members of another group. |
|
|
Term
|
Definition
Group characteristic that controls which objects the group can contain, limiting the objects to the same domain or permitting objects from remote domains as well, and controls the location in the domain or forest where the group can be used. |
|
|
Term
|
Definition
Group characteristic that defines how a group is to be used within Active Directory. |
|
|
Term
|
Definition
The first line of the imported or exported text file that uses proper attribute names. |
|
|
Term
|
Definition
The accounts used to access the local computer only. They are stored in the local Security Account Manager (SAM) database on the computer where they reside. Local accounts are never replicated to other computers, not do these accounts have domain access. |
|
|
Term
|
Definition
A collection of user accounts that are local to one specific workstation or member server. Local groups are created in the security database of a local computer and are not replicated to Active Directory or to any other computers on the network. |
|
|
Term
|
Definition
An object placed inside another object of the same type. |
|
|
Term
|
Definition
When a group is placed in a second group, the members of the first group become members of the second group. |
|
|
Term
|
Definition
Each user's login name--the portion to the left of the '@' within a User Principle Name. The SAM account name must be unique across a domain. |
|
|
Term
|
Definition
Security-related groups created for purposes of granting resource access permissions to multiple users. |
|
|
Term
|
Definition
Group used to define permission assignments. Adminitrators cannot manually modify the group membership of special identity groups, nor can they view their membership lists. |
|
|
Term
Active Directory Migration Tool |
|
Definition
ADMT A free tool used to move objects between domains. |
|
|
Term
Delegation of Control Wizard |
|
Definition
A simple interface used to delegate permissions for domains, Organizational Units, and containers. |
|
|
Term
|
Definition
Automated pass-word-cracking tools that try every possible combination of characters until the correct sequence of characters is finally discoverer. |
|
|
Term
|
Definition
User interface enabling the user to drag on object and drop it on a target. This feature was introduced in Windows Server 2003. |
|
|
Term
|
Definition
A command-line utility used to move an object from one location to another. |
|
|
Term
|
Definition
An alphanumeric sequence of characters entered with a username to access a server, workstation, or shared resource. |
|
|
Term
|
Definition
An attempt to discover a user's password. |
|
|
Term
personal identification number |
|
Definition
PIN Typically consists of at least four characters or digits that are entered while presenting a physical access token, such as an ATM card or a smart card. |
|
|
Term
|
Definition
Option that enables administrators to maintain their primary logon as a standard user and create a secondary session for access to an administrative tool. |
|
|
Term
|
Definition
A command-line tool that enables administrators to log on with alternate credentials. |
|
|
Term
|
Definition
A feature that provides the ability to log on with an alternate set of credentials to that of the primary logon. |
|
|
Term
|
Definition
A password that follows guidelines that make it difficult for a potential hacker to determine that user's password. Password guidelines include a minimum required password length, a password history, requiring multiple types of characters within a password, and setting a minimum password age. |
|
|