Term
Name the five FSMO Roles. |
|
Definition
- Domain Naming Master
- Relative Identifier (RID) Master
- Infrastructure Master
- Primary Domain Controller (PDC) Emulator
- Schema Master
|
|
|
Term
Name the Forest-Wide Master Roles. |
|
Definition
- Schema Master
- Domain Naming Master
|
|
|
Term
Name the Domain-Wide Master Roles. |
|
Definition
- Relative Identifier (RID) Master
- Primary Domain Controller (PDC) Emulator
- Infrastructure Master
|
|
|
Term
Explain the difference between transferring a Master Role and seizing a Master Role. |
|
Definition
Transfer - moving with cooperation of its current owner (move role from one server to another).
Seize - moving without the cooperation of its current owner (server holding role fails and you have no intent to restore it)
|
|
|
Term
How many Schema Masters can be per forest? |
|
Definition
|
|
Term
What does FSMO stand for? |
|
Definition
Flexible Single Master Operations |
|
|
Term
Which role ensures Domain names are unique in the forest? |
|
Definition
|
|
Term
How many RID's are issued at a time by the RID Master? |
|
Definition
|
|
Term
Which role provides backwards compatability with NT4 BDCs, Windows 98 and ME clients, controls time syncronization, and acts as the central manager for password changes, replication, and account lockouts? |
|
Definition
|
|
Term
What is the RID for Built-in Administrator? |
|
Definition
|
|
Term
|
Definition
|
|
Term
(T/F) Small domains place RID Master and PDC Emulator roles on the same DC, whereas very large domains place them on separate DCs. |
|
Definition
|
|
Term
(T/F) The Infrastructure Master Role should be assigned to the DC containing the Global Catalog. |
|
Definition
|
|
Term
Where are forest roles usually assigned? |
|
Definition
|
|
Term
Where are login attempt failures forwarded to before being rejected? |
|
Definition
|
|
Term
The DC containing which role updates ACLs and group membership as required? |
|
Definition
|
|
Term
What are three reasons to create multiple domains? |
|
Definition
- Meet security requirements
- Meet administrative requirements
- Optimize replication traffic
|
|
|
Term
Explain the advantages of multiple domains in regards to security. |
|
Definition
Allows you to vary Account Policies for your organization by defining separate domains to handle the different requirements. |
|
|
Term
Explain the advantages of multiple domains in regards to network traffic. |
|
Definition
By defining multiple small domains and replicating only objects relevant to a location, you can reduce network traffic and optimize replication. |
|
|
Term
(T/F) By defining multiple small domains and replicating only objects relevant to a location, you can reduce network traffic and optimize replication. |
|
Definition
|
|
Term
(T/F) In a forest with one domain, all objects in the forest are replicated to every domain controller in the forest. |
|
Definition
|
|
Term
What policies are contained in the Account Policies subdirectory? |
|
Definition
- Password policy
- Account lockout policy
- Kerberos policy
|
|
|
Term
What group must you be a member of in order to add or removed domains? |
|
Definition
|
|
Term
What group must you be a member of to modify the Schema? |
|
Definition
|
|
Term
Name the five predefined containers in Active Directory. |
|
Definition
- Builtin
- Computers
- Domain Controllers
- Foreign Security Principles
- Users
|
|
|
Term
Which of the five predefined containers is an OU? |
|
Definition
|
|
Term
What are three common types of Organization Unit hierarchy? |
|
Definition
- Location
- Organizational Function
- Object Type
- Combination
- Administrative Responsibility
|
|
|
Term
What tool is used to delegate administrative control over an OU hierarchy? |
|
Definition
Delegation of Control Wizard |
|
|
Term
How would you describe the function of the Users or Groups page in the Delegation of Control Wizard? |
|
Definition
Enables you to select the user accounts or groups to which you want to delegate control. |
|
|
Term
How many layers are typical in OU nesting? |
|
Definition
|
|
Term
(T/F) Delegation of Control Wizard can be used to remove permissions. |
|
Definition
|
|
Term
To modify permissions for users and groups, what option under the View menu must be selected? |
|
Definition
|
|
Term
What are the different ways to move objects between OUs? |
|
Definition
- Drag and drop
- Move menu option
- Dsmove
- Movetree
|
|
|
Term
Where are first level OUs located in Active Directory? |
|
Definition
Directly under the domain |
|
|
Term
What are three characteristics common to all trusts? |
|
Definition
- Trusts can be created manually (explicitly) or automatically (implicitly)
- Trusts can be either transitive (not bound by the domains in the trust relationship) or non transitive (bound by the domains in the trust relationship)
- Trusts can be one-way or two-way
|
|
|
Term
What are the six Trust Types? |
|
Definition
- Parent-child
- Tree root
- Shortcut
- External
- Forest
- Realm
|
|
|
Term
What are the two trust protocols? |
|
Definition
|
|
Term
What does NTLM stand for? |
|
Definition
New Technology Local Area Manager |
|
|
Term
What is the default protocol for Windows Server 2003 in the trusted domain? |
|
Definition
|
|
Term
What trust type improves resoure access, reduces length of trust path, and is transitive? |
|
Definition
|
|
Term
What trust type can be used for NT 4.0 and 2000 domain trusts and is nontransitive? |
|
Definition
|
|
Term
What trust type is used between third-party kerberos implementations and is nontransitive? |
|
Definition
|
|
Term
What are two ways to verify trusts? |
|
Definition
- Active Directory Domains and Trusts
- netdom trust domain1 /d: contoso /verify(words in italics and underlined vary depending on your domain name, etc)
|
|
|
Term
How do you remove trust relationships? |
|
Definition
netdom trust domain1 /d: contoso /remove
(words in italics and underlined vary depending on your domain name, etc) |
|
|
Term
What allows users to log on without specifying a domain seperately and can be the user's email address? |
|
Definition
UPN (User Principal Name) |
|
|
Term
What are the major time and money-saving reasons for information residing in more than one domain controller? |
|
Definition
- Fault Tolerance
- Load Balancing
- Proximity of Information
|
|
|
Term
What are the actions that trigger replication between domain controllers? |
|
Definition
- Creating an object
- Modifying an object
- Moving an object
- Deleting an object
|
|
|
Term
What are the recommended methods of forcing replication? |
|
Definition
- Active Directory Sites and Services
- Repadmin
- Replmon
- Scripts
- Script
|
|
|
Term
Which replication partitions occur once per forest? |
|
Definition
- Schema partition
- Configuration partition
|
|
|
Term
What are the two trade-offs associated with replication? |
|
Definition
- High replication load vs latency
- Replication in WAN vs user access in WAN
|
|
|
Term
What makes up the physical structure of Active Directory? |
|
Definition
- Sites
- Replication
- Replicas
- Partitions
- Domain Controllers
- Global Catalog
|
|
|
Term
What makes up the logical structure of Active Directory? |
|
Definition
- Domains
- OUs
- Trees
- Forests
|
|
|
Term
What is a directory partition? |
|
Definition
|
|
Term
|
Definition
A copy of the directory partition |
|
|
Term
What are the default application partitions? |
|
Definition
- ForestDNSZones
- DomainDNSZones
|
|
|
Term
When does Active Directory automatically build a replication topology? |
|
Definition
When you have more than one domain controller. |
|
|
Term
What controls replication changes between sites by comparing the USNs for recent changes and uses timestamp if modifications carry the same USN? |
|
Definition
|
|
Term
What does USN stand for? (And NO, it's not United States Navy!) |
|
Definition
|
|
Term
What does the following:
- Creates initial replication topology (replication ring)
- Creates connection objects between DCs
- runs on each DC
|
|
Definition
KCC (Knowledge Consistency Checker) |
|
|
Term
When would you perform a Primary Restore? |
|
Definition
When you need to rebuild your domain. |
|
|
Term
What are the three types of restores? |
|
Definition
- Primary
- Authoritative
- Nonauthoritative
|
|
|
Term
What type of restore involves the system state being replicated with another DC and is brought up-to-date by replicating after data is restored? |
|
Definition
|
|
Term
What type of restore requires that the computer be started in DSRM, then run Ntdsutil.exe and marking specific objects prior to reboot? |
|
Definition
|
|
Term
Where is Ntdsutil.exe located? |
|
Definition
|
|
Term
What is contained in the System State? |
|
Definition
- Registry
- Com+ Class Registration Database
- System boot files
- Certificate Services
- SYSVOL (if DC)
- Active Directory Database (if DC)
|
|
|
Term
(T/F) You can backup individual components of the System State. |
|
Definition
|
|
Term
(T/F) System State can only be backed up on the local computer, not a remote computer. |
|
Definition
|
|
Term
|
Definition
Directory Services Restore Mode |
|
|
Term
What two things are impacted by an authoritative restore? |
|
Definition
|
|
Term
What tools are provided to diagnose and resolve problems with Active Directory? |
|
Definition
- Directory Service Log
- Netdiag.exe (Network Connectivity Tester)
- Dcdiag.exe (Domain Controller diagnostic tool)
- Ntdsutil.exe (Active Directory diagnostic tool)
|
|
|
Term
What event logs are used to monitor Active Directory Performance? |
|
Definition
- Application Log
- Directory Service Log
- File Replications Service Log
- System Log
|
|
|
Term
What log contains Errors, Warnings, and Information that applications, such as database servers, and e-mail generates. |
|
Definition
|
|
Term
What log contains Errors, Warnings, and Information that Active Directory generates. |
|
Definition
|
|
Term
What log contains Errors, Warnings, and Information that File Replication Service generates? |
|
Definition
File Replication Service Log |
|
|
Term
What log contains Errors, Warnings, and Information that Windows generates? |
|
Definition
|
|
Term
What is a command-line tool that analyzes the state of the DCs, tests functional area of Active Directory, Specifies DC, tests DNS Names and connectivity via IP, LDAP and RPC, and is a read-only tool? |
|
Definition
|
|
Term
What utility removes metadata left behind by removed DCs, should be used by experience admins only and it is suggested that you do a backup prior to using? |
|
Definition
|
|
Term
What is a command-line tool that assists administrators in diagnosing network and connectivity problems, does not require parameters, and fixes simple DNS problems with the /fix switch? |
|
Definition
|
|
Term
What tools are used to monitor replication? |
|
Definition
- Windows Support Tools
- Dcdiag
- Repadmin
- Replmon
|
|
|
Term
What is Replmon used for? |
|
Definition
- Check replication topology
- Force synchronization
- Generate status report to log file
- View Bridgehead servers
|
|
|
Term
What are the four functions of user accounts? |
|
Definition
- A user object is an account that a user can log on with
- A user object is a placeholder for a collection of informational properties
- A user object is a security principal.
- The location of a user object in Active Directory dictates which group policies apply to the corresponding user
|
|
|
Term
When would you disable an account? |
|
Definition
To prevent the user from authenticating. |
|
|
Term
When copying an account, such as a template, what properties from the Account tab are copied? |
|
Definition
All properties except logon names. |
|
|
Term
When you set the option "Account Expires" to Never, what are you doing to this account? |
|
Definition
Allowing continuous access. |
|
|
Term
Where are domain user accounts stored? |
|
Definition
In Active Directory on the DC |
|
|
Term
What three things does a user account consist of? |
|
Definition
- User name and password
- SID
- Access token
|
|
|
Term
What are the restrictions for an account name? |
|
Definition
- 1-20 characters
- letters and numbers
|
|
|
Term
What are the Account Options? |
|
Definition
- Logon hours
- Computers from which users can log on
- Account expiration
|
|
|
Term
What tab contains first name, last name, display name, description, office location, telephone number(s), email address, home page, and additional web pages? |
|
Definition
|
|
Term
What tab contains the user's street address, Post Office Box, City, State or Providence, Zip or Postal Code and Country or Region? |
|
Definition
|
|
Term
What tab contains the user's logon name, logon hours, computers permitted to logon to, account options, and account expiration? |
|
Definition
|
|
Term
What tab contains profile path, logon script path, home directory and share documents folder? |
|
Definition
|
|
Term
What tab contains user's home, pager, mobile, fax, and IP telephone numbers and space for comments? |
|
Definition
|
|
Term
What tab contains the user's Title, Department, Company, Manager, and Direct Reports? |
|
Definition
|
|
Term
(T/F) A user account is a security principal. |
|
Definition
|
|
Term
Specifically, where are local profiles stored? |
|
Definition
%Systemdrive%\Documents and Settings\%Username% folder |
|
|
Term
What are the purposes of using pre-configured profiles? |
|
Definition
- Provide a productive work environment with easy access to needed network resources and applications
- Remove access to unnecessary resources and applications
- Simplify help desk troubleshooting by enforcing a more straightforward and consistent desktop
|
|
|
Term
Where are roaming profiles stored? |
|
Definition
On a network share accessible to the user at logon |
|
|
Term
What are the affects of roaming profiles on the network? |
|
Definition
Server load and network traffic |
|
|
Term
How do you make a profile mandatory? |
|
Definition
Change the name of the profile's registry file from Ntuser.dat to Ntuser.man |
|
|
Term
What is a collection of folders and data that stores the user's current desktop environment, application settings, and personal data? |
|
Definition
|
|
Term
What are the advantages of a user profile? |
|
Definition
Multiple users can log into the same computer |
|
|
Term
What are the three profile types? |
|
Definition
|
|
Term
(T/F) A mandatory profile is a read-only roaming profile. |
|
Definition
|
|
Term
What are the four check boxes on the accounts tab? |
|
Definition
- Store Password Using Reversible Encryption
- Account is disabled
- Smart Card is Required for Interactive Logon
- Account is Trusted for Delegation
|
|
|
Term
How does an account lockout occur? |
|
Definition
When the user violates the policy |
|
|
Term
Why must you be certain before deleting an account? |
|
Definition
If you delete a user, then re-create it, it will have a new SID, so the new user has none of the memberships or permissions of the old user. |
|
|
Term
Which tabs are available when selecting multiple accounts to modify? |
|
Definition
- General tab
- Account tab
- Address tab
- Profile tab
- Organization tab
|
|
|
Term
Which properties tab is the most crucial? |
|
Definition
|
|
Term
How do you unlock a user? |
|
Definition
Active Directory, then user object properties, Account tab, uncheck box |
|
|
Term
How do you reset a password for a user account? |
|
Definition
Select "Reset Password" from Action menu in Active Directory, then enter new password twice and check the "User must change password at next logon" box. |
|
|
Term
What are the two group types? |
|
Definition
|
|
Term
What are the three group scopes? |
|
Definition
- Domain Local
- Global
- Universal
|
|
|
Term
List the seven Special Identities. |
|
Definition
- Everyone
- Network
- Interactive
- Anonymous Logon
- Authenticated Users
- Creator Owner
- Dialup
|
|
|
Term
Which Special Identity is not authenticated? |
|
Definition
|
|
Term
What is the purpose of a distribution group? |
|
Definition
Used by applications as lists for non-security related functions only. |
|
|
Term
(T/F) Distribution groups can be used to assign permissions. |
|
Definition
|
|
Term
What determines where in the network the group can be used to assign group permissions? |
|
Definition
|
|
Term
What is the purpose of a Domain Local group and where can members be added from? |
|
Definition
- Used to assign permissions to resources
- Members can be added from any domain
|
|
|
Term
What is the purpose of a Global group and where can members be added from? |
|
Definition
- Used to organize users who share similar network access requirements
- Members can be added ONLY from domain in which group is created
|
|
|
Term
What is the purpose of a Universal group and where can members be added from? |
|
Definition
- Used to assign permissions to related resources in multiple domains
- Members can be added from any domain
|
|
|
Term
Universal groups can only be created in which domain functional levels? |
|
Definition
- Windows 2000 mixed
- Windows 2003
|
|
|
Term
What is the recommended level of group nesting? |
|
Definition
|
|
Term
What is the command-line tool used to find groups? |
|
Definition
|
|
Term
What special identity represents all current users, including guests and users from other domains? |
|
Definition
Everyone special identity |
|
|
Term
What special identity represents any user who is using network resources, but did not go through the authentication process? |
|
Definition
Anonymous Logon special identity |
|
|
Term
What special identity represents all users who are authenticated into the network. |
|
Definition
Authenticated Users special identity |
|
|
Term
What determines where in the network the group can be used to assign group permissions? |
|
Definition
|
|
Term
What character is used to designate a "hidden" share? |
|
Definition
|
|
Term
What are the five properties of a share that you can configure? |
|
Definition
- Share name
- Description
- User Limit
- Permissions
- Offline Settings
|
|
|
Term
What does publishing a share do? |
|
Definition
Creates an object in Active Directory representing the share, allowing Administrators to find the shared folder. |
|
|
Term
What access does the Everyone Special Identity have on a newly created share? |
|
Definition
|
|
Term
What console do you have to access in order to list all shares on a computer? |
|
Definition
Computer Management Console |
|
|
Term
What are the three share permissions? |
|
Definition
|
|
Term
What are the five default administrative shares? |
|
Definition
- drives$
- ADMIN$
- IPC$
- PRINT$
- NETLOGON
|
|
|
Term
What is the drives$ Administrative share? |
|
Definition
Windows 2003 shares the root of each drive as a hidden share for administrative purposes |
|
|
Term
What is the ADMIN$ Administrative share? |
|
Definition
The systemroot folder on the system |
|
|
Term
What is the IPC$ Administrative share? |
|
Definition
Used to name pipes during remote administration |
|
|
Term
What is the PRINT$ Administrative share? |
|
Definition
Enables remote printer administration |
|
|
Term
What is the NETLOGON Administrative share? |
|
Definition
Used to support user logon, storing user logon scripts and profiles |
|
|
Term
What are ways to connect to shared folders? |
|
Definition
- Map Network Drive wizard
- Add Network Place wizard
- Run command
- My Network Places
- Search Active Directory
|
|
|
Term
For inheritance to work what two characteristics must be present? |
|
Definition
- The permission Allow Users to Read and Execute is specified to Apply to: This folder, subfolders, and files.
- When new objects are created and set by default to "Allow Inheritable Permissions from the Parent TO Propagate to This Object"
|
|
|
Term
When would you want to override inheritance? |
|
Definition
To modify permissions to provide additional access or restrict access to a user or group. |
|
|
Term
What are effective permissions? |
|
Definition
The resulting permissions when ACLs contain multiple user entries that have multiple group memberships |
|
|
Term
Which takes precedence, Allow or Deny? |
|
Definition
|
|
Term
Which takes precedence, file or folder? |
|
Definition
|
|
Term
What allows permissions assigned at one folder to flow down to subsequent files and folders? |
|
Definition
|
|
Term
What contains a list of all user accounts and groups that have been granted access for the file or folder as well as type of access granted. |
|
Definition
ACL (Access Control List) |
|
|
Term
(T/F) By default, subfolders and files inherit permissions that are assigned to their parent. |
|
Definition
|
|
Term
How can you verify that permissions are inherited from the parent folder? |
|
Definition
The check boxes under permissions are shaded |
|
|
Term
(T/F) NTFS permissions are cumulative. |
|
Definition
|
|
Term
What type of inheritance does Active Directory use for permissions? |
|
Definition
|
|
Term
If an account has been deleted, recreating the account would be enough for the user to access resources again? |
|
Definition
|
|
Term
Where would you go in order to determine what happened to a missing account? |
|
Definition
|
|
Term
Where would you go to create a new account? |
|
Definition
Active Directory Users and Computers |
|
|
Term
What does a normal user need to access Active Directory Users and Computers through his/her account? |
|
Definition
|
|
Term
In order for administrative permissions to take effect on a user account, what does the user have to do if he/she is already logged on? |
|
Definition
Log off, then log back on |
|
|
Term
What are the default permissions for a newly created share? |
|
Definition
- Administrators - Full Control
- Everyone - Read
|
|
|
Term
How does Microsoft define an Event? |
|
Definition
Any significant occurance in the OS or an application that requires users (particularly Administrators) to be notified. |
|
|
Term
Name the six logs that could be present on a Domain Controller. |
|
Definition
- Application Log
- System Log
- Security Log
- Directory Service Log
- File Replication Service Log
- DNS Log
|
|
|
Term
What does the System Monitor allow you to analyze? |
|
Definition
|
|
Term
What provides quick information on applications and services currently running on your server? |
|
Definition
|
|
Term
What part of Task Manager is the most useful and provides a list of running processes on the system and measures their performance in simple data? |
|
Definition
|
|
Term
What log contains information about events generated by Windows 2003 components, such as services and device drivers? |
|
Definition
|
|
Term
What log contains information about security-related events, such as failed logons, attempts to access protected resources and success or failure of audited events? |
|
Definition
|
|
Term
What log contains information about specific programs running on the computer, as determined by application developer? |
|
Definition
|
|
Term
What are the five event types? |
|
Definition
- Error
- Warning
- Information
- Success Audit
- Failure Audit
|
|
|
Term
What event is a significant problem, such as loss of data or functionality and its icon? |
|
Definition
- Error
- Red circle with a white X
|
|
|
Term
What event that might not be significant, but might indicate a future problem and its icon? |
|
Definition
- Warning
- Yellow triangle with black explanation point
|
|
|
Term
What event describes the successful operation of an application, driver, or service and its icon? |
|
Definition
- Information
- White speech bubble with blue "i"
|
|
|
Term
What event is an audited security access attempt that succeeds and its icon? |
|
Definition
|
|
Term
What event is a significant problem, such as loss of data or functionality and its icon? |
|
Definition
|
|
Term
What are the three log retention settings? |
|
Definition
- Overwrite events as needed
- Overwrite events older than X number of days
- Do not overwrite events (clear log manually)
|
|
|
Term
What monitors conditions within local and remote computers anywhere in the network and summarizes performance at selected levels? |
|
Definition
|
|
Term
What collects performance counter data in a comma or tab seperated format for easy import to spreadsheet or database programs? |
|
Definition
|
|
Term
What are the two primary disk objects that contain counters in the system monitor? |
|
Definition
|
|
Term
(T/F) Task manager is a real-time monitoring tool. |
|
Definition
|
|
Term
If the user can print a job from another application on their computer, the error is most likely related to ____? |
|
Definition
|
|
Term
If the user cannot print to the printer from any application and other users can print to printers on the network, the error is likely localized. |
|
Definition
|
|
Term
You can confirm connectivity between the print client and the print server by ________. |
|
Definition
Printers and Faxes folder |
|
|
Term
An error opening the printer window while confirming connectivity between the client and the server would indicate a ________. |
|
Definition
Potential networking, authentication, or security permissions problem |
|
|
Term
What would you use in order to check that services required for the printer are working properly? |
|
Definition
Services Microsoft Management Console |
|
|
Term
What console enables you to start Windows Server 2003 into a command-line console where certain operations, such as replacing damaged files or disabling services are possible? |
|
Definition
|
|
Term
How can you start the Recovery Console? |
|
Definition
Boot using the Windows Server 2003 CD-ROM, then pressing "R" when prompted. |
|
|
Term
What command would you use to install the Recovery Console? |
|
Definition
|
|
Term
How much disk space is required for a Recovery Console installation? |
|
Definition
|
|
Term
What administrator account is used by Recovery Console? |
|
Definition
The Administrator account stored on the registry as Directory Services Restore Mode. |
|
|
Term
What is the name of the native Windows Server 2003 backup utility? |
|
Definition
|
|
Term
(T/F) You cannot schedule backups with Ntbackup. |
|
Definition
|
|
Term
What are the two ways to open Ntbackup? |
|
Definition
- Start Menu, Accessories, System Tools
- Run, ntbackup.exe
|
|
|
Term
What do you need to do in order to use the standard utility rather than the wizard? |
|
Definition
Clear the "Always start in wizard mode" check box, then click Advanced Mode. |
|
|
Term
Can you backup network volumes using the Ntbackup utility? |
|
Definition
|
|
Term
What is the data to be backed up? |
|
Definition
|
|
Term
What can be considered a backup target? |
|
Definition
- Single file or folder
- Entire drive
- Entire system
- Another system on the network
|
|
|
Term
What are the five backup types? |
|
Definition
- Normal (Full)
- Copy
- Differential
- Incremental
- Daily
|
|
|
Term
What backups DO NOT clear the archive bit? |
|
Definition
|
|
Term
What is the difference between Normal and Copy? |
|
Definition
Normal clears archive bit, Copy does not. |
|
|
Term
Which is fastest to backup, Incremental or Differential? |
|
Definition
|
|
Term
Which is fastest to restore, Incremental or Differential? |
|
Definition
|
|
Term
How do backup with removable media? |
|
Definition
- Must be attached
- Must be listed on the Windows 2003 HCL (Hardware Compatability List)
|
|
|
Term
Where is the System State backed up? |
|
Definition
Local Computer (not remote) |
|
|
Term
What data is backed up with a Normal Backup and what is the archive bit status? |
|
Definition
- All selected data
- Clears archive bit
|
|
|
Term
What data is backed up with a Incremental Backup and what is the archive bit status? |
|
Definition
- All files that have been modified or created since the last full or incremental.
- Clears archive bit
|
|
|
Term
What data is backed up with a Differential Backup and what is the archive bit status? |
|
Definition
- All files that have been modified or created since the last full or incremental.
- Does not clear archive bit
|
|
|
Term
What are the two ways you can add a DHCP server? |
|
Definition
- Windows Component Wizard
- Manage Your Server
|
|
|
Term
How can you verify that the DHCP server service has been properly installed on your computer? |
|
Definition
Opening the DHCP Console admin tool |
|
|
Term
When do you need to authorize a DHCP server? |
|
Definition
When it is integrated into an Active Directory network. |
|
|
Term
|
Definition
Stand-alone DHCP servers implemented together with Authorized servers. |
|
|
Term
|
Definition
A pool of IP addresses within a logical subnet that the DHCP server can assign to clients. |
|
|
Term
What is the DHCP install process? |
|
Definition
- Install Windows Server 2003 DHCP server service software
- Authorize the server in Active Directory
- Create one or more scopes
- Configure DHCP options
- Activate the scope or scopes
|
|
|
Term
How many scopes can you create per subnet on a single DHCP server? |
|
Definition
|
|
Term
What is an ip address within a defined scope that is offered to a client? |
|
Definition
|
|
Term
How do you create new scopes? |
|
Definition
|
|
Term
How are leases renewed periodically? |
|
Definition
- At 50% of lease time
- Restarting
- Ipconfing /renew
|
|
|
Term
What is a set of one or more IP addresses, included within the range of a defined scope that you do not want to lease to clients? |
|
Definition
|
|
Term
What transport protocol is used by DHCP? |
|
Definition
|
|
Term
What port does DHCP use for the Server Side? |
|
Definition
|
|
Term
What port does DHCP use for the Client Side? |
|
Definition
|
|
Term
|
Definition
Rule for balancing scope distribution of addresses where multiple DHCP servers are used to service the same scope. |
|
|
Term
What are the levels you can configure DHCP options? |
|
Definition
- Reservation level
- Scope level
- Server level
|
|
|
Term
(T/F) Options set at the reservation level override all others. |
|
Definition
|
|
Term
What allows you to automatically assign IP addresses, subnet masks, and other configuration information that client computers on a local network? |
|
Definition
|
|
Term
What command would you use in order to get basic host computer configuration information? |
|
Definition
|
|
Term
What graphical troubleshooting tool is built into Windows Server 2003 to provide detailed information about the local computer's networking configuration? |
|
Definition
|
|
Term
What command would display the IP address, subnet mask, and default gateway of a specific computer? |
|
Definition
|
|
Term
What are the three default categories that Network Diagnostics collects information about? |
|
Definition
- Internet service category
- Computer information category
- Modems and network category
|
|
|
Term
You can use the ___________ command to query DNS to confirm that DNS is working properly and that MX and A records exist for a particular SMTP domain. |
|
Definition
|
|
Term
What is a command-line utility used to isolate networking and connectivity problems by performing a series of tests to determine the state of your server? |
|
Definition
|
|
Term
What utility used the ICMP ECHO commands to test IP connectivity? |
|
Definition
|
|
Term
What utility resolves names to IP addresses? |
|
Definition
|
|
Term
What utility can you use to display protocol statistics and current TCP/IP connections? |
|
Definition
|
|
Term
What utility can you use to determine the path that an IP datagram takes to reach a destination? |
|
Definition
|
|
Term
What utility is a route-tracing tool that combines the features of ping and tracert and gives additional information that neither of those tools provide? |
|
Definition
|
|
Term
What are the default values for the following:
- hops:
- wait time before timeout:
- period:
- number of queries
|
|
Definition
- 30 hops
- 3 seconds
- 250 milliseconds
- 100
|
|
|
Term
What is the loopback address used for troubleshooting? |
|
Definition
|
|
Term
What is one of the first signs of a DHCP failure? |
|
Definition
When a client loses connectivity to network resources or when a new client cannot establish connectivity in the first place. |
|
|
Term
When troubleshooting, how can you determine if a client has received and address lease from the server? |
|
Definition
|
|
Term
Where would you go to learn about an address conflict between two computers? |
|
Definition
System Log in event viewer |
|
|
Term
What command would you use to determine if the client obtained an address from a server? |
|
Definition
|
|
Term
When you detect that the DHCP database information is missing or inconsistent, what can you do in order to resolve this problem? |
|
Definition
Reconcile DHCP data for any or all scopes. |
|
|
Term
|
Definition
|
|
Term
What command do you use to renew lease? |
|
Definition
|
|
Term
What utility do you use to locate rogue servers on a network? |
|
Definition
|
|
Term
What are the two entries when reconciling? |
|
Definition
|
|
Term
When verifying scope configuration, what should you verify first? |
|
Definition
|
|
Term
(T/F) DNS provides a standard both for naming hosts and for locating IP hosts specified by name. |
|
Definition
|
|
Term
(T/F) The DNS namespace is not based on a hierarchial and logical tree structure. |
|
Definition
|
|
Term
What are the three types of top-level domains? |
|
Definition
- Organizational
- Geographical
- Reverse
|
|
|
Term
Give two examples of organizational domains. |
|
Definition
|
|
Term
(T/F) Within a private namespace you can name and create your own root server or servers and as many subdomains as required. |
|
Definition
|
|
Term
Can private names be resolved on the Internet? |
|
Definition
|
|
Term
(T/F) Every node in the DNS domain tree can be identified by a FQDN. |
|
Definition
|
|
Term
What is a DNS namespace based on a set of private root servers? |
|
Definition
|
|
Term
What can provide requested information, point to another server that can help resolve the query, or respond that the information is not available? |
|
Definition
|
|
Term
(T/F) A DSN server is authoritative for a zone if it hosts the zone. |
|
Definition
|
|
Term
What is a contiguous portion of a network for which the server is authoritative? |
|
Definition
|
|
Term
What is a service that used DNS protocol to query for information from DNS servers? |
|
Definition
|
|
Term
What are DNS database entries that are used to answer DNS queries? |
|
Definition
|
|
Term
When is the DNS cache cleared? |
|
Definition
When the service is stopped |
|
|
Term
What are three ways that queries work? |
|
Definition
- Referring to cache
- Recursion
- Iteration
|
|
|
Term
|
Definition
Occurs when DNS server queries othe DNS servers, receives the answer, then sends back to client. |
|
|
Term
|
Definition
Where a DNS client attempts to contact additional servers to resolve a name |
|
|
Term
What does the DNS server properties dialog box allow you to do? |
|
Definition
Allows you to configure settings that apply to the DNS server and all its hoste zones. |
|
|
Term
Name the eight tabs contained in the properties dialog box from the DNS server. |
|
Definition
- Interfaces
- Forwarders
- Advanced
- Root Hints
- Debug Logging
- Events Logging
- Monitoring
- Security
|
|
|
Term
What tab contains a copy of the information found in the WINDOWS\System32\Dns\Cache.dns file? |
|
Definition
|
|
Term
What tab allows you to restrict the events written to the DNS Events log file to only errors or to errors and warnings? |
|
Definition
|
|
Term
What tab is available only when the DNS server is also a domain controller? |
|
Definition
|
|
Term
What DNS server properties tab allows you to specify which of the local computers IP addresses the DNS server should listen to for DNS requests? |
|
Definition
|
|
Term
What DNS server properties tab allows you to forward queries received by local DNS server to upstream DNS servers, called forwarders? |
|
Definition
|
|
Term
What DNS server properties tab allows you to enable, disable, and configure certain DNS server options and features, such as recursion, round robin, auto scavenging, and netmask ordering? |
|
Definition
|
|
Term
What DNS server properties tab allows you to troubleshoot the DNS server by logging the packets it sends and receives? |
|
Definition
|
|
Term
What DNS server properties tab allows you to test basic functionality with two simple tests? |
|
Definition
|
|
Term
What are the two simple tests the Monitoring tab allows you to perform? |
|
Definition
- Simple query against local DNS server itself
- Recursive query to the root DNS servers
|
|
|
Term
What DNS server properties tab allows you to control which users are granted permissions to view, configure, and modify the DNS server and its zones? |
|
Definition
|
|
Term
Name the three major network security protocols used in a Windows Server 2003 network. |
|
Definition
|
|
Term
What security protocol would you use for Authentication (prove you are who you say you are)? |
|
Definition
|
|
Term
What are Network Security protocols used for? |
|
Definition
To manage and secure authentication, authorization, confidentiality, integrity and nonrepudiation. |
|
|
Term
How can you load the Securiy Templates snap-in? |
|
Definition
|
|
Term
By default, several templates are available; can you as the network administrator add more templates in case you need them? |
|
Definition
|
|
Term
(T/F) You can think of IPSec policies as a collection of packet filters that does not enforce security policy on IP traffic. |
|
Definition
|
|
Term
If traffic leaving or arriving at the device on which the policy is active matches one of the filters, the traffic is either _______, ________ or ________. |
|
Definition
blocked, allowed, or negotiated |
|
|
Term
How are filters defined in an IPSec policy? |
|
Definition
|
|
Term
|
Definition
The process that determines which IPSec subprotocol will be used, and what specifics, such as key strength and cryptographic algorithms, will be used. |
|
|
Term
(T/F) When an IPSec policy is Assigned and the IPSec service is running each network communication, only the incoming policies are evaluated to see whether they meet the conditions specified in the IPSec policy. |
|
Definition
|
|
Term
When you are troubleshooting Kerberos and you have not rebooted the server, what are two important steps you have to perform at the beginning of the process? |
|
Definition
Purge the Kerberos ticket cache and log on again. |
|
|
Term
If you are troubleshooting Kerberos and you are going to shutdown the server, what important step do you have to perform before you reboot? |
|
Definition
Start the network capture on the domain controller. |
|
|
Term
What is a good practice in order to have less data to look through the logs while you are troubleshooting? |
|
Definition
Save them, and then you can evaluate them on a different computer. |
|
|
Term
When troubleshooting an IPSec policy, what tool would you use to verify the current active policy? |
|
Definition
|
|
Term
When looking for confirmation that the policy is assigned and that its parameters are correct, what command would you use? |
|
Definition
Netsh Ipsec Static Show All |
|
|
Term
What are the five Security Paradigms? |
|
Definition
- Authentication
- Authorization
- Confidentiality
- Integrity
- Nonrepudiation
|
|
|
Term
What security paradigm is used to determine what you can do on network after authentication and what protocols are used? |
|
Definition
- Authorization
- Kerberos and NTLM
|
|
|
Term
What security paradigm is used to keep data secret and what protocols are used? |
|
Definition
- Confidentiality
- Encryption components of Kerberos, NTLM and IPSec
|
|
|
Term
What security paradigm is used to ensure data received is the same as data sent, and what protocols are used? |
|
Definition
- Integrity
- Kerberos, NTLM, and IPSec
|
|
|
Term
What security paradigm is used to determine exactly who sent and received the message, and what protocols are used? |
|
Definition
- Nonrepudiation
- Kerberos and IPSec
|
|
|
Term
What is the Principle of Least Privilege? |
|
Definition
No one, including system administrators and IT works, should not have any more access or rights than they need to do their job. |
|
|
Term
What is being used for authentication when drives are mapped using server IP address instead of computer name? |
|
Definition
|
|
Term
|
Definition
A software-based traffic analysis tool that allows a user to caputure frames, display and filter captured frames, and edit captured frames. |
|
|
Term
What tool would you use to diagnose hardware and software problems when the server cannot communicate with other computers? |
|
Definition
|
|
Term
What are the two available versions of Network Monitor? |
|
Definition
- Basic version
- Full version
|
|
|
Term
Network Monitor is composed of one administrative tool and one agent, what are the names of those components? |
|
Definition
- Administrative tool - Network Monitor
- Agent - Network Monitor driver
|
|
|
Term
How can you start capturing data in Network Monitor? |
|
Definition
In Network Monitor, from Capture menu, select Start. |
|
|
Term
Network Monitor creates a memory-mapped file for its capture buffer. What is the size limit? |
|
Definition
It is limited only to the amount of memory you have. |
|
|
Term
(T/F) You can run Network Monitor in the background to reduce the amount of system resources necessary to operate the program. |
|
Definition
|
|
Term
(T/F) Network Monitor is installed by default. |
|
Definition
|
|
Term
How do you install Network Monitor? |
|
Definition
Add/Remove Programs in Control Panel |
|
|
Term
What feature does Network Monitor used to copy all frames to its capture buffer? |
|
Definition
NDIS (Network Driver Interface Specification) |
|
|
Term
What are the two forms that a service can run requiring little or none user interaction? |
|
Definition
|
|
Term
What steps do you have to follow to see the current services installed on a specific server? |
|
Definition
Start Menu, right-click My Computer, Select Manage, select Services. |
|
|
Term
A service can be in one of three states, name all three. |
|
Definition
|
|
Term
What are the three possible methods to configure a service for starting? |
|
Definition
- Automatic
- Manual
- Disabled
|
|
|
Term
What is a service dependency? |
|
Definition
Some services depend on other services in order to start. |
|
|
Term
What are the four Service recovery options? |
|
Definition
- Take no action
- Restart the service
- Run a program
- Restart the computer
|
|
|
Term
When using _______, you are creating a connection to a server's console. |
|
Definition
Remote Desktop for Administration |
|
|
Term
Domain controllers will only allow connections via Remote Desktop to ________. |
|
Definition
|
|
Term
(T/F) You must configure the domain controller security policy to allow connections for all other remote user connections -non-administrator accounts. |
|
Definition
|
|
Term
(T/F) Errors in standard TCP/IP networking can cause a Remote Desktop connection to fail or be interrupted. |
|
Definition
|
|
Term
(T/F) Users must belong to the Administrative or Remote Desktop Users group to successfully connect to the server using Remote Desktop for Administration. |
|
Definition
|
|
Term
Where can Global group members come from and what can they access? |
|
Definition
- Only from local domain
- access resources in any domain
|
|
|
Term
Where can Domain Local group members come from and what can they access? |
|
Definition
- From any domain
- Access resources only in local domain
|
|
|
Term
Where can Universal group members come from and what can they access? |
|
Definition
- From any domain
- Access resources in any domain
|
|
|
Term
(T/F) A group type and group scope must be selected when created. |
|
Definition
|
|
Term
What do group scopes allow groups to do? |
|
Definition
To be used in different ways to assign permissions. |
|
|
Term
What does a group scope determine? |
|
Definition
Where in the network the group can be used to assign group permissions. |
|
|
Term
What is the purpose of a Global group? |
|
Definition
To organize users who share similar network access requirements. |
|
|
Term
What is the purpose of a Domain Local group? |
|
Definition
Used to assign permissions to resources. |
|
|
Term
What is the purpose of a Universal group? |
|
Definition
Used to assign permissions to related resources in multiple domains. |
|
|
Term
When planning your OUs, what are the aspects you should keep in mind? |
|
Definition
- OUs are purely logical entities
- OUs are for delegation of administration
- OUs are for Group Policy
- OUs are for controlling object visibility
- OUs are easy to reorganize
- Each OU should have a specific need and purpose to exist
- No limit on how deep a OU tree is
- OUs are mainly administrative units
|
|
|
Term
What are three typical scenarios for an OU organization? |
|
Definition
- Geographical
- Object types
- Organization
|
|
|
Term
(T/F) A network is a static entity. |
|
Definition
|
|
Term
What does implementation of an OU structure require first? |
|
Definition
That the administrator has the correct permission to create new OUs. |
|
|
Term
Members of what groups have the authority to create new OUs in a domain? |
|
Definition
- Domain Admins
- Enterprise Admins
|
|
|
Term
(T/F) Users can be delegated the appropriate permissions to create OUs. |
|
Definition
|
|
Term
Where do you create the OU structure? |
|
Definition
Active Directory Users and Computers console |
|
|
Term
(T/F) Group Policy gives administrators an efficient and pervasive tool to manage logon scripts, security settings such as password policies and user interface restricitions. |
|
Definition
|
|
Term
(T/F) A computer's settings are processed when the computer logs off and at periodic intervals afterward. |
|
Definition
|
|
Term
What are the two GPOs created by default, when you install a new Active Directory domain? |
|
Definition
- Default Domain Policy
- Default Domain Controllers Policy
|
|
|
Term
(T/F) By default, group policies are processed synchronously for Windows 2003, which means that computer policy is completed before the Ctrl+Alt+Delete dialog box is presented, and user policy is completed before the shell becomes active so that the user can start using it. |
|
Definition
|
|
Term
(T/F) You can link GPOs to sites, domains and OUs. |
|
Definition
|
|
Term
By default, a GPO named the _______ is linked at the domain level and is typically used to configure account policies for all domain users. |
|
Definition
|
|
Term
(T/F) When you link a GPO to a site, it affects computers and users based on the IP address of the computer. |
|
Definition
|
|
Term
(T/F) Group Policy facilitates both centralized and decentralized management of machine and user settings. |
|
Definition
|
|
Term
What are the two categories of Group Policy settings? |
|
Definition
|
|
Term
What are the two components of Group Policy? |
|
Definition
|
|
Term
What enables administrators to centralize the configuration of users' Internet Explorer (IE) browsers, such as the content of Favorites or proxy or security zone settings? |
|
Definition
Internet Explorer Maintenance |
|
|
Term
What file is contained in the Group Policy template that contains only the version number? |
|
Definition
|
|
Term
What are the four ways to alter inheritance? |
|
Definition
- Enforce (No override)
- Block Policy inheritance
- Security Filtering
- WMI Filters
|
|
|
Term
If you move a computer object to a new OU, how long will Group Policy to take effect? |
|
Definition
|
|
Term
What do you use to create Group Policy and edit Group Policy? |
|
Definition
- Create - GPMC
- Edit - GPedit
|
|
|
Term
What is used to filter GPOs? |
|
Definition
|
|
Term
What is used to manage administative template files? |
|
Definition
|
|
Term
You must be a member of what group(s) to create GPOs. |
|
Definition
- Administrators
- Group Policy Creator Owners
|
|
|
Term
What is a collection of user and computer configuration settings that can be linked to computers, sites, domains and OUs to specify the behavior of a users' desktop? |
|
Definition
|
|
Term
Computer Registry configurations are found where? |
|
Definition
HKLM (HKEY_LOCAL_MACHINE) |
|
|
Term
User Registry configurations are found where? |
|
Definition
|
|
Term
What are the common performance issues with GPOs? |
|
Definition
- Too many settings in a single GPO
- Too many GPOs
- Slow links
- Too many scripts
- Software installation
|
|
|
Term
(T/F) Local GPOs can be overridden by non-local GPOs. |
|
Definition
|
|
Term
In what order are GPOs processed? |
|
Definition
|
|
Term
What type of processing allows each process to finish before another one begins and must finish before desktop is displayed? |
|
Definition
|
|
Term
What type of processing allows multiple processes to run at the same time, has faster access to the desktop, and may have access to unauthorized settings? |
|
Definition
|
|
Term
By default, how are policies ran in order to optimize logon? |
|
Definition
|
|
Term
What command is used to refresh both computer and user Group Policies? |
|
Definition
|
|
Term
What GPOs are linked to sites? |
|
Definition
|
|
Term
What GPOs are linked to domains? |
|
Definition
- Account policies
- Legal notice
- Screensaver
- Scripts
- Security settings
- Software installation
- Internet Explorer
- GPO Processing
|
|
|
Term
By default, what is the Domain Controller for Group Policy options? |
|
Definition
|
|
Term
What are the two types of scripts? |
|
Definition
- Logon/Logoff
- Startup/Shutdown
|
|
|
Term
What allows a security administrator to manually configure security levels assigned to a local or nonlocal GPO? |
|
Definition
|
|
Term
How does Software Installation work through Group Policy? |
|
Definition
- Access Software Installation in Group Policy, decide to deploy to computer or user
- Right-click Software Installation and choose New, Package
- Type path to network share where file is located, or browse to it
- Click open
- Select Published, or Assigned to deploy without modifications, select Advanced too make modifications.
|
|
|
Term
What is included in an installation package? |
|
Definition
A new setup method to standardize the setup process. |
|
|
Term
When deploying, you need a distribution point on your network for making the package available to users and computers. What should be this install location? |
|
Definition
|
|
Term
(T/F) Once assigned, the install location can be changed in the GPO without redeploying the application. |
|
Definition
|
|
Term
(T/F) One key limitation is that group policy can be used to distribute software only to computers running Windows 2000 and XP Professional. |
|
Definition
|
|
Term
What are the three ways that an application can advertise itself? |
|
Definition
- Shortcuts
- File Association
- COM components
|
|
|
Term
If you are publishing an application, when is the software available for installation? |
|
Definition
When the next user to whom the GPO applies logs on. |
|
|
Term
When you assign an application to a user, who starts the installation? |
|
Definition
User, or if "Install this application at logon" is checked, the setup is automatic. |
|
|
Term
When you assign an application to a computer, who starts the installation? |
|
Definition
Automatic when the computer starts. |
|
|
Term
What are the three areas within Group Policy that handle Active Directory Security? |
|
Definition
- Security Settings
- Auditing and Security Logging
- Security Configuration and Analysis
|
|
|
Term
When setting account policies in Active Directory, how many account policies per domain can be applied? |
|
Definition
|
|
Term
The policies in the _______ security area pertain to the security settings on the computer used by an application or user in the site, domain, or OU to which the GPO is linked. |
|
Definition
|
|
Term
What is a software management feature of Windows 2003 that is an administrators primary tool for managing software within an organization? |
|
Definition
Software Installation Extension |
|
|
Term
How is an application assigned to a user advertised? |
|
Definition
The next time he/she logs in regardless of which computer. |
|
|
Term
What is a service that allows OS to manage the installation process? |
|
Definition
|
|
Term
What are the three key parts to Windows Installer? |
|
Definition
|
|
Term
(T/F) Installation options affect how an application is installed, managed, and removed. |
|
Definition
|
|
Term
What security area provides an important new security feature that acts as a governor for group membership? |
|
Definition
|
|
Term
What security area is used to configure security and startup settings for services running on a computer? |
|
Definition
|
|
Term
(T/F) System services used on a computer should not be tracked. |
|
Definition
|
|
Term
(T/F) Unnecessary or unused services should be set to manual. |
|
Definition
|
|
Term
What attributes does the Event Log security area define in relation to the application, security and system event logs? |
|
Definition
- Max log size
- Access rights for each log
- Retention settings and methods
|
|
|
Term
Can you manage individual settings using the GPMC? |
|
Definition
|
|
Term
Name one of the new functions that GPMC introduces. |
|
Definition
- Reporting
- Backup and Restore for individual GPOs
- Scripting GPO management tasks
|
|
|
Term
(T/F) GPMC helps you learn and understand Group Policy architecture better because of its intuitive user interface. |
|
Definition
|
|
Term
(T/F) GPMC makes it harder to deploy, manage and troubleshoot Group Policy. |
|
Definition
|
|
Term
(T/F) GPMC is one of the Windows Server 2003 Feature Packs. |
|
Definition
|
|
Term
What OS must be running in the computer intwo which you want to install GPMC? |
|
Definition
- Windows Server 2003
- Windows XP with SP1 and .NET Framework
|
|
|
Term
You can run the GPMC from the _____ menu. |
|
Definition
|
|
Term
Name the two top-levels on the left pane of the GPMC. |
|
Definition
- Group Policy Management
- Forest
|
|
|
Term
What node provides you with access to the Group Policy Modeling Wizard, which helps you plan policy deployment and simulate settings for testing purposes? |
|
Definition
|
|
Term
What node provides access to the Group Policy Results Wizard? |
|
Definition
|
|
Term
(T/F) Sites are hidden by default. |
|
Definition
|
|
Term
What are the four nodes listed under the Forest in GPMC? |
|
Definition
- Domains
- Sites
- Group Policy Modeling
- Group Policy results
|
|
|
Term
(T/F) Group Policy Management helps plan policy deployment and simulate settings for testing purposes. |
|
Definition
|
|
Term
What groups together all of the Group Policy Management functionality except managing individual settings? |
|
Definition
|
|