Filters
Question type

Study Flashcards

The ____ stores information about every object within a forest.


A) global catalog
B) global master
C) schema master
D) master catalog

Correct Answer

verifed

verified

A(n) ____ is a grouping of related objects within a domain,similar to the idea of having subfolders within a folder,and can be used to reflect the structure of the organization without having to completely restructure the domain(s) when that structure changes.


A) container
B) branch
C) tree
D) OU

Correct Answer

verifed

verified

____ and user accounts enable an organization to delegate authority over objects,such as Active Directory containers,user accounts,groups,and applications.


A) Tiered groups
B) Security groups
C) Organizational units
D) Administrative units

Correct Answer

verifed

verified

In Active Directory,a(n)____________________ is a fundamental component or container that holds information about all network resources that are grouped within it-servers,printers,and other physical resources,users,and user groups.

Correct Answer

verifed

verified

Every resource in a domain is called a(n) ____.


A) object
B) entity
C) entry
D) article

Correct Answer

verifed

verified

One reason for having an RODC is for better security at branch locations,where physical security measures might not be as strong as at a central office.

Correct Answer

verifed

verified

Match each term with the correct statement below. -The highest level in an Active Directory design


A) forest
B) member servers
C) namespace
D) mandatory user profile
E) schema
F) roaming profile
G) domain controllers
H) globally unique identifier
I) AD LDS

Correct Answer

verifed

verified

A

A ____ is one in which every child object contains the name of the parent object.


A) disjointed namespace
B) logical namespace
C) contained namespace
D) contiguous namespace

Correct Answer

verifed

verified

Match each term with the correct statement below. -A skeleton version of Active Directory Domain Services,housing only those elements needed for central configuration and data management required by applications,including directory replication and security services


A) forest
B) member servers
C) namespace
D) mandatory user profile
E) schema
F) roaming profile
G) domain controllers
H) globally unique identifier
I) AD LDS

Correct Answer

verifed

verified

List two types of changes that can now be tracked using auditing capabilities introduced in Active Directory in Windows Server 2008 R2.

Correct Answer

verifed

verified

Server administrators can track changes ...

View Answer

List two advantages of using profiles.

Correct Answer

verifed

verified

Multiple users can use the same computer and maintain their own customized settings.When users log on,they receive their own personalized settings that were saved when they last logged off. Profiles can be stored on a network server so they are available to users regardless of the computer they use to log on. Profiles can be made mandatory so users have the same settings each time they log on.When a user logs on,she can modify the settings but the changes are never saved when the user logs off.

The Windows Server 2008 option to stop Active Directory Domain Services can involve considerable downtime.

Correct Answer

verifed

verified

Discuss the advantages and reasons for creating more than one password and lockout policy based on security group or user.

Correct Answer

verifed

verified

With a single policy governing every acc...

View Answer

Discuss the policy sets that an organization might consider when planning fine-grained password policies.

Correct Answer

verifed

verified

When your organization plans fine-graine...

View Answer

Active Directory is a ____ that houses information about all network resources such as servers,printers,user accounts,groups of user accounts,security policies,and other information.


A) file service
B) domain
C) directory service
D) module

Correct Answer

verifed

verified

DNS is a TCP/IP-based name service that converts computer and domain host names to dotted decimal addresses and vice versa,through a process called ____.


A) address resolution
B) name resolution
C) domain resolution
D) host resolution

Correct Answer

verifed

verified

Explain the purpose of a local security group.

Correct Answer

verifed

verified

A local security group is used...

View Answer

AD LDS is installed as a server role via Server Manager.

Correct Answer

verifed

verified

True

A ____ is different from normal DCs in that you cannot use it to update information in Active Directory and it does not replicate to regular DCs.


A) Restricted Domain Controller
B) Limited Access Domain Controller
C) Read-Only Domain Controller
D) Replication-Limited Domain Controller

Correct Answer

verifed

verified

____ are used in Microsoft operating systems to provide a consistent working environment for one or more users.


A) Environments
B) Settings
C) Templates
D) Profiles

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer