Deck 4: Active Directory Design and Security Concepts

ملء الشاشة (f)
exit full mode
سؤال
Which of the following answers is not a task that can be delegated

A)Create,delete,and manage user accounts
B)Reset user passwords and force password change at next logon
C)Read all user information
D)Create,delete,and manage built-in user accounts
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Match a term below to the following description
The process for replicating Active Directory objects in which changes to the database can occur on any domain controller and are propagated,or replicated,to all other domain controllers.

A)Multimaster replication
B)Intersite replication
C)Intrasite replication
D)Database replication
سؤال
Which of the following is not a valid directory partition type?

A)Domain directory partition
B)Schema directory partition
C)Extended directory partition
D)Global catalog partition
سؤال
All computers assigned an address in a subnet require a router to communicate with one another.
سؤال
A Discretionary access control list (DACL)____.

A)defines the settings for auditing access to an object
B)only applies to users accessing resources from a dialup connection
C)is a list of security principals,with each having a set of permissions that define access to the object
D)can only be edited by the object owner
سؤال
The Lightweight Directory Access Protocol is based on which of the following technologies?

A)X.509
B)X.500
C)X.405
D)X.900
سؤال
To verify who has been delegated control of an OU,you must ____.

A)use the dsview /delegated command
B)be the owner of the OU
C)view the OU's permissions
D)be on the original domain controller where permission was delegated
سؤال
Which directory partition contains all objects in a domain,including users,groups,computers,OUs,and other objects?

A)Global Catalog partition
B)Domain directory partition
C)Application directory partition
D)Configuration partition
سؤال
Explicit permissions never override inherited permissions.
سؤال
Which operations master role is responsible for ensuring that changes made to object names in one domain are updated in references to these objects in other domains?

A)Schema master
B)Infrastructure master
C)Domain naming master
D)RID master
سؤال
Which of the following statements about operations master roles is correct?

A)By default,the Infrastructure master is chosen randomly per domain
B)There can be multiple schema masters per domain
C)The RID Master is responsible for providing backward compatibility with NT domain controllers
D)There is only one domain naming master per forest,which must be available whenever domains are added,deleted,or renamed.
سؤال
What directory partition contains information needed to define Active Directory objects and object attributes for all domains in the forest?

A)Schema directory partition
B)Global Catalog partition
C)Application directory partition
D)Configuration partition
سؤال
A schema can be changed by an administrator or an application to best suit an organization's needs.
سؤال
A dedicated forest root domain contains only the forestwide administrative accounts and domain controllers needed to run the forestwide operations master roles.No additional OUs or server roles are installed.
سؤال
The user "TestUserA" has been added to an objects DACL and assigned the Allow Full control permission.However,"TestUserA" has inherited the Deny Full Control permission for the object from its parent container.What is "TestUserA"'s effective permissions?

A)TestUserA has Full Control permissions
B)TestUserA has no permissions due to Deny Full Control
C)TestUserA is given default permissions for the object because Full Control and Deny Full Control cancel each other out
D)This can't be done because conflicting permissions are not allowed in an object's DACL
سؤال
Inherited permissions can't be changed or removed without ____.

A)using the "Inherited Permissions Modify" tool
B)having to recreate the object entirely
C)knowing the object's password
D)disabling permission inheritance first
سؤال
The group "TestGroup" has been added to an objects DACL and assigned the Allow Full control permission."TestUserA" is a member of "TestGroup",which has been assigned Deny Write permission for the object.What is "TestUserA"'s effective permissions?

A)TestUserA has no permissions to the object because he has been denied write access.
B)TestUserA can do anything that Full Control would allow him to do,except write to the object.
C)TestUserA is part of TestGroup,therefore TestUserA has Full Control permissions regardless of the Deny Write permission.
D)This can't happen because conflicting permissions are not allowed in an object's DACL.
سؤال
Which operations master role is responsible for providing backwards compatibility with Windows NT servers configured as Windows NT backup domain controllers or member servers?

A)PDC emulator master
B)RID master
C)Domain naming master
D)Schema master
سؤال
A site link is needed to connect two or more sites for replication purposes.
سؤال
Which of the following is not a valid operations master role?

A)Schema master
B)Infrastructure master
C)User management master
D)RID master
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
An Active Directory object that can be assigned permissions or rights to Active Directory objects and network resources
سؤال
A user principal name (UPN)follows the format ____________________.
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A domain controller with sole responsibility for certain domain or forestwide functions
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
The part of the SID that's unique for each Active Directory object
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A trust relationship in which one domain trusts another,but the reverse is not true
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
The first domain created in a new forest
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
Active Directory replication between domain controllers in the same site
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A protocol that runs over TCP/IP and is designed to facilitate access to directory services and directory objects
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A section of an Active Directory database stored on a domain controller's hard drive
سؤال
The _________________________ is a directory partition and contains the most commonly accessed object attributes to facilitate object searches and user logons across domains.
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A user logon name that follows the format username@domain
سؤال
Which of the following is not an advantage of running a dedicated forest root domain?

A)security
B)manageability
C)flexibility
D)reliability
سؤال
Lightweight Directory Access Protocol (LDAP)was created by the ______________________________.
سؤال
A process called ____ runs on every domain controller to determine the replication topology which defines the domain controller path that Active Directory changes flow through.

A)Replication
B)AD Route
C)Knowledge Consistency Checker (KCC)
D)trust relationship
سؤال
What is the name of the default site link that is created when Active Directory is first installed?

A)SITELINKIPDEFAULT
B)DEFAULTIPSITELINK
C)SITELINKDEFAULTIP
D)SITELINKDEFAULT
سؤال
A(n)____ is a one-way or two-way nontransitive trust between two domains that aren't in the same forest

A)External trust
B)Shortcut trust
C)Forest Trust
D)Outsite trust
سؤال
Each entry in the Discretionary access control list is referred to as an ACE.What does ACE stand for?

A)Acceptable Control Extension
B)Access Control Extension
C)Access Control Entry
D)Applied Control Entry
سؤال
A ____ is configured manually between domains to bypass the normal referral process.

A)Shortcut trust
B)transitive trust
C)Forest trust
D)one-way trust
سؤال
______________________________ defines the settings for auditing access to an object.
سؤال
_________________________ defines how permissions are transmitted from a parent object to a child object.
سؤال
What is the name of the default site link created when Active Directory is installed?
سؤال
What term best fits this description:
A trust in which both domains in the relationship trust each other,so users from both domains can access resources in the other domain.
سؤال
What service most commonly makes use of an application directory partition for it's database?
سؤال
What term best fits this description:
Specialized domain controller tasks that handle operations that can affect the entire domain or forest.
سؤال
What MMC do you use to create OUs?
سؤال
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
What can you do to integrate user authentication between Linux and Active Directory?
سؤال
What can you do to reduce the delay caused by authentication referral?
سؤال
What MMC is used to create sites?
سؤال
What term best fits this description:
An open-standard security protocol used to secure authentication and identification between parties in a network
سؤال
What does ISTG stand for?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Active Directory Design and Security Concepts
1
Which of the following answers is not a task that can be delegated

A)Create,delete,and manage user accounts
B)Reset user passwords and force password change at next logon
C)Read all user information
D)Create,delete,and manage built-in user accounts
D
2
Match a term below to the following description
The process for replicating Active Directory objects in which changes to the database can occur on any domain controller and are propagated,or replicated,to all other domain controllers.

A)Multimaster replication
B)Intersite replication
C)Intrasite replication
D)Database replication
A
3
Which of the following is not a valid directory partition type?

A)Domain directory partition
B)Schema directory partition
C)Extended directory partition
D)Global catalog partition
C
4
All computers assigned an address in a subnet require a router to communicate with one another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A Discretionary access control list (DACL)____.

A)defines the settings for auditing access to an object
B)only applies to users accessing resources from a dialup connection
C)is a list of security principals,with each having a set of permissions that define access to the object
D)can only be edited by the object owner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The Lightweight Directory Access Protocol is based on which of the following technologies?

A)X.509
B)X.500
C)X.405
D)X.900
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
To verify who has been delegated control of an OU,you must ____.

A)use the dsview /delegated command
B)be the owner of the OU
C)view the OU's permissions
D)be on the original domain controller where permission was delegated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which directory partition contains all objects in a domain,including users,groups,computers,OUs,and other objects?

A)Global Catalog partition
B)Domain directory partition
C)Application directory partition
D)Configuration partition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Explicit permissions never override inherited permissions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which operations master role is responsible for ensuring that changes made to object names in one domain are updated in references to these objects in other domains?

A)Schema master
B)Infrastructure master
C)Domain naming master
D)RID master
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following statements about operations master roles is correct?

A)By default,the Infrastructure master is chosen randomly per domain
B)There can be multiple schema masters per domain
C)The RID Master is responsible for providing backward compatibility with NT domain controllers
D)There is only one domain naming master per forest,which must be available whenever domains are added,deleted,or renamed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What directory partition contains information needed to define Active Directory objects and object attributes for all domains in the forest?

A)Schema directory partition
B)Global Catalog partition
C)Application directory partition
D)Configuration partition
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
A schema can be changed by an administrator or an application to best suit an organization's needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A dedicated forest root domain contains only the forestwide administrative accounts and domain controllers needed to run the forestwide operations master roles.No additional OUs or server roles are installed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
The user "TestUserA" has been added to an objects DACL and assigned the Allow Full control permission.However,"TestUserA" has inherited the Deny Full Control permission for the object from its parent container.What is "TestUserA"'s effective permissions?

A)TestUserA has Full Control permissions
B)TestUserA has no permissions due to Deny Full Control
C)TestUserA is given default permissions for the object because Full Control and Deny Full Control cancel each other out
D)This can't be done because conflicting permissions are not allowed in an object's DACL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Inherited permissions can't be changed or removed without ____.

A)using the "Inherited Permissions Modify" tool
B)having to recreate the object entirely
C)knowing the object's password
D)disabling permission inheritance first
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The group "TestGroup" has been added to an objects DACL and assigned the Allow Full control permission."TestUserA" is a member of "TestGroup",which has been assigned Deny Write permission for the object.What is "TestUserA"'s effective permissions?

A)TestUserA has no permissions to the object because he has been denied write access.
B)TestUserA can do anything that Full Control would allow him to do,except write to the object.
C)TestUserA is part of TestGroup,therefore TestUserA has Full Control permissions regardless of the Deny Write permission.
D)This can't happen because conflicting permissions are not allowed in an object's DACL.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which operations master role is responsible for providing backwards compatibility with Windows NT servers configured as Windows NT backup domain controllers or member servers?

A)PDC emulator master
B)RID master
C)Domain naming master
D)Schema master
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A site link is needed to connect two or more sites for replication purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not a valid operations master role?

A)Schema master
B)Infrastructure master
C)User management master
D)RID master
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
An Active Directory object that can be assigned permissions or rights to Active Directory objects and network resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
A user principal name (UPN)follows the format ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A domain controller with sole responsibility for certain domain or forestwide functions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
The part of the SID that's unique for each Active Directory object
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A trust relationship in which one domain trusts another,but the reverse is not true
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
The first domain created in a new forest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
Active Directory replication between domain controllers in the same site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A protocol that runs over TCP/IP and is designed to facilitate access to directory services and directory objects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A section of an Active Directory database stored on a domain controller's hard drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The _________________________ is a directory partition and contains the most commonly accessed object attributes to facilitate object searches and user logons across domains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
A user logon name that follows the format username@domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is not an advantage of running a dedicated forest root domain?

A)security
B)manageability
C)flexibility
D)reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Lightweight Directory Access Protocol (LDAP)was created by the ______________________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A process called ____ runs on every domain controller to determine the replication topology which defines the domain controller path that Active Directory changes flow through.

A)Replication
B)AD Route
C)Knowledge Consistency Checker (KCC)
D)trust relationship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is the name of the default site link that is created when Active Directory is first installed?

A)SITELINKIPDEFAULT
B)DEFAULTIPSITELINK
C)SITELINKDEFAULTIP
D)SITELINKDEFAULT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n)____ is a one-way or two-way nontransitive trust between two domains that aren't in the same forest

A)External trust
B)Shortcut trust
C)Forest Trust
D)Outsite trust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Each entry in the Discretionary access control list is referred to as an ACE.What does ACE stand for?

A)Acceptable Control Extension
B)Access Control Extension
C)Access Control Entry
D)Applied Control Entry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
A ____ is configured manually between domains to bypass the normal referral process.

A)Shortcut trust
B)transitive trust
C)Forest trust
D)one-way trust
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
______________________________ defines the settings for auditing access to an object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
_________________________ defines how permissions are transmitted from a parent object to a child object.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is the name of the default site link created when Active Directory is installed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
What term best fits this description:
A trust in which both domains in the relationship trust each other,so users from both domains can access resources in the other domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What service most commonly makes use of an application directory partition for it's database?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
What term best fits this description:
Specialized domain controller tasks that handle operations that can affect the entire domain or forest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What MMC do you use to create OUs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
MATCHING
a.Forest root domain
f.Operations master
b.directory partition
g.relative identifier
c.intrasite replication
h.security principals
d.One-way trust
i.user principal name (UPN)
e.LDAP
What can you do to integrate user authentication between Linux and Active Directory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What can you do to reduce the delay caused by authentication referral?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What MMC is used to create sites?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What term best fits this description:
An open-standard security protocol used to secure authentication and identification between parties in a network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What does ISTG stand for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.