CNIT 242 Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to lecture, ___ days is typically the optimal duration between password changes.

90

Match the characteristic to its associated virtualization architecture 1. Also known as workstation virtualization 2. Allows for the most efficient use of the underlying hardware 3. The virtualization layer is installed on top of an existing OS as an application 4. Virtualization layer is installed directly on the server hardware 5. Typically allows the best support for underlying peripherals (sound cards, USB ports) A. Client-Based (Hosted) Architecture B. Bare-Metal (Hypervisor) Architecture C. Both

A. Client-Based (Hosted) Architecture: 1,3,5 B. Bare-Metal (Hypervisor) Architecture: 4 C. Both: 2

Which of the following is not a reason to implement directory services rather than relying on individual machine accounts? A. Enable two-factor authentication B. Reduce the number of accounts and passwords to manage C. Provide a single point of administration D. Make it easier to assign/move permissions and rights to users

A. Enable two-factor authentication

GPO settings are set to which of the following by default A. Not Configured B. Enabled C. Disabled D. Enforced

A. Not Configured

Match the virtualization term to is associated definition A. Hypervisor B. Guest Operating System C. Virtual Machine (VM) D. Host Operating System 1. Each environment available for O/S installation 2. The operating system installed on a VM 3. In a hosted architecture the O/S in which the virtualization software runs 4. The software that provides the virtualization layer

A:4 B:2 C:1 D:3

The best way to resolve the issue of profile version differences (such as XP and Vista+) is to: A. Roaming Profiles B. Folder Redirection C. Offline Files D. Group policy to enforce compatibility settings E. A & C F. All of the above are equally effective in resolving profile version differences

B. Folder Redirection

Which of the following is NOT a way in which an administrator can control group policy inheritance A. Inheritance can be blocked for a GPO - forcing a child GPO to apply regardless of conflict B. Inheritance can be forced to override lower-level GPOs - forcing a parent GPO to apply regardless of conflict C. Inheritance can be disabled domain-wide D. All of these are ways in which an administrator can control group policy inheritance

C. Inheritance can be disabled domain-wide: Because inheritance can be blocked or forced, but not disabled throughout the domain

Your PC can communicate with a web server using the IP address, but not through fully qualified domain name (FQDN). What might be wrong A. The web server is malfunctioning B. The configured DNS server of the PC is malfunctioning C. Your PC is misconfigured to use a non-existing DNS server D. B & C E. All of the above could be the reason for the problem

D. B & C: The DNS server you are querying is nonexistent, malfunctioning, or misconfigured. Other issues could include network connectivity between the DNS server and the authoritative server, or an issue with an intermediate or authoritative server

Which of the following is not a built-in advantage of using a virtualized server architecture A. Provides a consistent hardware interface regardless of underlying physical hardware B. Increased capacity and scalability C. Lower infrastructure cost D. Reduced energy costs E. Increased reliability

E. Increased reliability: using virtualization will inherently create single points of failure. These can be addressed by adding redundancy in your virtual machine architecture

Which of the following best explains a domain that uses only local profiles

Each user will have a completely separate profile on each computer & Logging into a new computer will create a new local profile for the user on that machine

Which of the following is not contained in a user profile A. Desktop B. Application Settings C. My Documents D. Favorites E. A & B F. All of the above are in a user profile

F. All of the above are in a user profile

FSMO (Flexible Single Master Operation) roles are replicated to all domain controllers

False

Special characters. such as ?*"\ can be used in NetBIOS name

False

sysinit is a Windows utility that will clear all config settings

False

You can install Active Directory on Windows Server without having an existing DNS server or installing a new DNS server

False, A DNS server that supports dynamic updates is required to implement Active Directory

Active Directory is required to implement a DFS namespace.

False, AD is required to create a domain namespace, but a server namespace can be created in a non-domain environment

Access Control Lists provide one method of authentication

False, Access Control Lists provide a means of authorization

Authentication is the process of determining what users should be able to do

False, Authorization is the process of determining what users should be able to do

RADIUS is typically only used for authentication to network equipment for configuration purposes and terminal access

False, RADIUS is typically used to authenticate to network access devices to gain network access

A RAID (Redundant Array of Independent Disks) made up of four 250 GB drives will have 1 TB of available space

False, RAID five has a redundancy overhead of one's drive's capacity. A RAID 5 of four 250 GB dries would have 750 GB of available capacity

The default network printing protocol used in modern Windows implementation is LPR.

False, RAW is the protocol has replaced LPR in modern Windows network printing implementations

Solid state drives (SSD) offer better performance across all metrics than magnetic hard drives

False, SSDs offer significantly better seek time, but may not offer an improvement in sustained read or write time

Snapshots provide a complete VM backup solution

False, a snapshot only allows you to go back to a previous point in time. If the underlying disk is corrupted the snapshot will be corrupted as well

Virtualization is a fairly new technology that dates back to the late 90s

False, dates back to the 60s

File permissions can be directly assigned to organizational units (OU)

False, file permissions are to be assigned to users or user groups. OUs are used for group policy and attributes

In an enterprise environment, it is best to assign permissions to individual users

False, it is best to assign permissions to groups and place the applicable user(s) in the group

The best approach to implementing group policy is to create/modify one policy per OU that contains all of the applicable settings

False, the best approach is to create separate policies for each setting and link them to applicable OUs. This creates a single point of administration for each policy. By making a change to the policy it will affect all OUs linked to the policy

The server containing the actual files being shared is called the namespace server

False, the namespace server is the server containing the reference to the target

When using VMware's vMotion, the VM being moved must be shutdown prior to the move

False, the point of vMotion is to move a running VM

The two basic parts of authentication are usernames and passwords

False, the two basic parts of authentication are identity and proof of identity

The two most commonly used page description languages are PostScript and HPLC

False, the two most commonly used page description languages are PostScript and PCL

The terms SAN (Storage Area Network) and NAS (Network Attached Storage) are interchangeable

False, they are quite different. For one example, SAN accesses data as if it were a local hard drive and NAS accesses data as if it were a network attached drive

An advantage of Folder Redirection is that users can access their files even if they aren't connected to the network

False, using folder redirection users cannot access their desktop and my documents when they are not connected to the network

A server will be inherently more secure if installed in a virtual environment than if installed on physical hardware

False, while virtualization does not typically add security vulnerabilities, it also does not eliminate existing vulnerabilities

The order of scale, from smallest to largest, in an Active Directory is...

Subnet, Site, Domain, Forest

The tool used to rename a domain is:

There is none, you cannot rename a domain

A Windows Server 2008 or newer print server can be configured to automatically provide drivers to clients running any version of Windows.

True

A computer's NetBIOS name and DNS hostname are independent. However, they should be set to the same value

True

Business Class computers typically have more hardware consistency though time than consumer market machines

True

CUPS is commonly used to provide network print services for UNIX computers.

True

DFS replication can be configured to use only limited bandwidth and to sync only during specific times

True

Directories are hierarchical in nature

True

I/O systems suffer the biggest performance hit in virtualized systems

True

Modern network printing almost always includes the use of a print server

True

Read, write and execute are examples of file system permissions

True

Software can be pushed to Windows clients using GPO

True

The Kerberos protocol operates using a 6-step process. Steps 3 and 4 involve communication with a Ticket Granting Server

True

The cost of deploying and maintaining clients will typically cost more than the original system purchase

True

The number one rule of passwords is: Do not write them down

True

The top level 'share' in a DFS namespace is called the DFS Root

True

The two main services in DFS are namespaces and replication

True

The type of file system (FAT32, NTFS, VMFS, ext4) determines the max file size, naming convection, and max size of a partition/volume

True

WSUS is a solution that allows a sys admin to control updating of Microsoft software

True

Windows Active Directory can work with most DNS servers as long as they support dynamic updates

True, as long as the DNS server includes dynamic update capability it can be used with AD

A NAS (Network Attached Storage) is effectively the same as a network share on a server

True, from the perspective of the client, a NAS is exactly the same thing as a network share on a file server

By default, if an enabled GPO setting in the parent OU conflicts with an enabled GPO setting in the child OU. the GPO setting in the child OU wins

True, the GPOs are applied in order from the root to the object. If both the parent OU and the child OU have a setting applied, the parent setting will be applied, then the child setting will be applied. If effect, the child setting would "win" in this scenario

In an environment with a single ESXi server, vCenter provides limited benefit

True, the only benefits would be authentication against AD and access to the web client. The main benefits of vMotion, High Availability, fail-over, require multiple ESXi servers to implement in addition to vCenter

A VMs O/S clock should not be synchronized directly via NTP

True, the time will wander due to changes in the virtual CPU's clock. It is best to synchronize the VM server's clock via NTP and use VMware tools to sync the VM clock to the server

DNS, as currently deployed, has no formal security included

True, there is no authentication, authorization, non repudiation, or encryption in DNS

Modern Virtualization solution allow read-only memory holding common information to be addressed by multiple VMs

True, this approach is more efficient and allows more VMs per server than would be available otherwise

What are two components to a GPO

User & Computer

The Active Directory _____ is the blueprint for what attributes the AD can store

Schema

When placing users in groups for use in ACLs, the users should be placed in what type of group?

Security Group, because only these groups can be used in ACLs

Which of the following are problematic when using roaming profiles A. Login and logout times can be significantly increased B. Files and settings are left behind on every computer that is not connected to the network C. A user cannot log into a computer that is not connected to the network D. A & B E. All of the above are problematic when using roaming profiles

D. A & B: Log in and logout times are extended and files are left behind on every computer the user has logged into

A location in a directory can be either absolute or relative. If a location is relative, the starting location is known as the___

Context

Active Directory supports this ISO standard for directory access

LDAP(Lightweight Directory Access Protocol): This is an ISO/IETF standard for accessing directory information. Active Directory's support for LDAP enable it to be used by many third party applications for user lookup and authentication


Ensembles d'études connexes

Chapter 15 Pregnancy at Risk: Gestational Onset

View Set

PATHOPHYSIOLOGY NEURO, RENAL, ENDOCRINE

View Set

ATI Pharmacology: Endocrine System

View Set

ANATOMY KEY CONCEPTS CH 6.1-6.12

View Set

Module 14: Sinnott-Armstrong, "It's Not My Fault: Global Warming and Moral Obligations"

View Set