CIST 2412 - Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What security improvement allows you to begin the installation of an RODC from a secure central location before completing it at the remote site where the RODC will be housed? a. Staged installation b. two-part installation c. Part I installation d. Multi-part installation

Staged installation

Which audit category includes events such as server startup and shutdown, time changes, and clearing the security log within the Windows Event Viewer? a.Process tracking b.Privileged use c.System Events d.Policy management

System Events

What term describes the length of time for which a DNS record is valid, after which it needs to be re-registered? a. Protocol b. Priority c. Weight d. Time-to-Live

Time-to-Live

Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU

User

What language is used to write WMI queries? a.SQL b.T-SQL c.VBScript d.WQL

WQL

Each object's SID consists of two components: the domain portion and the ________. a.remote identifier b.globally unique identifier c. relative identifier d.global identifier

relative identifier

You are logging onto an Active Directory child domain from a workstation running Windows Vista Business. By default, where will this workstation look to synchronize its clock with the domain? a. The PDC Emulator for the child domain b. The PDC Emulator for the forest root domain. c. An external clock d. The domain controller that authenticates the workstation

the domain controller that authenticates the workstation

As part of your efforts to deploy all new applications using Group Policy, you discover that several of the applications you wish to deploy do not include the necessary installer files. What can you use to deploy these applications? a.Software restriction policies b. .msi files c. .mdb files d. .zap files

.zap files

You are the administrator of an Active Directory forest that contains a forest root domain with three child domains. How many of each FSMO does this forest contain? a.1 Domain Naming Master, 1 Schema Master, 3 PDC Emulators, 3 Infrastructure Masters, 3 RID Masters b.3 Domain Naming Masters, 3 Schema Masters, 3 PDC Emulators, 3 Infrastructure Masters, 3 RID Masters c.1 Domain Naming Master, 1 Schema Master, 4 PDC Emulators, 4 Infrastructure Masters, 4 RID Masters d.1 Domain Naming Master, 1 Schema Master, 1 PDC Emulator, 1 Infrastructure Master, 1 RID Master

1 Domain Naming Master, 1 Schema Master, 4 PDC Emulators, 4 Infrastructure Masters, 4 RID Masters

The RID Master FSMO distributes RIDs to domain controllers in increments of ____. a.100 b.250 c.500 d.1,000

500

Which file extension identifies Administrative templates in Windows Server 2008? a.ADM b.ADMX c.INF d.POL

ADMX

Which audit event type is triggered when user or group accounts are created, deleted, renamed, enabled, or disabled? a.Account logon events b.Account management events c.Privileged use events d.Policy management events

Account management events

What is the recommended method for moving Active Directory objects from one domain to another? a. Movetree.exe b. Dsmove c.Active Directory Migration Tool (ADMT) d.Drag-and-drop

Active Directory Migration Tool (ADMT)

What Windows Server 2008 feature allows you to configure a user or group as the local administrator of an RODC without delegating any rights to the user or group within Active Directory? a.Flexible Single Master Operations (FSMO) roles b.Admin Role Separation c. Staged Installations d.Active Directory Lightweight Domain Services (AD LDS)

Admin Role Separation

Which special identity group controls anonymous access to resources in Windows Server 2008? a.Everyone b.Network c.Interactive d.Anonymous Logon

Anonymous Logon

Monitoring a system such as Active Directory for the success and/or failure of specific user actions is called a.auditing b.inspecting c.scanning d.sniffing

Auditing

What is the single location within the SYSVOL share where ADMX files can be stored? a.Central Store b.Group Policy Container (GPC) c.Group Policy Template (GPT) d.Folder Redirection Store

Central Store

Which of the following rules will allow or disallow a script or a Windows Installer file to run on the basis of how the file has been signed? a.Path rule b.Hash rule c.Network zone rule d.Certificate rule

Certificate rule

What mechanism is used by an Active Directory domain controller to indicate that it has unreplicated changes to communicate to its replication partners? a. Preferred bridgehead servers b. Change notification c. Site link bridges d. Intersite replication

Change notification

Which database contains information used by Windows Management Instrumentation? a.Resultant Set of Policy (RSoP) b.SYSVOL c.Common Information Management Object Model (CIMOM) d.Group Policy Container (GPC)

Common Information Management Object Model (CIMOM)

Which interface allows you to grant limited permissions within Active Directory to individual users or groups to adhere to a principle of least privilege in administering Active Directory? a.Delegation of Authority Wizard b.Delegation of Control Wizard c.Control Wizard d.Authority Wizard

Delegation of Control Wizard

You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers? a. Delegation of control b. Read- Only Domain Controller c. Multimaster replication d. SRV records

Delegation of control

Which password-cracking attack functions by attempting every possible combination of alphanumeric characters until it finds a match? a.Trojan horse b.Dictionary attack c.Rootkit d.Boot virus

Dictionary Attack

Which of the following Default Security Levels in Software Restriction Policies will disallow any executable from running that has not been explicitly enabled by the Active Directory administrator? a.Basic User b.Restricted c.Disallowed d.Power User

Disallowed

Which feature allows you to control how much space a user can take on a particular hard drive volume, configurable via Group Policy? a.Disk quotas b.Folder redirection c.Offline files d.Object access auditing

Disk Quotas

The Schema Master FSMO for your forest will be taken offline for a few hours so that your hardware vendor can replace the motherboard of the server. To allow your clients to continue to log in, what is the minimum that you need to do? a.Transfer the Schema Master FSMO to another domain controller before taking it offline. b.Seize the Schema Master FSMO to another domain controller before taking it offline. c.Do nothing. Your clients will still be able to log in while the Schema Master is offline. d.Disable the domain controller's computer account from Active Directory Users and Computers before taking it offline.

Do nothing. Your clients will still be able to log in while the Schema Master is offline.

Which group scope can contain users and groups from any domain within an Active Directory forest, but can be used only to secure resources located within the same domain as the group itself? a.Domain group b.Global group c.Domain local group d.Universal group

Domain Local Group

Which account type is configured on an Active Directory domain controller and can be used to grant access to resources on any domain-joined computer? a.Domain local account b.Global account c.Domain account d.Local account

Domain account

What is the first domain installed in a new Active Directory forest called? a. Forest root domain b. Parent root domain c. Domain tree root d. Domain root

Domain tree root

To prevent users from re-using a certain number of network passwords, what can you configure as part of a domain-wide policy or as part of a Fine-Grained Password Policy? a.Minimum password length b.Minimum password age c.Maximum password age d.Enforce password history

Enforce password history

Although all writeable domain controllers use multimaster replication, there are certain sensitive operations that can only be controlled by one DC at a time. What is this functionality known as? a. Flexible Single Master Operations (FSMO) roles b. Flexible Multiple Master Operations (FMMO) roles c. Flexible Single Operations Master (FSOM) roles d. Flexible Multiple Operations Master (FMOM) roles

Flexible Single Master Operations (FSMO) roles

Which GPO setting automates the process of presenting user files from a network folder rather than an individual user's desktop, thus making them accessible from anywhere on the network? a.Roaming profiles b.Roaming documents c.Folder redirection d.Document redirection

Folder redirection

Which of the following is the security boundary within Active Directory? a. Forest b. Domain c. Domain tree root d. Domain root

Forest

What is the Active Directory component that contains a reference to all objects within Active Directory called? a. Main database b. Central catalog c. Global database d. Global catalog

Global catalog

Which utility is used to edit the settings contained in an individual Active Directory Group Policy Object? a.Group Policy Management Editor b.Group Policy Management Console c.GPResult d.Resultant Set of Policy

Group Policy Management Editor

Which GPMC component provides information analogous to Planning Mode in the Resultant Set of Policy MMC snap-in? a.Group Policy Modeling b.Group Policy Results c.Group Policy Management Editor d.Group Policy Object Editor

Group Policy Modeling

Which node within the Group Policy Management Console provides the effective policy settings applied to a particular user/computer combination? a.Group Policy Modeling b.Group Policy Results c.Group Policy Management Editor d.Group Policy Object Editor

Group Policy Results

Which folder stores policy settings, such as security settings and script files? a.Group Policy Container (GPC) b.Group Policy Object (GPO) c.SYSVOL d.Group Policy Template (GPT)

Group Policy Template (GPT)

What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure? a.Group scope b.Group security c.Special Identity group d.Security group

Group Scope

What technique is used to configure one security group as a member of another security group? a.Group security b.Group nesting c.Group overloading d.Group scope

Group nesting

Which of the following describes the mathematical equation that creates a digital "fingerprint" of a particular file? a.Hash rule b.Hash algorithm c.Software restriction policy d.Path rule

Hash algorithm

You have assigned several applications using GPOs. Users have complained that there is a delay when they double-click on the application icon, which you know is the result of the application being installed in the background. What option can you use to pre-install assigned applications when users log on or power on their computers? a.Uninstall when the application falls out of scope b.Install This Application At Logon c.Advanced Installation Mode d.Path rule

Install This Application at Logon

Which input file format allows you to create, modify, and delete objects within Active Directory? a.LDAP Data Interchange Format (LDIF) b.Comma Separated Value (CSV) c.Tab-delimited Text (TXT) d.Microsoft Excel (XLS)

LDAP Data Interchange Format (LDIF)

What is the process of applying a Group Policy Object to a particular container, such as a site, domain, or an organizational unit? a.Linking b.Inheriting c.Configuring d.Applying

Linking

Which Resultant Set of Policy mode queries existing GPOs linked to sites, domains, and OUs to report on currently-applied GPO settings? a.Planning mode b.Logging mode c.Extant mode d.Event Viewer mode

Logging Mode

To determine which users are accessing resources on a particular member server in an Active Directory domain, which event type would you audit? a.Account logon event b.Policy change event c.Account management event d.Logon event

Logon Event

What does each class or attribute that you add to the Active Directory schema need to have? a. Protocol b. Object Identifier c. Priority d. Port

Object Identifier

Which Group Policy feature allows users to access user files when the user is disconnected from the corporate network? a.Folder redirection b.Disk quotas c.Offline files d.Object access auditing

Offline files

RODCs do not participate in which of the following? a. Replication b. Cross-forest trusts c. Outbound replication d. External trusts

Outbound replication

10.With a username, what is needed to access network resources in a default Active Directory environment? a.Password b.Access Token c.Smart card d.PIN

Password

What type of object will you create to enable multiple password policies within a Windows Server 2008 domain? a.msDS-MinimumPasswordLength b.msDS-MultiplePasswordPolicies c.PasswordSettingsObject (PSO) d.msDS-PasswordObject

PasswordSettingsObject (PSO)

What is a numeric or alphanumeric character sequence that you enter with a smart card to access a server or other Active Directory resource? a.Personal Identification Number (PIN) b.Password Identification Number (PIN) c.Smart card password d.Smart card identifier

Personal Identification Number (PIN)

Which Resultant Set of Policy mode can be used to obtain Group Policy Modeling information? a.Logging mode b.Planning mode c.Event Viewer mode d.Design mode

Planning Mode

What mechanism within DNS is used to set up load balancing between multiple servers that are advertising the same SRV records? a. Protocol b. Domain name c. Port d. Priority

Priority

You wish to deploy several software applications using Group Policy, such that the applications can be manually installed by the users from the Add/Remove Programs applet in their local Control Panel. Which installation option should you select? a.Assign b.Disallowed c.Publish d.Unrestricted

Publish

When creating a site link, you can configure it to use which of the following protocols? a. TCP/IP or RPC over IP b. RPC over IP or SMTP c. SMTP or TCP/IP d. SMTP or CIDR

RPC over IP or SMTP

Which configuration item has a default value of 90 minutes for workstations and member servers, with a random offset of 0 to 30 minutes to optimize network performance? a.Refresh time b.Refresh interval c.Clock skew d.Clock interval

Refresh interval

You are the administrator for a network that has several sites. There is a site link from the main headquarters to each remote site for file transfer and replication purposes. You have been asked to create five new users on the network, and several of the users need immediate access to network applications. When asked by your manager how long replication of these new accounts will take, what is your response? a. Replication occurs every 180 minutes by default. b. Replication occurs at 15-minute intervals. c. Replication occurs as soon as the account is added. d. Replication occurs only between 12:00 AM and 6:00 AM.

Replication occurs every 180 minutes by default

Given the scenario in question 4, how long would it take for other DCs within the headquarters site to replicate the accounts belonging to the new users? a. Replication occurs every 180 minutes by default. b. Replication occurs at 15-minute intervals. c. Replication occurs within 45 seconds of the account being added. d. Replication occurs only between 12:00 AM and 6:00 AM.

Replication occurs within 45 seconds of the account being added

Which Windows Server 2008 feature enables you to perform certain Active Directory maintenance functions without needing to reboot the domain controller? a. Directory Services Restore Mode b. Safe Mode c. Safe Mode with Networking d. Restartable Active Directory

Restartable Active Directory

Which of the following is not one of the Default Security Levels that can be used with a software restriction policy? a.Basic User b.Unrestricted c.Restricted d.Disallowed

Restricted

What is a GUI-based query engine that looks at a configured GPO in a forest and then reports its findings? a.Resultant Set of Policy (RSoP) b.Gpresult c.Gpupdate d.Group Policy Management Editor

Resultant Set of Policy (RSoP)

What is a new GUI option in Windows Server 2008 and Windows Vista that allows you to launch a specific application using elevated privileges? a.Delegation of Control Wizard b.Active Directory Administrative Credentials c.Run as Administrator d.Delegation of Privilege Wizard

Run as Administrator

Which program allows you to use the Secondary Logon service to launch individual programs and utilities using administrative privileges? a. Runas b. Wscript c. Cscript d. Secwiz

Runas

What is required by DNS for Active Directory to function? a. Dynamic update support b. DHCP forwarding support c. SRV records support d. Active Directory integration

SRV records support

Which service enables you to use the runas command-line utility? a.Secondary Service b.Secondary Logon c.Runas Service d.Alternate Credentials Service

Secondary Logon

Which group type allows you to assign permissions to resources, as well as receive messages via Active Directory-enabled email applications such as Microsoft Exchange? a.Distribution group b.Exchange group c.Permissions group d.Security group

Security group

Which technique allows you to specify individual users or groups within a container who should or should not receive the settings configured in a particular GPO? a.Block Policy Inheritance b.Security group filtering c.Linking d.No Override

Security group filtering

What is a new installation option in Windows Server 2008 that features a minimal installation footprint designed to run specific infrastructure services? a. RODC b. FSMO c. Server Core d. Web Server Edition

Server Core

What is the new unified tool, introduced by Windows Server 2008, for managing numerous aspects of a 2008 server? a. Computer Management b. Server Manager c. Active Directory Users & Computers d. Active Directory Domains & Trusts

Server Manager

Company XYZ is a national company with locations in Detroit, Minneapolis, Phoenix, and Dallas. There are two connections between Detroit and Minneapolis. The first is a T-1 link and the second is a 128-Kbps link. When setting up the site links for replication, what should you do to ensure that the 128-Kbps link is used only if the T-1 is unavailable? a. Set a cost of 1 for the T-1 and a cost of 5 for the 128-Kbps link. b. Set a cost of 5 for the T-1 and 1 for the 128-Kbps link. c. Leave the costs at their default value of 100. d. Change the schedule manually to disallow replication on the 128-Kbps link until it is needed.

Set a cost of 1 for the T-1 and a cost of 5 for the 128 -Kbps link

What is a new feature in Windows Server 2008 that allows you to configure a GPO "pattern" that you can use to create additional GPOs beginning with the same settings in the pattern? a.Group Policy Container (GPC) b.Group Policy Template (GPT) c.Starter GPO d.Central Store

Starter GPO

What is a password that has sufficient length and complexity that it is difficult for a hacker or other malicious user to hack? a.Long password b.Smart card password c.Strong password d.Personal identification password

Strong Password

To optimize client authentication and location of resources, which kind of object should each Active Directory site contain? a. Site links b. Costs c. Connection objects d. Subnets

Subnets

Which type of GPO processing requires that each GPO must be read and applied completely before the next policy can be processed? a.Synchronous processing b.Asynchronous processing c.Multisynchronous processing d.Unisynchronous processing

Synchronous processing

Which of the following is used to develop information systems software through a structured process that includes analysis, design, implementation, and maintenance? a.Hash algorithm b.System Development Life Cycle c.Software Restriction Policy d.Group Policy Object

System Development Life Cycle

To which port does the _gc SRV record listen? a.TCP 445 b.UDP 137 c.TCP 3268 d.UDP 445

TCP 3268

You have a Group Policy Object used to install a particular software application. Because this is a resource-intensive application, you want the software to be installed only on computers that have at least 1GB of RAM. What feature can you use to restrict the application of this GPO to computers that meet this criterion? a.Security group filtering b.WQL filtering c.WMI filtering d.CIMOM filtering

WMI filtering

When would you disable automatic site-link bridging within Active Directory Sites and Services? a. When you need to configure intersite replication b. When you wish to configure different costs for your site links c. When your physical network is not fully routed d. When you wish to control the hours during which intersite replication will occur

When your physical network is not fully routed

Which feature, new to Windows Server 2008, allows you to install workstation operating systems and software in an enterprise environment? a.Remote Installation Service (RIS) b.Folder redirection c.Windows Deployment Services (WDS) d.Offline file storage

Windows Deployment Services (WDS)

What provides a common framework that can be used to query servers and workstations for information about specific hardware or software, such as RAM, hard drive space, running services, and installed software? a.Common Information Management Object Model (CIMOM) b.Resultant Set of Policy (RSoP) c.Windows Management Instrumentation (WMI) d.Group Policy Objects

Windows Management Instrumentation (WMI)

What can be used to run script files using VBScript or JScript from the Windows desktop or from a command prompt? a.Visual Basic b.Windows Scripting Host (WSH) c.Visual Basic Express d.Windows Scripting Engine

Windows Scripting Host (WSH)

Which of the following domain controllers can be joined to a forest that is currently set at the Windows Server 2008 forest functional level? a. Windows 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows NT 4.0

Windows Server 2008

You are a member of the Domain Admins group of a child domain on an Active Directory network. You have an application that requires you to configure an application directory partition, but you find that you are unable to do so. What could be preventing you from creating an application directory partition in your domain? a.You must be a member of the Enterprise Admins group to create an application directory partition. b.You must be a member of the Schema Admins group to create an application directory partition. c.You must be a member of the Forest Admins group to create an application directory partition. d.You must be a member of the DNS Admins group to create an application directory partition.

You must be a member of the Enterprise Admins group to create an application directory partition.

Which file type is used by Windows Installer? a. .inf b. .bat c. .msf d. .msi file

.msi file

The KCC is responsible for calculating intrasite replication partners. During this process, what is the maximum number of hops that the KCC will allow between domain controllers? a. 2 b. 3 c. 4 d. 5

3

You can view and manage the PDC Emulator FSMO role holder using which utility? a. Active Directory Users and Computers b. Active Directory Schema c. Active Directory Sites and Services d. Active Directory Domains and Trusts

Active Directory Users and Computers

The Administrator and Guest user accounts are examples of a.Special identity user account b.Administrative user account c.Built-in user account d.Domain user account

Built-in user account

Which naming context contains forest-wide data about the physical topology of an Active Directory forest? a. Schema b. ForestDNSZones c. Configuration d. Domain DNS Zones

Configuration

Which of the following naming contexts are replicated across an entire Active Directory forest? a. Configuration and Schema b. Schema and DomainDNSZones c. Configuration and ForestDNSZones d. Schema and ForestDNSZones

Configuration and Schema

Which command-line utility can be used to move an Active Directory object from one container to another? a. Dsget b. Dsrm c. Dsmove d. Admt

Dsmove

Which tool can be used to obtain effective Group Policy information from the command line? a. Gpupdate b.Secedit c.Netsh d.Gpresult

Gpresult

Which of the following rule types apply only to Windows Installer packages? a.Hash rules b.Certificate rules c.Internet zone rules d.Path rules

Internet zone rules

Replication that occurs between sites is called ____________ replication. a. Local b. Remote c. Intersite d. Intrasite

Intersite

Which utility allows you to create, remove, and maintain Active Directory trust relationships from the command-line? a. Repadmin b. Nslookup c. Netdom d. Shstar

Netdom

Which of the following is a container object within Active Directory? a. Folder b. Group c. User d. OU

OU

Which of the following roles is a forest-wide FSMO role? a.PDC Emulator b.Infrastructure Master c.Schema Master d.Global catalog

Schema Master

If the user named Amy is located in the sales OU of the central.cohowinery.com domain, what is the correct syntax for referencing this user in a command line utility? a. amy.cohowinery.com b. cn=amy, ou= sales, dc=cohowinery, dc=com c.cn=amy,ou=sales,dc=central,dc=cohowinery,dc=com d.dc=com,dn=cohowinery,ou=sales,cn=amy

cn=amy,ou=sales,dc=central,dc=cohowinery,dc=com

Which command-line tool can be used to create various object types within Active Directory? a. dsget b. dsquery c. dsadd d. dsmove

dsadd

A PasswordSettingsObject (PSO) within Active Directory is also known as which type of object? a.msDS-PasswordSettingsPrecedence b.msDS-PasswordSettings c.msDS-PasswordComplexityEnabled d.msDS-MinimumPasswordLength

msDS-PasswordSettings


Set pelajaran terkait

Factor Theorem & Polynomial Long Division

View Set

Marking Period 3 Quarterly - Renaissance and the Age of Exploration

View Set

Cross Sectional Midterm (Modules 1 - 5)

View Set

Chapter 51: Assessment and Management of Patients With Diabetes (Exam 2)

View Set