CNIT 242 Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the lecture, _________ days is typically the optimal duration between password changes.

90

Which of the following is/are problematic when using roaming profiles?

A & B (- Login and logout times can be significantly extended - Files and settings are left behind on every computer the user has logged into)

Which of the following best explains a domain that uses only local profiles:

A & D (- Each user will have a completely separate profile on each computer - Logging into a new computer will create a new local profile for the user on that machine)

Which of the following is not contained in a user profile?

All of these are in a user profile ((My) Documents, Favorites, Desktop and Application Settings, Application Settings, and Desktop)

Your PC can communicate with a web server using the IP address (i.e. 157.166.255.236), but not through fully qualified domain name (FQDN, i.e. www.ncaa.com). What might be wrong? A) The web server is malfunctioning B) The configured DNS Server of the PC is malfunctioning C) Your PC is misconfigured to use a non-existing DNS server. D) B & C E) All of the above could be the reason for the problem

Answer: -D) B & C Correct - The DNS server you are querying is nonexistent, malfunctioning, or misconfigured. Other issues could include network connectivity between the DNS server and the authoritative server, or an issue with an intermediate or authoritative server

T/F: The best approach to implementing group policy is to create/modify one policy per OU that contains all of the applicable settings.

Answer: -F The best approach is to create separate policies for each setting and link them to applicable OUs. This creates a single point of administration for each policy. By making a change to the policy it will affect all OUs linked to the policy.

T/F: Special Characters, such as ?*"\ can be used in NetBios Name.

Answer: -F \/:*?";|+˽Cannot be used in a NETBIOS name

GPO settings are set to which of the following by default? Not Configured Enabled Disabled Enforced

Answer: -Not configured All GPO entries are set to "not configured" by default.

T/F: A computer's NetBIOS name and DNS hostname are independent. However, they should be set to the same value.

Answer: -T A computer's NetBIOS name and DNS hostname should be set to the same value.

T/F: Windows Active Directory can work with most DNS servers as long as they support dynamic updates.

Answer: -T As long as a DNS server includes dynamic update capability it can be used with Active Directory.

T/F: By default, if an eabled GPO setting in the parent OU conflicts with an enabled GPO setting in the child OU, the GPO setting in the child OU wins.

Answer: -T The GPOs are applied in order from the root to the object. If both the parent OU and child OU have a setting applied, the parent setting with be applied, then the child setting will be applied. If effect, the child setting would "win" in this scenario.

T/F: DNS, as currently deployed, has no formal security included.

Answer: -T There is no authentication, authorization, non-repudiation, or encryption in DNS.

What are the two components (items to which the policy can effect) to a Group Policy Object (GPO)?

Answer: -user -computer

Which of the following is not a way in which an administrator can control group policy inheritance: a.) Inheritance can be blocked for a GPO - forcing a child GPO to apply regardless of conflict b.) Inheritance can be forced to override lower level GPOs - forcing a parent GPO to apply regardless of conflict c.) Inheritance can be disabled domain-wide d.) All of these are ways in which an administrator can control group policy inheritance

Answer: Inheritance can be disabled domain-wide. Inheritance can be blocked or forced, but not disabled throughout the domain

Your PC can communicate with a web server using the IP address (i.e. 157.166.255.236), but not through fully qualified domain name (FQDN, i.e. www.ncaa.com). What might be wrong?

B & D (- The configured DNS Server of the PC is malfunctioning - Your PC is misconfigured to use a non-existing DNS server)

Which of the following is not a reason to implement directory services rather than relying on individual machine accounts?

Enable two-factor authentication

Access Control Lists provide one method of authentication. (T or F)

False

An advantage of Folder Redirection is that users can access their files even if they aren't connected to the network. (T or F)

False

Authentication is the process of determining what users should be able to do. (T or F)

False

Following best practices can enable you to create a perfectly secure system. (T or F)

False

In an enterprise environment, it is best to assign permissions to individual users. (T or F)

False

RADIUS is typically only used for authentication to network equipment for configuration purposes and terminal access. (T or F)

False

Special Characters, such as ?*"\ can be used in NetBios Name. (T or F)

False

The best approach to implementing group policy is to create/modify one policy per OU that contains all of the applicable settings. (T or F)

False

The two basic parts of authentication are usernames and passwords. (T or F)

False

To ensure that your machine stays free of viruses you can run multiple anti-virus solutions concurrently. (T or F)

False

You can install Active Directory on a Windows Server without having an existing DNS Server or installing a new DNS server. (T or F)

False

Malware that steals data passwords is known as:

Spyware

The order of scale, from smallest to largest, in an Active Directory is:

Subnet, site, domain, forest

The tool used to rename a domain is:

There is no tool to rename a domain

A computer's NetBIOS name and DNS hostname are independent. However, they should be set to the same value. (T or F)

True

By default, if an enabled GPO setting in the parent OU conflicts with an enabled GPO setting in the child OU, the GPO setting in the child OU wins. (T or F)

True

DNS, as currently deployed, has no formal security included. (T or F)

True

In Windows, an explicit allow cannot override an inherited deny. (T or F)

True

Non-repudiation ensures that the source of data is known and verified. (T or F)

True

Read, write and execute are examples of the file system permissions. (T or F)

True

The Kerberos protocol operates using a 6-step process. Steps 3 and 4 involve communication with a Ticket Granting Server. (T or F)

True

The number one rule of passwords is: Do not write them down. (T or F)

True

Windows Active Directory can work with most DNS servers as long as they support dynamic update. (T or F)

True

The best way to resolve the issue of profile version differences (such as XP and Vista+) is to:

Use folder redirection

The four parts of the basic security model from lectures are:

authentication, authorization, non-repudiation, encryption

A hardware device that filters packets based on traffic source, destination, and type is a

firewall

An attack against a person designed to get them to give up information, usually perpetrated through e-mail, is known as a

phishing

Unwanted e-mail regardless of content is known as:

spam

What are the two components (items to which the policy can effect) to a Group Policy Object (GPO)?

user, computer

Malware that propagates without user intervention by exploiting vulnerabilities in network services is called a(n):

worm

GPO settings are set to which of the following by default?

Not Configured

Malware that integrates with the system kernel and actively attempts to avoid being discovered is known as a(n):

Rootkit

Which of the following is not a way in which an administer can control group policy inheritance:

Inheritance can be disabled domain-wide

Active Directory supports this ISO standard for directory access:

LDAP


Set pelajaran terkait

Ch 11: physical and chemical agents from microbial control

View Set

Psychology 104 Cooley University of Kansas (Cumulative Final Review)

View Set

Series-Parallel RLC circuits and Applications

View Set

Ch. 88 Scan Tools & Engine Performance Diagnosis

View Set

Microeconomics Final Exam TopHat Questions

View Set

Combo with AP Final Review and 19 others

View Set