• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back

Alookup table that allows users to associate a name with specific data pointsabout that name.




Example: Domain Name Service (DNS)

Directory
TheInternational Telecommunication Union’s directory format.
ITU X.500
Usesa Directory Information Tree (DIT) to represent a hierarchical structure ofDistinguished Names (DNs) of entities.
ITU X.500
Nearly everything on the Internet uses some form of ____ guidance for naming and organization. Therefore a full X.500 DIT is _____.
X.500; unwieldy

The most common directory structure. Designedto provide a “lightweight” alternative to X.500.




Most common directory structure.




Uses a localized DIT to arrange DNs in a logical hierarchy

Lightweight Directory Access Protocol (LDAP)

Microsoft's directory service implementation with LDAP.




Allows administrators to create Domains of objects controlled by the Domain Controller server.


Active Directory

What product provides:




- Central authentication service (Kerberos)


- Access control/auditing mechanisms


- Ntwk info/naming standards through DNS


- Infrastructure access/config. through LDAP

Active Directory

CSTs primarily use what two tools to manage Active Directory?

1) Directory and Resource Administrator (DRA)




2) Active Directory Usersand Computers (ADUC)

What is the Air Force’s primary web-based tool for CST administration ofan Active Directory domain?
Directory and Resource Administrator (DRA)
In regards to Active Directory, the _______ is a server object that must be activated on a Windows installation. While it is considered to be a powerful tool, its reduced availability has pushed the Air Force towards the easier-to-access, web-based DRA.
Active Directory Users and Computers (ADUC)


What Active Directory component has the following characteristics?




- Web-based management interface; only one object ismanipulated at a time


- Designed tominimize potential accidents by making mass actions more difficult to carry out

Directory and Resource Administrator (DRA)
In DRA, all user accounts can be grouped into one of two categories: ______ and ______.
Local and domain

True/False




Only Domain Accounts can be managed within DRA.


True
An object shell that represents a set of attributes for a user or computer object that will interact with and authenticate to a domain.

Domain account
Accounts unassociated with a domain, called ____ ____, are most commonly used for troubleshooting purposes are created exclusively for use within the metal confines of the machine to which they are localized.
Local accounts

______ accounts are created on a Domain Controller and have access to the full enterprise domain.




______ accounts can only affect hardware.

Domain; Local

True/False




Every Microsoft Windows-based client will have built-in local accounts.


True
A local computer account will have a default local group account called _______.

WORKGROUP


True/False




Computers do not necessarily require an account to function.


FALSE




ALL computers require an account to function.

What two accounts are necessary for access to domain resources?

1) Valid domain computer


2) Valid domain user

Domain accounts are created and stored on a central server called the _____ ______.

Domain Controller
Local computer accounts are not recognized on the _____ until a corresponding computer ______ has been created and associated with the host machine.
Domain; object
CSTs must add computer accounts to the domain by using the computer's _____.

name
User accounts set up on a Domain Controller for the purpose of providing network access are also called ______ _______.

network accounts
Each user account must be given a name and is identified internally by a unique ______ ______.
Security Identifier (SID)


Used for tracking rights and permission assignments throughout the domain.




Stored in the object's Access Control List (ACL) along with the specific permission information.

Security Identifier (SID)
______ control access to an object, such as a folder or file. Determines whether you can access/modify an object.

Permissions

_____ enable a user account or group to perform predefined tasks.




Examples: ability to access server, authority to create accounts and manage server functions.


Rights
All _____ accounts are stored in a _____ database on the Domain Controller server for that domain.
Domain; central

True/False




As a CST, you may interact with multiple Domain Controllers while working within a single domain.


True
______ ______ typically provide a common username shared among multiple users who perform a common function.

Group accounts

Name the two built-in local user accounts created when first installing an Operating System.


1) Local administrator


2) Guest

Due to inherent vulnerabilities, the ______ account must be disabled on Air Force computers as a security best practice.
Guest
A ____ is a collection of objects: a collection of user and computer accounts, contacts, etc. that can be managed as a single unit.

Group
Users and computers that belong to a particular group are referred to as ____ _____.

group members


True/False




Any rights or permissions assigned to a group are inherited by its ____ _____.

group members

Groups in Active Directory are directory _____ that reside within a domain or an organizational unit container object, and are called _____ _____.

objects; domain groups

True/False




User accounts, Admin accounts, Computer accounts, and Security Groupsall have the same SID.

FALSE




User accounts, Admin accounts, Computer accounts, and Security Groupsall have unique SIDs

Similar to local users, ____ ____ can be created on computers configured as domain member servers, workgroup member servers, domain workstations, and stand-alone computers (unaffiliated with a domain)
local groups

_____ groups reside on the local computer and provide access to only its resources.




_____ groups reside on a Domain Controller and provide access to network resources throughout the domain.

Local; Domain
When creating a group, a CST must consider that groups are characterized by their ____ and ____.
Scope and type

The _____ of a group determines the extent to which the group is applied within a domain.




The group ____ determines whether a group can be used to assign permissions to a shared resource (security groups) or if I group can be used for e-mail distribution lists only (distribution groups)

Scope; type
What are the two types of Domain Groups?


1) Distribution Groups


2) Security Groups

This type of Domain Group is used to define collections of users for non-security purposes.




Applications designed to be used in an Active Directory environment can use this group for their own purpose. For example: distribution group for e-mail to send email to all group members


Distribution Group

This type of Domain Group is used by Windows Server to manage user rights assignments and access permissions.




Rights and permissions assigned to this type of group are inherited by the group's members.


Security Groups
_____ _____ is when you add a group as a member of another group in order to reduce security management overhead.
Group nesting

A user account without a user.




This type of account exists on the domain to be shared as an email resource for multiple users from a specific organization. All members of a workcenter can send/receive email as that account w/o using their specific identities.


Organizational account
To support email security, organizational accounts must be ___-enabled. An organizational account requires its own _____ certificate and corresponding _____ key.

PKI




digital




private

Group accounts on a domain must be _____ ______ in scope and ability.
severely limited

A user account with no additional rights assigned.



It is a security feature that prevents exploitation of accounts before proper rights have been assigned.


Limited access account
Modifications can be made to a user's account by updating the _____ _______.
Users properties
Containers used to logically organize accounts into specialized groups for various purposes.

Organizational Units (OUs)

The creation, management, and maintenance of an end-user's objects and characteristics in relation to accessing resources available in one or more systems.




Basically, the management of user rights and privileges.


Account provisioning
As a CST, your role when it comes to Guest account is to make sure they are ______.

Disabled
What is a Distribution Group's sole purpose?

Grouping users for sending messages that do not have a Security Identifier (SID)