• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back

What service does Dynamic Host Configuration Protocol (DHCP) provide?

Configures the IP address and other TCP/IP settings on network computers

For DHCP address allocation, by how much is network traffic reduced related to periodic lease renewal messages when switching from dynamic allocation to automatic allocation?

100% because dynamic address allocation requires periodic lease renewal messages whereas automatic does not

What is the first packet sent to a DHCP server when a computer boots up?

DHCPDISCOVER

How does a DHCP client communicate which offered IP address it will accept from which DHCP server?

The client sends a DHCPREQUEST message to all servers with teh IP address of tgeh chosen DHCP server.

What is the default lease period for DHCP dynamic address allocation?

8 days

What are the advantages of using a distributed DHCP infrastructure?

1. All the client/server network traffic is local, so minimal DHCP traffic on routers




2. Clients have ready access to DHCP server





Before a DHCP server can hand out addresses, which of the following steps must be completed? (Choose 2 answers)

1. A DHCP scope must be created and and activated.




2. The DHCP server must be created and authorized.

Which of the following steps must be completed in order to ensure a network printer is assigned the same address through the DHCP server?

Create a reservation in the DHCP scope.

What kinds of servers should NOT be DHCP clients?

Domain controllers, internet web servers, and DHCP servers

What is the key benefit of DHCP manual IP address allocation over manually configuring the IP address by person?

This prevents accidental duplication of permanently assigned IP addresses.

What are the servers at the top of the DNS hierarchy called?

Root servers

The domain name part of a DNS name is ________ and consists of two or more words, separated by _________.

hierarchical; periods

When using DNS for name resolution only, why should a company consider using DNS servers outside of the network perimeter?

Less Administration

Who is responsible for the ratification of the new top-level domains?

Internet Corporation for Assigned Names and Numbers (ICANN)

Concerning DNS, what is negative cashing?

when a DNS server receives information about a non-existent host.

What is the default TTL for a Windows Server 2012 R2 DNS server?

1 hour

You registered the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different________>

Subdomains of contoso.com

Concerning DNS domain hierarchy, what are examples of global top-level domains

.com, .net, and .org

What is the primary purpose of name caching?

Name caching enables the second name resolution request for the same name to bypass the referral process.

What is the primary benefit of a DNS forwarder?

Reducing the traffic and making efficient use of available bandwidth across the network perimeter.

What DNS server is never the authoritative source for a domain, but only severs to resolve names?

Caching-only server

What DNS sever is responsible for maintaining a particular domain's resource records?

Authoritative source

What is the process of granting the user access onlyh to the resources he or she is permitted to use?

Authorization

What defines what objects exist as well as what attributes are associated with any object in the Active Directory?

Active Directory Schema

Active Directory keeps a naming convention for the domain that mirrors _______.

DNS

If an administrator creates a domain tree in an Active Directory forest, and then creates a separate and different domain tree, what is the relationship between the two domain trees?

same security entity as one Active Directory forest, bidirectional trust between domain trees.

What is the global catalog?

an index of all AD DS objects in a forest.

What is an important difference between groups and OU's?

Group memberships are independent of the domain's tree structure.

Fro Server Core installations, how does Windows Server 2012 R2 differ from Windows Server 2008 when installing the AD DS role and promoting the system to a domain controller?

Windows Server 2012 F2 now allows administrators to use PowerShell.

Which of the following features allows you to create virtual machines on a leased cloud resource.

Infrastructure as a Service (IaaS)

What administrative division in Active Directory is defined as a collection of subnets that have good connectivity between them to facilitate the replication process?

Sites

When is an Active Directory site topology created?

Site topology is manually configured dependent on WAN

An Active Directory _______ consists of one or more separate domain trees.

Forest

What is a container object that functions in a subordinate capacity to a domain, and still inherits policies and permissions from its parent objects?

Organizational Unit

Resource access for individuals takes place through their ______.

user accounts

What are the two built-in user accounts created on a computer running Windows Server 2012 R2

administrator and guest

What do you call the process of confirming a user's identity by using a known value such as a password, a smart card, or a fingerprint?

Authentication

The LDIFDE.exe utility is most similar to what other utility?

CSVDE.exe

Which of the following guidelines are NOT best practice for securing the Administrator account?

Using the Administrator account for daily, non-Administrative tasks.

What user creation tool incorporates new features such as the Active Directory Recycle Bin and fine-grained password policies?

Active Directory Administrative Center (ADAC)

To perform an offline domain join, how many times would an administrator run the Djoin.exe command?

Two

What would be a sufficient user account to provide temporary access to the network for a user such as a vendor representative or a temporary employee?

Guest

What graphical tool can create user and computer accounts and was redesigned for Windows Server 2012?

Active Directory Administrative Center (ADAC)

Which of the following is a PowerShell cmdlet for creating user objects?

New-ADUser

Which of the following is NOT a group scope?

Security groups

Of the key reasons for creating organizational units, which of the following is NOT one of them?

Assigning permissions to network resources

Within a domain, the primary hierarchical building block is the _______.

Organizational unit

The delegation of Control Wizard is capable of ________ permissions.

Granting

An administrator needs to grant an e-mail distribution group of 100 members access to a database, how would the administrator proceed? The e-mail group is obsolete and can be dissolved.

Convert the distribution group to a security group and then assign the group access permissions.

What is the group scope for Domain Admins, Domain Controllers, and Domain Users default groups?

Global

Which of the following is NOT an example of a special identity?

Dialup Service

What are the different kinds of groups?

There are two types: security and distribution; and there are three group scopes: domain local, global, and universal.

What command-line utility allows administrators to modify a group's type and scope as well as add or remove members?

Dsmod.exe

Which of these groups would an administrator use to assign permissions to resources in the same domain?

Domain local groups.

Which of these groups is not related to security and cannot have permissions assigned to it?

Distribution groups

What is the proper term for associating a Group Policy to a set of AD DS objects

Linking

The three types of Group Policy Objects (GPO's) include local, domain and _______.

Starter

Configuring a Central Store of ADMX files help solve the problem of _______.

"SYSVOL bloat"

What is the Microsoft Management Console (MMC) snap-in that you use to create GPO's and manage their deployment to AD DS objects?

Group Policy Management console

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?

Software settings, Windows settings, and Administrative Templates

What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?

security filtering

What is the order in which Windows systems receiving and process multiple GPO's?

LSDOU(local, site, domain, then OU)

Local GPO's contain fewer options than domain GPO's. Local GPO's do not support ________.

Folder redirection or Group Policy software installation.

If creating a Local Group Policy Object, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO?

The first GPO contains both Computer Configuration and User Configuration settings, while the secondary and tertiary GPOs contain only User Configuration Settings

What nonlocal GPO has its properties stored in the Active Directory object Group Policy container (GPC), as well as a Group Policy template located in the SYSVOL share?

domain GPO

What capability allows you to create specific GPO settings for one or more local users configured on a workstation?

multiple local GPOs

What are the two categories of security settings within Group Policy? Select two answers.

1. User




2. Computer

What are the three primary event logs?

Application, Security, and System

What is the default size for each of the three Event logs?

16,384 KB

What is a collection of configuration settings stored as a text file with an .inf extension?

Security template

When does Windows apply User Configuration policies by default?

As the user logs in

You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?

You can disable the setting area that is not configured for faster processing.

What did Microsoft introduce in Windows Server 2008, which is used to ensure users with administrative privileges still operate routing tasks as standard users?

User Account Control (UAC)

How are most Group Policy settings applied or reapplied?

At the refresh interval

What are the two interfaces available for creating and managing user accounts in Windows Server 2012 R2?

User Accounts control panel and the Local Users and Groups snap-in for MMC

What tool for creating new users is only valid while the Windows Server 2012 R2 computer is part of a workgroup and not joined to AD DS domain?

User Accounts Control Panel

What tool for user creation provides full access to all local user and group accounts on the computer?

Local Users and Groups snap-in

What service works with Group Policy to install, upgrade, patch, or remove software applications?

Windows Installer

When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?

Assigning forces the application, whereas publishing provides the option to install

After deploying software by GPO using the Assigned option, where is the package made available for the user?

Start menu or desktop

Not all software on the market provides .msi support. What is your best option to use Windows Installer to assign and publish the software?

Repackage the software for Windows Installer

In what Group Policy objects container are AppLocker settings located?

Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker (this is the longest answer of the choices given)

How does AppLocker handle all executables, installer packages, and scripts by default?

AppLocker blocks all by default, except for those specified in Allow rules

What are the three default security levels within software restriction policies?

Unrestricted, Disallowed, and Basic User

What is the most common way to implement software restrictions policies?

Linking Group Policy objects to Active Director Domain Services containers, so that you can apply their policy settings to several computers simultaneously

When installing software using Group Policy, what file or files does an administrator use?

Windows Installer package files, or .msi files-modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files. (longest available answer)

Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system?

Path

Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network?

Network Zone

Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?

Inbound - block all, Outbound - permit all

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

Domain, Private, and Public

What does the term "filter" refer to in the Windows Firewall With Advanced Security console?

The ability to display inbound or outbound rules according to a profile (longest available answer)

What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?

Windows Firewall With Advanced Security snap-in for the Microsoft Management console

By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _______.

all its rules, including the preconfigured rules and the ones you have created or modified

Windows Firewall allows an administrator to import and export firewall rules. What are the rules' file extension

.wfw

You can configure the Windows Firewall to allow or block specific________.

ports, protocols, applications, users, and IP address ranges

What is the primary objective of firewall?

To permit traffic in and out for legitimate users, and to block the rest.

When creating a firewall execption, what is the difference between opening a port and allowing an application through?

Allowing an application opens the specified port only while the program is running, and thus is less risky.

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies?

Scope

What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule?

Action

What is a key difference between a domain tree hierarchy and the organizational unit (OU) hierarchy within a domain?

Inheritance