Preview

Ch05EOCAs

Satisfactory Essays
Open Document
Open Document
2578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ch05EOCAs
Lesson 5
Active Directory Administration
Knowledge Assessment
Fill in the Blank
1. A(n) _global group_ can only contain members from within the same domain. P105
2. You can use the __CSVDE__ utility to import data from Comma-Separated Values (CSV) files.P114
3. Each user and group object has a(n) _SAM account name_, which must be unique across an entire Active Directory domain.P118
4. The Anonymous Logon group is an example of a(n) _special identity group_.P111
5. You can use the __LDIFDE__ command-line utility to create and modify Active Directory objects. P114
6. When users log onto Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. P103
7. A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102
8. Each CSVfile needs to begin with a(n) __header record__ when used with the CSVDE command-line tool. P119
9. A(n) __distribution group__ can only be used to send and receive email, not to secure network resources. P104
10. __Group nesting__ is the practice of adding one group as a member of another group.p104

Multiple Choice
1. Which special identity group controls anonymous access to resources in Windows Server 2008?
a. Everyone
b. Network
c. Interactive
d. Anonymous Logon
Prior to Windows Server 2003, the Anonymous Logon group was a member of the Everyone group, which had the potential to create significant security liabilities. Beginning in Windows Server 2003, anonymous access must be configured separately from access granted to the Everyone group. P111
2. What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure?
a. Group scope
b. Group security
c. Special Identity group
d. Security group
The domain local group scope can contain users or groups from any domain in the forest, but can only be used to secure resources in the same domain as the group. The global group scope

You May Also Find These Documents Helpful

  • Good Essays

    Before you can use the Active Directory Schema snap-in for the first time, you must register it with the system.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    AD FSMO Role Research

    • 414 Words
    • 2 Pages

    Active Directory is a multimaster database which means that updates can be made by any writeable DC. Some sensitive operations need to be controlled more stringently than others, such as schema management and adding or removing additional domains from an AD forest. These specified roles are called Flexible Single Master Operations (FSMO). This means only one DC in the replica ring can provide a particular operation.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    Group Policy Object that will display information about previous logons while you are trying to login yourself. So basically, you are going to be able to see who has logged on to the machine before you.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    what do you use to determine if your machine can be upgraded? Windows Upgrade Advisor.…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    e. A user tries to log in, provides a user name, and gets denied. What settings would cause this and how?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows:…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    Authentication is the process of ensuring that the individuals trying to access the system are who they claim to be.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    6.) WAN Domain proposal: Scan all e-mail attachments for type, antivirus, and malicious software at the LAN-to-WAN Domain. Isolate and quarantine unknown file attachments until further security review is conducted. Provide security awareness training to remind employees of dangers…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Work Group Scenarios

    • 320 Words
    • 1 Page

    To set up the domain access I will utilize the Security Identifiers and Discretionary access control lists. While I could set users in the Alpha domain to have global access; everyone in the Alpha domain would have the ability to do so. This would be counterproductive to the requirements set forth. By utilizing the Discretionary Access Control List, we can set users to have specific access to resources and files across the network. After the user names and passwords are set and assigned to the respective domains, we can use the Active Directory Users and Computers application to grant specific members of the Alpha domain with access to the Omega domain. We can also ensure that specific members of the Alpha domain only have access to resources on the Alpha domain. I can also set the users in the Omega domain with access to strictly the Omega domain.…

    • 320 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    SOCI 1301 Paper 5

    • 649 Words
    • 2 Pages

    Group: Any number of people with similar norms, values, and expectations who interact with one another on a regular basis.…

    • 649 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Governance Committee’s Charter       An honest and thorough job of formulating/writing the policies. Enforcement is Out-of-scope for this committee in this phase. Support and direction from upper management will be required for enforcement to be successful. Consider this a living document comprised of a sub-set of Active Directory Policies. The document will grow as Active Directory is refined at UGA, and more scenarios are discovered by the Colleges/Departments. Main focus of this committee is to engage a cross-section of UGA departments and colleges in refining the Active Directory…

    • 2241 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Application of Security

    • 1506 Words
    • 7 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:…

    • 1506 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Sociology and Its Aim

    • 599 Words
    • 3 Pages

    The term group could refer to a lot of things as far as groups of people.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Better Essays

    (2)Structure: The term structure is used, in this context to include variables such as size, degree of specialization in the tasks assigned to group members, jurisdictional clarity, members/ goal compatibility, leadership…

    • 953 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    • Friendship group – those brought together because they share one or more common characteristics…

    • 1511 Words
    • 7 Pages
    Satisfactory Essays