Preview

MCITP Guide To Microsoft Windows Server 2008 Server Administration Exam 70 646 By Michael Palmer Chapter 4 SOLUTIONS

Satisfactory Essays
Open Document
Open Document
772 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MCITP Guide To Microsoft Windows Server 2008 Server Administration Exam 70 646 By Michael Palmer Chapter 4 SOLUTIONS
Chapter 4
Review Questions
1. Your company has four departments: Marketing and Sales, Manufacturing, Product Research, and Business. Which of the following Active Directory container design plans might you use to best manage the user accounts and network access needs of each department?
c. Create four OUs in one domain.
2. Using the example in Question 1, what Active Directory capability can you use to establish different account lockout policies for each of the four departments?
a. fine-grained password policies
3. Your colleague is trying to create a universal security group for the three administrators of the single standalone server in his company. The problem is that he can’t find an option to create a universal security group. What is the problem?
d. He cannot create a universal security group on a standalone server and must instead create a local security group.
4. One of the DCs in your company reports it has an Active Directory error and you need to fix it as quickly as possible to reduce downtime. Which of the following tools can you use to stop and restart AD DS on that server? (Choose all that apply.)
b. Server Manager
5. Which of the following server operating systems can be used when the domains in Windows Server 2008 Active Directory are set at the Windows Server 2003 domain functional level? (Choose all that apply.)
c. Windows Server 2003
d. Windows Server 2008
6. Domains in a tree are in a _____ relationship.
Kerberos transitive trust relationship
7. You’ve installed the AD DS server role, but find that Active Directory is not fully implemented. What should you do next?
c. Run dcpromo
8. A_____ is a unique number associated with each object in AD DS. globally unique identifier (GUID)
9. Your school has a parent object named straton.edu and the child object names stratonalum.org and studentarts.org. What kind of namespace is this?
a. disjointed
10. Your company’s management has decided that the accounts in all OUs should be set up and managed by

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    “This server is not yet running as a domain controller. Run the Acitve Dirrectory Domain Services Instalation Wizzard (dcpromo.exe)”…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lkt2 - Task 3

    • 871 Words
    • 4 Pages

    NDS server will be replaced with a Windows 2008 Domain Controller (DC). For the moment…

    • 871 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    AD FSMO Role Research

    • 414 Words
    • 2 Pages

    To find which roles a DC currently hold you can use the ntdsutil. From the start menu, key roles and press enter, key connections press enter, key connect to server and server name and domain press enter, key quit and press enter, key select operation target press enter, key list roles for connected server and press enter and quit.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    5. How do you configure a domain controller to start in Directory Services Restore Mode on the next…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    The classroom network consists of Windows Server 2008 student servers and the ServerDC connected to a local area network. ServerDC, the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the same student server.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    I would say that the amount of users we have is about 200. And we will have plenty of room to expand in case we ever need to expand up to another 300 Users if we need to. And we will only have 5 departments (IT, H.R, Distribution, Maintenance, and Staff). As far as what departments permissions go we will have to sit with all department heads and come up with a valuable plan to benefit everyone. And since we are in a trucking distribution company named Spike’s Distro. We will only have one site for our infrastructure. The reason being is because we only have one building that everyone works out of. Our budget for creating this new infrastructure is going to be $35,000 to buy all the servers and switches needed including the computers to hold the active directory and domain servers. And we should buy physical servers as they are more efficient than virtual servers are. We should only create one domain per department. The only time we will need to create more is if we expand to more than one…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how the website looks and Web Admin can’t go in to Linux and change how things run.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The only server roles discussed in this lesson that are not included with the Windows Server 2008 product are _________ and _________.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Lesson 4

    • 772 Words
    • 3 Pages

    9. You can transfer the role transfer FSMO from one domain controller to another using the Active Directory Domains and Trusts MMC snap- in.…

    • 772 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays