Mẹo về Which of the following Active Directory elements provides a true security boundary Chi Tiết
Hoàng Thị Hương đang tìm kiếm từ khóa Which of the following Active Directory elements provides a true security boundary được Cập Nhật vào lúc : 2022-11-24 21:16:21 . Với phương châm chia sẻ Thủ Thuật Hướng dẫn trong nội dung bài viết một cách Chi Tiết 2022. Nếu sau khi đọc nội dung bài viết vẫn ko hiểu thì hoàn toàn có thể lại Comments ở cuối bài để Admin lý giải và hướng dẫn lại nha.1. Which of the following is not a feature of Active Directory?
Nội dung chính Show- What is the most typically used boundary for an Active Directory site?Is a domain a security boundary?What security does Active Directory provide?What are the 3 main components of an Active Directory?
A. The use of LDAP for transferring information
B. Reliance on DNS for name resolution
C. A flat domain namespace
D. The ability to extend the schema
2. Domains provide which of the following functions?
A. Creating security boundaries to protect resources and ease of administration
B. Easing the administration of users, groups, computers, and other objects
C. Providing a central database of network objects
D. All of the above
3. Which of the following types of servers contain copies of the Active Directory database?
A. Member servers
B. Domain controllers
C. Standalone servers
D. None of the above
4. Which of the following objects are used to create the logical structure within Active Directory domains?
A. Users
B. Sites
C. Organizational units (OUs)
D. Trees
E. None of the above
5. Which of the following is false regarding the naming of Active Directory objects?
A. Active Directory relies on DNS for name resolution.
B. Two objects can have the same relative distinguished name.
C. Two objects can have the same distinguished name.
D. All objects within a domain are based on the name of the domain.
6. Which of the following are true regarding Active Directory trust relationships?
A. Trusts are transitive.
B. By default, trusts are two-way relationships.
C. Trusts are used to allow the authentication of users between domains.
D. All of the above.
7. Which of the following protocols is used to query Active Directory information?
A. LDAP
B. NetBEUI
C. NetBIOS
D. IPX/SPX
8. Which of the following is not true regarding the Windows NT domain namespace?
A. Windows NT domains have a hierarchical namespace.
B. Windows NT domains allow thousands of users.
C. Windows NT domains can be implemented as master domains.
D. Windows NT domains can be implemented as resource domains.
E. All of the above.
9. Which of the following is a possible role for a Windows Server 2003?
A. Member server
B. Primary Domain Controller
C. Backup Domain Controller
D. Standalone server
E. Both A and D
10. Which of the following statements is true regarding domain controllers?
A. All Active Directory domain controllers are automatically configured as Windows NT domain controllers.
B. Windows NT domain controllers can host a copy of the Active Directory database.
C. Windows Server 2003 domain controllers can be configured to provide the functionality of Windows NT domain controllers.
D. None of the above.
11. Which of the following is not a characteristic of DNS?
A. Built-in redundancy
B. Reliance on proprietary technologies
C. Scalability
D. Distributed databases
12. An organization uses 12 Active Directory domains in a single forest. How many Schema Masters must this environment have?
C. 12
D. More than 12
E. None of the above
13. An organization has three remote offices and one large central one. How many sites should this environment contain?
E. Not enough information
14. Which of the following features of Active Directory allows information between domain controllers to remain synchronized?
A. Replication
B. The Global Catalog
C. The schema
D. None of the above
15. Jane is a systems administrator for a large, multidomain, geographically distributed network environment. The network consists of a large, central office and many smaller remote offices located throughout the world. Recently, Jane has received complaints about the performance of Active Directory-related operations from remote offices. Users complain that it takes a long time to perform searches for network resources (such as Shared Folders and Printers). Jane wants to improve the performance of these operations. Which of the following components of Active Directory should she implement remote sites to improve the performance of searches conducted for objects in all domains?
A. Data store
B. Global Catalog
C. Schema
D. None of the above
16. What is the name of the server that is a repository that stores Active Directory topology and schema information for Active Directory?
A. The Domain Partition
B. The Schema Master
C. The Global Catalog
D. None of the above
17. From the list of answers, choose the role associated with the server that ensures that names of newly created domains adhere to naming conventions associated with your infrastructure.
A. The Domain Naming Master
B. The PDC Emulator
C. The Schema Master
D. The Global Catalog
18. You are the network administrator for your company. You have been asked to install Windows Server 2003 systems into your current environment. You have a domain that contains Windows NT 4 servers. You need to ensure that both Windows NT 4 and Windows Server 2003 systems function in the same environment. What role handles replicating changes from Windows NT systems to 2003 systems?
A. The Domain Naming Master
B. The PDC Emulator
C. The Schema Master
D. The Global Catalog
19. You are the administrator for your company's domain. You need to subdivide groups in your organization within Active Directory. If you wanted to separate Sales from Marketing as an example, what could you use as a system of organizing this subdivision and any others that you need to divide?
A. Create OUs.
B. Use Users and Groups.
C. Create a Sites and Services subnet grouping.
D. Build a container in LM manager.
20. You are the network administrator for a 200-node network. You are currently looking creating software packages to roll out to your network users. When the users log in, they will automatically install needed updates. You only need to roll out a specific set of updates to 30 of those nodes. What could you create so that you can separate those 30 from the 200 and roll out updates only to that group?
A. Create a policy that deploys only to those 30 members.
B. Create a group assignment through Administrative Tools.
C. Create an organizational unit (OU) for those 30 users.
D. None of the above.
Continue reading here: Answers to Review Questions
Was this article helpful?