Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Final Exam

fuck me

QuestionAnswer
What Service does Dynamic Host Configuration Protocol (DHCP) provide? Resolves web addresses to IP addresses
For DHCP address allocation, by how much is network traffic reduced related to periodic lease renewal messages when switching from dynamic allocation to automatic allocation? 100 percent because dynamic address allocation requires periodic lease renewal messages whereas automatic does not
What is the first packet sent to a DHCP server when a computer boots up? DHCPDISCOVER
How does a DHCP client communicate which offered IP address it will accept from which DHCP server The client sends a DHCPREQUEST message to all servers with the IP address of the chosen DHCP server.
What is the default lease period for DHCP dynamic address allocation 8 days
What are the advantages of using a distributed DHCP infrastructure? All the client/server network is local, so minimal DHCP traffic on routers. AND Clients have ready access to DHCP servers.
Before a DHCP server can hand out addresses, which of the following steps must be completed? A DHCP scope must be created and activated. AND The DHCP server must be created and authorized.
Which of the following steps must be completed in order to ensure a network printer is assigned the same address through the DHCP server? Create a reservation in the DHCP scope.
What kinds of servers should NOT be DHCP clients? Domain controllers, Internet web servers, and DHCP servers
What is the key benefit of DHCP manual IP address allocation over manually configuring the IP address by person? This prevents accidental duplication of permanently assigned IP addresses.
What are the servers at the top of the DNS hierarchy called? Root servers
The domain name part of a DNS name is _________ and consists of two or more words, seperated by _________. hierarchical; periods.
When using DNS for name resolution only, why should a company consider using DNS servers outside the network perimeter? Less traffic crossing the network perimiter
Who is responsible for the ratification of new top-level domains? Internet Corperation for Assigned Names and Numbers (ICANN)
Concerning DNS, what is negative caching? When a DNS server receives information about a non-existent host.
What is the default TTL for a Windows Server 2012 R2 DNS server? 1 Hour
You registeed the domain name contoso.com. The FQDNs seattle.contoso.com and halifax.contoso.com are examples of different _________. subdomains of contoso.com
Concerning DNS domain hierarchy, what are examples of global top-level domains? .com, .net, .org
What is the primary purpose of name caching? Name caching enables the second name resolution request for the same name to bypass the referral process
What is the primary benefit of a DNS forwarder? Reducing the traffic and making efficient use of available bandwidth across the perimeter
What DNS server is never the authoritative source for a domain, but only serves to resolve names? Caching-only server
What DNS server is responsible for maintaining a particular domain's resource records? Authoritative source
What is the process of granting the user access only to the resources he or she is permitted to use? Authorization
What defines what objects exist as well as what attributes are associated with any object in the Active Directory? Active Directory schema
Active Directory keeps a nameing convention for the domain that mirrors _________. DNS
If an administrator creates a domain tree in an Active Directory Forest, and then creates a separate and different domain tree, what is the relationship between the two domain trees? Same security entity as one Active Directory forest, bidirectional trust between domain trees
What is the global catalog? An index of all AD DS objects in a forest
What is an important difference between groups and OUs? Group memberships are independent of the domain's tree structure
For Server Core installations, how does Windows Server 2012 R2 differ from Windows Server 2008 when installing the AD DS role and promoting the system to a domain controller? Windows Server 2012 R2 now allows administrators to use PowerShell
Which of the following features allows you to create virtual machines on a leased cloud resource? Infrastructure as a Service (IaaS)
What administrative division in Active Directory is defined as a collection of subnets that have good connectivity between them to facilitate the replication process? Sites
When is an Active Directory site topology created? Site topology is manually configured dependent on WAN bandwidth and transmission speed
An Active Directory _______ consists of one or more separate domain trees. forest
What is a container object that functions in a subordinate capacity to a domain, and still inherits policies and permissions from its parent objects? Organizational unit
Resource access for individuals takes place through their _________. user accounts
What are the two built-in user accounts are created on a computer running Windows Server 2012 R2? administrator and guest
What do you call the process of confirming a user's identity by using a known value such as a password, a smart card, or a fingerprint? authentication
the LDIFDE.exe utility is most similar to what other utility? CSVDE.exe
Which of the following guidelines are NOT best practice for securing the Administrator account? Renaming the Administrator account name so as not do distinguish it from non-administrative accounts
What user creation tool incorporates new features such as the Active Directory Recycle Bin and fine-grained password policies? Active Directory Administrative Center (ADAC)
To preform an offline domain join, how many times would an administrator run the Djoin.exe command? twice
What would be a sufficient user account to provide temporary access to the network for a user such as a vendor representative or a temporary employee? Guest
What graphical tool can create user and computer accounts and was redesigned for Windows Server 2012? Active Directory Administrative Center
Which of the following is a PowerShell CMDlet for creating user objects? New-ADUser
Which of the following is NOT a group scope? Security groups
Of the key reasons for creating organizational units, which of the following is NOT one of them? Assigning permissions to network resources
Within a domain, the primary hierarchical building block is the __________. organizational unit
The Delegation of Control Wizard is capable of ___________ permissions. granting
An administrator needs to grant an e-mail distribution group of 100 members access to a database, how would the administrator proceed? The e-mail group is obsolete and can be dissolved. Convert the distribution group to a security group and then assign the group access permissions
What is the group scope for Domain Admins, Domain Controllers, and Domain Users default groups? Global
>>> You've just passed question 50. Take a break, and review if you need to. <<< Done? Ok let's go.
Which of the following is NOT an example of a special identity? Dialup Service
What are the different kinds of groups? There are two types: security and distribution; and there are three group scopes: domain local, global, and universal
What command-line utility allows administrators to modify a group's type and scope and well as add or remove members? Dsmod.exe
Which of these groups would an administrator use to assign permissions to resources in the same domain? Domain local groups
Which of these groups is not related to security and cannot have permissions assigned to it? Distribution groups
What is the proper term for associating a Group Policy to a set of AD DS objects? Linking
The three types of Group Policy Objects (GPOs) include local, domain and ___________. starter
Configuring a Central Store of ADMX files help solve the problem of _____________. "SYSVOL bloat"
What is the Microsoft Management Console (MMC) snap-in that you use to create GPOs and manege their deployment to AD DS objects? Group Policy Management console
Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three? Software settings, Windows settings, and Administrative Templates
What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO? security filtering
What is the order in which Windows systems receiving and process multiple GPOs. LSDOU (local, site, domain, then OU)
Local GPOs contain fewer options than domain GPOs. Local GPOs do not support _____________. Folder redirection or Group Policy software installation.
If creating a Local Group Policy Object, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO? The first GPO contains both Computer Configuration and User Configuration settings, while the secondary and tertiary GPOs contain only User Configuration settings.
What nonlogical GPO has its properties stores in the Active Directory object Group Policy container (GPC), as well as a Group Policy template located in the SYSVOL share? domain GPO
What capability allows you to create specific GPO settings for one or more local users configured on a workstation? multiple local GPOs
What are the two categories of security settings within Group Policy? User. AND Computer.
What are the three primary event logs? Application, Security, and System
What is the default size for each of the three Event logs? 16,384 KB
What is a collection of configuration settings stored as a text file with an .inf extension? Security template
When does Windows apply User Configuration policies by default? when the computer starts up
You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing? you can disable the setting area that is not configured for faster processing.
What did Microsoft introduce in Windows Server 2008, which is used to ensure administrative privileges still operate routine tasks as standard users? User Account Control (UAC)
How are most Group Policy settings applied or reapplied? at the refresh interval
What are the two interfaces available for creating and managing user accounts in Windows Server 2012 R2? User Accounts control panel and the Local Users and Groups snap-in for MMC
What tool for creating new users is only valid while the Windows Server 2012 R2 computer is part of a workgroup and not joined to an AD DS domain? User Accounts Control Panel
What tool for user creation provides full access to all local user and group accounts on the computer? Local Users and Groups snap-in
What service works with Group Policy to install, upgrade, patch, or remove software applications? Windows Installer
When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application? Assigning forces the application, whereas publishing provides the option to install
After deploying software by GPO using the Assigned option, where is the package made available for the user? Start menu or desktop
Not all software on the market provides .msi support. What is your best option to use Windows Installer to assign and publish the software? Repackage the software for Windows Installer
In what group Policy objects container are AppLocker settings located? Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker
How does AppLocker handle all executables, installer packages, and scripts by default? AppLocker blocks all by default, except for those specified in Allowed rules.
What are the three default security levels within software restriction policies? Unrestricted, Disallowed, and Basic User
What is the most common way to implement software restriction policies? Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously
When installing software using Group Policy, what file or files does an administrator use? Windows Installer package files, or .msi files-modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files
Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system? path
Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network? network zone
Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except (see above). How does the Windows Firewall work for inbound traffic and for outbound traffic? Inbound-block all. Outbound-permit all
Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles? domain, private, and public
What does the term "filter" refer to in the Windows Firewall With Advanced Security console? the ability to display inbound or outbound rules according to a profile
What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel? Windows Firewall With Advanced Security snap-in for the Microsoft Management console
By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _________. all its rules, including the preconfigured rules and the ones you have created or modified
Windows Firewall allows an administrator to import and export firewall rules. What are the rule's file extension? .wfw
You can configure the Windows Firewall to allow or block specific ____________. ports, protocols, applications, users, and IP address ranges
What is the primary objective of a firewall? to permit traffic in and out for legitimate users, and to block the rest
When creating a firewall exception, what is the difference between opening a port and allowing an application through? allowing an application opens the specified port only while the program is running, and thus is less risky
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rules applues? scope
What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule? action
What is a key difference between a domain tree hierarchy and the organizational unit (OU) hierarchy within a domain? inheritance
>>> You've completed the review. Congrats <<< Yay.
Created by: TheGoldenCPU
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards