Shared Flashcard Set

Details

W2K3 SERVER REVIEW
UNIT 1-14 REVIEW
105
Other
Not Applicable
03/19/2014

Additional Other Flashcards

 


 

Cards

Term
(T/F) Domains are a logical grouping of resources.
Definition
True
Term
What do you use to configure the RID Master, Infrastructure Master and PDC Emulater?
Definition
Active Directory Users and Computers
Term
What do you use to configure the Domain Naming Master?
Definition
Active Directory Sites and Services
Term
What do you use to configure the Schema?
Definition
MMC, Schema Snap-in
Term
What helps decentralize administrative control?
Definition
OUs
Term
How does moving an OU affect permissions?
Definition
  • Permission assigned directly to OU will remain
  • Permissions inherited are removed are replaced with permissions inherited from new parent OU or domain
Term
What must happen for two forests to establish a two-way trust?
Definition
Must be created manually from both sides
Term
What are things to consider when planning user accounts?
Definition
  • Account naming
  • Choosing passwords
  • Account names must be between 1-20 characters
  • Account names are not case sensitive
Term
What allows users to have the same working environment on any computer?
Definition
Roaming profile
Term
What are Security groups stored as?
Definition
ACL entry
Term
Allowed permissions are ________.
Definition
Cumulative
Term
What displays real-time performance data?
Definition
System Monitor
Term
What records data from performance counters over a period of time?
Definition
Performance Logs and Alerts
Term
What are the three parts of Performance Logs and Alerts?
Definition
  • Counter logs
  • Trace logs
  • Alerts
Term
What captures statistics for specific counters?
Definition
Counter logs
Term
What records information when events occur?
Definition
Trace logs
Term
What performs an action when a counter reaches a specified value?
Definition
Alerts
Term
What is used to rebuild a DC that has been damaged, using Active Directory information from other DCs?
Definition
Nonauthoritative restore
Term
What is used to recover Active Directory objects that have been accidentally deleted?
Definition
Authoritative restore
Term
What allows you to automatically assign IP addresses, subnet masks, and other configuration information to client computer on a local network?
Definition
DHCP
Term
(T/F) Only DCs and Domain Member servers participating in Active Directory can be authorized.
Definition
True
Term
What is a pool of IP addresses within a logical subnet that the DHCP server can assign to clients?
Definition
Scope
Term
What are the characteristics of a reservation?
Definition
  • Permanent address lease
  • Hardware device on subnet can always use same IP address
Term
What utility checks port availabiliy?
Definition
Telnet
Term
What utility queries DNS for proper functioning?
Definition
Nslookup
Term
What is a command-line tool used determine the state of a server?
Definition
Dcdiag
Term
What utility is designed to troubleshoot NETBIOS name resolution problems?
Definition
Nbstat
Term
What utility displays protocol statistics and current TCP/IP connections?
Definition
Netstat
Term
What allows people to connect by specifying a name instead of having to remember an IP address?
Definition
DNS
Term
What should you use Security baselines for?
Definition
  • Each computer role (Desktop systems, Printer servers)
  • Major server roles (DCs)
Term
What is a software-based traffic analysis tool to capture, filter, and display frames directly from the network?
Definition
Network Monitor
Term
What are the two components of Network Monitor?
Definition
  • Network Monitor
  • Network Monitor Driver
Term
(T/F) Too many scripts can cause issues.
Definition
True
Term
Name the five FSMO Roles.
Definition
  • Domain Naming Master
  • Relative Identifier (RID) Master
  • Infrastructure Master
  • Primary Domain Controller (PDC) Emulator
  • Schema Master
Term
Name the Forest-Wide Master Roles.
Definition
  • Schema Master
  • Domain Naming Master
Term
Name the Domain-Wide Master Roles.
Definition
  • Relative Identifier (RID) Master
  • Primary Domain Controller (PDC) Emulator
  • Infrastructure Master
Term
Explain the difference between transferring a Master Role and seizing a Master Role.
Definition

Transfer - moving with cooperation of its current owner (move role from one server to another).

 

Seize - moving without the cooperation of its current owner (server holding role fails and you have no intent to restore it)

 

Term
What are three reasons to create multiple domains?
Definition
  • Meet security requirements
  • Meet administrative requirements
  • Optimize replication traffic
Term
Name the five predefined containers in Active Directory.
Definition
  • Builtin
  • Computers
  • Domain Controllers
  • Foreign Security Principles
  • Users
Term
What are the different ways to move objects between OUs?
Definition
  • Drag and drop
  • Move menu option
  • Dsmove
  • Movetree
Term
What is a logical relationship established between domains to allow pass-through authentication?
Definition
Trust
Term
What trust type is between two forests, requires Windows Server 2003 Forest functional level, and is transitive?
Definition
Cross-Forest Trust
Term
What are the actions that trigger replication between domain controllers?
Definition
  • Creating an object
  • Modifying an object
  • Moving an object
  • Deleting an object
Term
What are the recommended methods of forcing replication?
Definition
  • Active Directory Sites and Services
  • Repadmin
  • Replmon
  • Scripts
  • Script
Term
When would you perform a Primary Restore?
Definition
When you need to rebuild your domain.
Term
What are the three types of restores?
Definition
  • Primary
  • Authoritative
  • Nonauthoritative
Term
What type of restore involves the system state being replicated with another DC and is brought up-to-date by replicating after data is restored?
Definition
Nonauthoritative Restore
Term
What type of restore requires that the computer be started in DSRM, then run Ntdsutil.exe and marking specific objects prior to reboot?
Definition
Authoritative Restore
Term
What tools are used to monitor replication?
Definition
  • Windows Support Tools
  • Dcdiag
  • Repadmin
  • Replmon
Term
What is Replmon used for?
Definition
  • Check replication topology
  • Force synchronization
  • Generate status report to log file
  • View Bridgehead servers
Term
Where are domain user accounts stored?
Definition
In Active Directory on the DC
Term
How do you make a profile mandatory?
Definition
Change the name of the profile's registry file from Ntuser.dat to Ntuser.man
Term
What are the three profile types?
Definition
  • Local
  • Roaming
  • Mandatory
Term
What are the two group types?
Definition
  • Security
  • Distribution
Term
What are the three group scopes?
Definition
  • Domain Local
  • Global
  • Universal
Term
(T/F) A user account is a security principal.
Definition
True
Term
What determines where in the network the group can be used to assign group permissions?
Definition
Scope
Term
What character is used to designate a "hidden" share?
Definition
$ (dollar sign)
Term
What are the three share permissions?
Definition
  • Read
  • Change
  • Full Control
Term
Which takes precedence, Allow or Deny?
Definition
Deny
Term
Which takes precedence, file or folder?
Definition
File
Term
What allows permissions assigned at one folder to flow down to subsequent files and folders?
Definition
Inheritance
Term
What are the default permissions for a newly created share?
Definition
  • Administrators - Full Control
  • Everyone - Read
Term
Name the six logs that could be present on a Domain Controller.
Definition
  • Application Log
  • System Log
  • Security Log
  • Directory Service Log
  • File Replication Service Log
  • DNS Log
Term
What is the name of the native Windows Server 2003 backup utility?
Definition
Ntbackup
Term
What are the two ways to open Ntbackup?
Definition
  • Start Menu, Accessories, System Tools
  • Run, ntbackup.exe
Term
What are the five backup types?
Definition
  • Normal (Full)
  • Copy
  • Differential
  • Incremental
  • Daily
Term
What data is backed up with a Normal Backup and what is the archive bit status?
Definition
  • All selected data
  • Clears archive bit
Term
What data is backed up with a Incremental Backup and what is the archive bit status?
Definition
  • All files that have been modified or created since the last full or incremental.
  • Clears archive bit
Term
What data is backed up with a Differential Backup and what is the archive bit status?
Definition
  • All files that have been modified or created since the last full or incremental.
  • Does not clear archive bit
Term
How are leases renewed periodically?
Definition
  • At 50% of lease time
  • Restarting
  • Ipconfing /renew
Term
What is a set of one or more IP addresses, included within the range of a defined scope that you do not want to lease to clients?
Definition
Exclusion range
Term
What port does DHCP use for the Server Side?
Definition
UDP Port 67
Term
What port does DHCP use for the Client Side?
Definition
UDP port 68
Term
What command would you use in order to get basic host computer configuration information?
Definition
Ipconfig
Term
What are the five Security Paradigms?
Definition
  • Authentication
  • Authorization
  • Confidentiality
  • Integrity
  • Nonrepudiation
Term
What security paradigm is used to determine exactly who sent and received the message, and what protocols are used?
Definition
  • Nonrepudiation
  • Kerberos and IPSec
Term
What security paradigm is used to keep data secret and what protocols are used?
Definition
  • Confidentiality
  • Encryption components of Kerberos, NTLM and IPSec
Term
What security paradigm is used to ensure data received is the same as data sent, and what protocols are used?
Definition
  • Integrity
  • Kerberos, NTLM, and IPSec
Term
What security paradigm is used to determine what you can do on network after authentication and what protocols are used?
Definition
  • Authorization
  • Kerberos and NTLM
Term
If traffic leaving or arriving at the device on which the policy is active matches one of the filters, the traffic is either _______, ________ or ________.
Definition
blocked, allowed, or negotiated
Term
What security protocol would you use for Authentication (prove you are who you say you are)?
Definition
Kerberos and NTLM
Term
Name the three major network security protocols used in a Windows Server 2003 network.
Definition
  • Kerberos
  • NTLM
  • IPSec
Term
Where can Global group members come from and what can they access?
Definition
  • Only from local domain
  • access resources in any domain
Term
Where can Domain Local group members come from and what can they access?
Definition
  • From any domain
  • Access resources only in local domain
Term
Where can Universal group members come from and what can they access?
Definition
  • From any domain
  • Access resources in any domain
Term
What is the purpose of a Global group?
Definition
To organize users who share similar network access requirements.
Term
What is the purpose of a Domain Local group?
Definition
Used to assign permissions to resources.
Term
What is the purpose of a Universal group?
Definition
Used to assign permissions to related resources in multiple domains.
Term
When planning your OUs, what are the aspects you should keep in mind?
Definition
  • OUs are purely logical entities
  • OUs are for delegation of administration
  • OUs are for Group Policy
  • OUs are for controlling object visibility
  • OUs are easy to reorganize
  • Each OU should have a specific need and purpose to exist
  • No limit on how deep a OU tree is
  • OUs are mainly administrative units
Term
What does implementation of an OU structure require first?
Definition
That the administrator has the correct permission to create new OUs.
Term
Members of what groups have the authority to create new OUs in a domain?
Definition
  • Domain Admins
  • Enterprise Admins
Term
(T/F) Users can be delegated the appropriate permissions to create OUs.
Definition
True
Term
Where do you create the OU structure?
Definition
Active Directory Users and Computers console
Term
What are the two categories of Group Policy settings?
Definition
  • Computer
  • User
Term
What is a collection of user and computer configuration settings that can be linked to computers, sites, domains and OUs to specify the behavior of a users' desktop?
Definition
Group Policy
Term
What type of processing allows each process to finish before another one begins and must finish before desktop is displayed?
Definition
Synchronous
Term
What type of processing allows multiple processes to run at the same time, has faster access to the desktop, and may have access to unauthorized settings?
Definition
Asynchronous
Term
What command is used to refresh both computer and user Group Policies?
Definition
gpupdate
Term
What are the two types of scripts?
Definition
  • Logon/Logoff
  • Startup/Shutdown
Term
What allows a security administrator to manually configure security levels assigned to a local or nonlocal GPO?
Definition
Security Settings
Term
What is a contiguous portion of a namespace for which the server is authoritative?
Definition
DNS Zone
Term
What does it mean when no employee and no user of information systems has more privileges or access to information and resources than they need to do their job?
Definition
Principle of Least Privilege
Term
What are the three trust characteristics?
Definition
  • Trusts can be created manually (explicitly) or automatically (implicitly)
  • can be either transitive (not bound) or non transitive (bound)
  • can be one-way or two-way
  • Term
    What is a collection of packet filters that enforce security policies on IP traffic?
    Definition
    IPSec
    Supporting users have an ad free experience!