Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Server 2 final Ch 5-8 QUESTIONS AND ANSWERS ALL CORRECT

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
11-07-2022
Geschreven in
2021/2022

Server 2 final Ch 5-8 A(n) _____ can only contain members from within the same domain. Correct Answer: Global Group You can use the _____ utility to import data from Comma-Separated Values (CSV) files. Correct Answer: CSVDE Each user and group object has a(n) _____, which must be unique across an entire Active Directory domain. Correct Answer: SAM account name The Anonymous Logon group is an example of a(n) _____. Correct Answer: Special Identity Group You can use the _____ command-line utility to create and modify Active Directory objects. Correct Answer: LDIFDE When users log on to Active Directory, they receive a(n) _____ consisting of all of their security group memberships. Correct Answer: access token 7. A local user is stored in the _____ database of the computer on which it was created. Correct Answer: Security Account Manager (SAM) Each CSV file needs to begin with a(n) _____ when used with the CSVDE command-line tool. Correct Answer: header record A(n) _____ can only be used to send and receive email, not to secure network resources. Correct Answer: distribution group _____ is the practice of adding one group as a member of another group. Correct Answer: Group nesting Which special identity group controls anonymous access to resources in Windows Server 2008? Correct Answer: Anonymous Logon What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure? Correct Answer: Group scope What technique is used to configure one security group as a member of another security group? Correct Answer: Group nesting The Administrator and Guest user accounts are examples of ______________. Correct Answer: Built-in user account Which command-line tool can be used to create various object types within Active Directory? Correct Answer: dsadd Which input file format allows you to create, modify, and delete objects within Active Directory? Correct Answer: Comma Separated Value (CSV) Which group type allows you to assign permissions to resources, as well as receive messages via Active Directory-enabled email applications such as Microsoft Exchange? Correct Answer: Security group Which group scope can contain users and groups from any domain within an Active Directory forest, but can be used only to secure resources located within the same domain as the group itself? Correct Answer: Domain local group Which account type is configured on an Active Directory domain controller and can be used to grant access to resources on any domain-joined computer? Correct Answer: Domain account What can be used to run script files using VBScript or JScript from the Windows desktop or from a command prompt? Correct Answer: Windows Scripting Host (WSH) This service is required to use the runas feature. Correct Answer: Secondary Logon This command-line tool can be used to move an object from one OU to another. Correct Answer: dsmove This tool is used to move objects from one domain to another Correct Answer: Active Directory Migration Tool Hackers will use this attack to identify a user's password by trying numerous words and word combinations until they find a match. Correct Answer: dictionary attack When you create this item do not use words from the dictionary. Correct Answer: strong password This can be used to run a single command using administrative privileges while logging onto a workstation or server using a Domain User account. Correct Answer: runas This can be used for authentication in lieu of a password when used with an ATM or a smart card. Correct Answer: personal identification number (PIN) Use this tool to grant authority to a user or group of users over a portion of the Active Directory tree. Correct Answer: Delegation of Control Wizard This method of moving objects from one OU to another was introduced in Windows Server 2003. Correct Answer: drag-and-drop A dictionary attack is one type of this attack. Correct Answer: password-cracking Which interface allows you to grant limited permissions within Active Directory to individual users or groups to adhere to a principle of least privilege in administering Active Directory? Correct Answer: Delegation of Control Wizard Which program allows you to use the Secondary Logon service to launch individual programs and utilities using administrative privileges? Correct Answer: Runas Which command-line utility can be used to move an Active Directory object from one container to another? Correct Answer: Dsmove What is a numeric or alphanumeric character sequence that you enter with a smart card to access a server or other Active Directory resource? Correct Answer: Personal Identification Nu

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Server 2 final Ch 5-8
A(n) _____ can only contain members from within the same domain. Correct Answer: Global Group

You can use the _____ utility to import data from Comma-Separated Values (CSV) files. Correct Answer:
CSVDE

Each user and group object has a(n) _____, which must be unique across an entire Active Directory
domain. Correct Answer: SAM account name

The Anonymous Logon group is an example of a(n) _____. Correct Answer: Special Identity Group

You can use the _____ command-line utility to create and modify Active Directory objects. Correct
Answer: LDIFDE

When users log on to Active Directory, they receive a(n) _____ consisting of all of their security group
memberships. Correct Answer: access token

7. A local user is stored in the _____ database of the computer on which it was created. Correct Answer:
Security Account Manager (SAM)

Each CSV file needs to begin with a(n) _____ when used with the CSVDE command-line tool. Correct
Answer: header record

A(n) _____ can only be used to send and receive email, not to secure network resources. Correct
Answer: distribution group

_____ is the practice of adding one group as a member of another group. Correct Answer: Group
nesting

Which special identity group controls anonymous access to resources in Windows Server 2008? Correct
Answer: Anonymous Logon

What defines the types of objects that can belong to a particular group and the types of resources that
group can be used to secure? Correct Answer: Group scope

What technique is used to configure one security group as a member of another security group? Correct
Answer: Group nesting

The Administrator and Guest user accounts are examples of ______________. Correct Answer: Built-in
user account

Which command-line tool can be used to create various object types within Active Directory? Correct
Answer: dsadd

, Which input file format allows you to create, modify, and delete objects within Active Directory? Correct
Answer: Comma Separated Value (CSV)

Which group type allows you to assign permissions to resources, as well as receive messages via Active
Directory-enabled email applications such as Microsoft Exchange? Correct Answer: Security group

Which group scope can contain users and groups from any domain within an Active Directory forest, but
can be used only to secure resources located within the same domain as the group itself? Correct
Answer: Domain local group

Which account type is configured on an Active Directory domain controller and can be used to grant
access to resources on any domain-joined computer? Correct Answer: Domain account

What can be used to run script files using VBScript or JScript from the Windows desktop or from a
command prompt? Correct Answer: Windows Scripting Host (WSH)

This service is required to use the runas feature. Correct Answer: Secondary Logon

This command-line tool can be used to move an object from one OU to another. Correct Answer:
dsmove

This tool is used to move objects from one domain to another Correct Answer: Active Directory
Migration Tool

Hackers will use this attack to identify a user's password by trying numerous words and word
combinations until they find a match. Correct Answer: dictionary attack

When you create this item do not use words from the dictionary. Correct Answer: strong password

This can be used to run a single command using administrative privileges while logging onto a
workstation or server using a Domain User account. Correct Answer: runas

This can be used for authentication in lieu of a password when used with an ATM or a smart card.
Correct Answer: personal identification number (PIN)

Use this tool to grant authority to a user or group of users over a portion of the Active Directory tree.
Correct Answer: Delegation of Control Wizard

This method of moving objects from one OU to another was introduced in Windows Server 2003.
Correct Answer: drag-and-drop

A dictionary attack is one type of this attack. Correct Answer: password-cracking

Which interface allows you to grant limited permissions within Active Directory to individual users or
groups to adhere to a principle of least privilege in administering Active Directory? Correct Answer:
Delegation of Control Wizard

Geschreven voor

Vak

Documentinformatie

Geüpload op
11 juli 2022
Aantal pagina's
6
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Classroom NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4878
Lid sinds
4 jaar
Aantal volgers
3232
Documenten
55439
Laatst verkocht
3 uur geleden
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Lees meer Lees minder
4.0

1185 beoordelingen

5
624
4
216
3
196
2
40
1
109

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen