+

It220 Set 2

It220 Final Exam? S
   or     

Flashcard Set Preview

Side ASide B
The KCC is responsible for calculating intrasite replication partners.During this process, what is the maximum number of hops that the KCCwill allow between domain controllers?a. 2b....
b. The maximum number of hops that the KCC will allow between domain controllersis three. This allows a maximum replication latency of 15 minutes, since eachdomain controller holds...
Replication that occurs between sites is called ____________ replication.a. Localb. Remotec. Intersited. Intrasite
c. Intersite replication occurs between sites.
Company XYZ is a national company with locations in Detroit, Minneapolis,Phoenix, and Dallas. There are two connections between Detroit andMinneapolis. The first is a T-1 link and the...
ANSWERa. When setting costs, the lower number indicates a higher priority. Settingthe cost of 1 for the T-1 and 5 for the 128-Kbps link indicates that the T-1 is theprimary replication...
You are a consultant working on a site plan for a medium-sized organization.The organization consists of a main office and three branch offices.Two of the locations have standard IP...
Configure RPC over IP for the two standard link branch offices and configure SMTPfor the remote office that is part of a separate domain. This solution follows theguidelines that include...
Assuming the same scenario as in question 4, what information will bereplicated between the third branch office and the main office?
Global catalog, schema, and configuration information will be the only informationreplicated because the third branch office is using SMTP for replication. SMTP onlyreplicates global...
You are the administrator for a network that has several sites. There is asite link from the main headquarters to each remote site for file transferand replication purposes. You have...
a. The default intersite replication schedule is set for every 180 minutes.
Modify the scenario in question 6 by placing all domain controllers in thesame site. How would you answer your manager’s question now?a. Replication occurs every 180 minutes by default.b....
c. When a new account is added to the Active Directory database, the accountinformation is immediately replicated to all domain controllers within the site. Thedifference between this...
What is the advantage of creating your sites and subnets prior to installingsubsequent domain controllers?
When your domain controllers are installed and an IP address is assigned, they willautomatically be placed in the site associated with their network address. This willsave you the step...
What is the database that serves as a central repository for all ActiveDirectory objects called?a. Main databaseb. Central catalogc. Global databased. Global cataloge. Enterprise catalog
d. Global catalog is the term used to refer to the central repository databasethat contains all Active Directory objects. All other answers are not valid terms.
Which of the following roles are forest-wide roles?a. PDC emulatorb. Infrastructure masterc. Domain naming masterd. Schema mastere. Global catalog
c and d. The two forest-wide roles are the domain naming master and schemamaster role. The other choices are domain-wide roles.
Your single-domain company is planning to add a second location thatwill access the domain via a frame relay connection. The frame relay servicethat has been used in the past in your...
You can either make the site a global catalog server or you can enable universalgroup membership caching for the site.
Contoso Pharmaceuticals is expanding to include several newly acquiredcompanies. Although they will each become part of the contoso.comforest, each of these companies wants to maintain...
Since it is part of the contoso.com forest, it will need to have all three domain-wideroles, which include RID master, infrastructure master, and PDC emulator roles.
Which of the following two scripting languages are supported by WSH?a. WSHb. Javac. Basicd. Jscripte. VBScript
d and e. Jscript and VBScript files are supported by Windows Script Host.
You work for a local school district as the district wide network administrator.Currently the district has a UNIX database that contains all studentrecords. The district board of educators...
The best strategy for this is to export the UNIX database information to a file.This file can be edited and used either with CSVDE, LDIFDE, or WSH. As an administratoryou should consider...
Your company network consists of four domains that include WindowsNT Server 4.0, Windows 2000, and Windows Server 2003 servers. Eachdomain has a group of managers that need access to...
Your domain is in mixed mode due to the Windows NT Server 4.0 servers. Mixedmode does not offer universal group support.
What is the difference between a security group and a distribution group?
Distribution groups cannot be assigned resource access permissions. Securitygroups offer both distribution list capabilities and security permission assignments.
What is the difference between a domain local group and a local group?
Domain local groups are stored in Active Directory. They can be centrally managedand can be given permission to access domain resources. Local groups are storedon the computer in which...
You have just finished joining a newly installed Windows XP workstationinto your domain. To which group will this computer be a member bydefault?a. Domain Controllersb. Local Computersc....
The correct answer is d. All computers that are joined to an Active Directorydomain are automatically made members of the Domain Computers group.
You are preparing to implement smart cards into your organization for allusers. Which Windows Server 2003 service must you install in order tosupport smart card authentication?a. Secondary...
b. Certificate Services are required for smart card functionality. Answer a, SecondaryLogon Service, is required for Run As; answer c, Domain Name Service, is requiredfor name resolution;...
One of your employees is unable to gain access to the network becauseshe left her smart card at home. Keeping in mind that your network hasfairly high security guidelines, which of...
d. Issuing a temporary smart card will provide the benefits of maintaining thesecurity of the network, without username/password combinations. All otheroptions are valid, but not as...
Which tool must you use to move a user object from one domain toanother domain?a. Active Directory Users And Computersb. Drag and dropc. Movetreed. Dsmove
c. Movetree must be used to move objects between domains. All other options canbe used to move objects within the same domain structure.
You are attempting to use the Run As program to open Active DirectoryUsers And Computers, but you receive an error message and are unableto do this. What should you check?a. Check to...
d. The Secondary Logon service must be running for you to create a secondconnection using another set of credentials.
What must you have in order to be able to create a smart card on behalfof a user in your organization?a. An enrollment certificateb. A token-style cardc. An administrator user accountd....
a. You must have an enrollment certificate in order to create smart cards onbehalf of users in your organization.
Which of the following statements should be considered most importantwhen planning your OU structure?a. Delegation of administrative tasksb. Group Policy implementationc. User access...
a. Delegation of administration should be the most important consideration whenplanning your OU structure.
You are a new administrator taking over for an employee who has justretired. You have recently created several policies that are being used toconfigure workstations throughout the network....
A nonlocal GPO is processed after the local Group Policy, and it is modifying thewallpaper setting that is part of the workstation.
What is the default order in which policies are processed?a. site, domain, OU, localb. domain, site, OU, localc. local, domain, site, OUd. local, site, domain, OU
d. Local policies are processed first, followed by site, domain, and then OU policies.
1. Which of the following event categories should you audit if you want tofind out if an unauthorized person is trying to access a user account byentering random passwords or by using...
b and d.
Which of the following rule types apply only to Windows Installerpackages?a. Hash rulesb. Certificate rulesc. Internet zone rulesd. Path rules
c. Internet zone rules apply only to Windows Installer packages.
List the order of precedence from highest to lowest for software restrictionpolicy rules.
The order of precedence for software restriction policies is: hash, certificate,Internet zone, and path rules.


Upgrade and get a lot more done!
Upgrade