CIS 277 - R4

25 Questions | Total Attempts: 562

SettingsSettingsSettings
CIS Quizzes & Trivia

Review Question Chapter 4


Questions and Answers
  • 1. 
    The protocol for accessing Active Directory objects and services is based on which of the fol-lowing standards?
    • A. 

      DNS

    • B. 

      LDAP

    • C. 

      DHCP

    • D. 

      ICMP

  • 2. 
    Which MMC do you use to create OUs?
    • A. 

      Active Directory Sites and Services

    • B. 

      Active Directory Domains and Trusts

    • C. 

      Active Directory Users and Computers

    • D. 

      Computer Management

  • 3. 
    Which wizard is used to assign users the authority to perform certain tasks on Active Directory  objects?
  • 4. 
    User, computer, and group accounts can be referred to as which of the following?
    • A. 

      Discretionary access accounts

    • B. 

      Security descriptors

    • C. 

      Local objects

    • D. 

      Security principals

  • 5. 
    Which of the following must you modify if you want to change an Active Directory object’s permissions?
    • A. 

      DACL

    • B. 

      SACL

    • C. 

      Object attributes

    • D. 

      Object schema

  • 6. 
    An object’s owner automatically has Full control permission for the object. True or False?
    • A. 

      True

    • B. 

      False

  • 7. 
    JDoe is a member of a group that has Full control permission for an OU, which the groupinherited from a parent OU. What is the best way to stop JDoe from having Write permis-sion to this OU without affecting any other permissions?
    • A. 

      Remove JDoe from the group.

    • B. 

      Add a Deny ACE for JDoe to the parent OU.

    • C. 

      Add an explicit Deny ACE for JDoe to the OU.

    • D. 

      Add a Deny ACE for the group to the parent OU.

  • 8. 
    You’re logged on as Administrator to a domain controller and are trying to troubleshoot aproblem with a user’s access to Active Directory objects. You open Active Directory Usersand Computers to access an object’s properties. However, you can’t view the object’s per-missions. What is the most likely problem?
    • A. 

      You don’t have sufficient permissions to view the object’s permissions.

    • B. 

      You need to open Active Directory Domains and Trusts.

    • C. 

      You need to enable Advanced Features.

    • D. 

      You need to run the View Object Permissions Wizard.

  • 9. 
    A user’s permissions to an object that are a combination of inherited and explicit permis-sions assigned to the user’s account and groups the user belongs to are referred to as whichof the following?
    • A. 

      Inherited permissions

    • B. 

      Effective permissions

    • C. 

      Explicit permissions

    • D. 

      Access permissions

  • 10. 
    Inherited permissions always override explicit permissions. True or False?
    • A. 

      True

    • B. 

      False

  • 11. 
    You’re viewing the DACL for an OU and notice an inherited ACE for a user account thatgives the account permission to the OU that it shouldn’t have. You want to remove the ACE  from the OU, but you  get an  error  message   when   you   attempt    to   do s  o. What do you    need to do?
    • A. 

      Open Active Directory Users and Computers in administrative mode.

    • B. 

      Use ADSI Edit to remove permissions.

    • C. 

      Disable inheritance on the OU.

    • D. 

      Add an explicit Deny ACE for the user account.

  • 12. 
    A user is having trouble accessing an OU, so you need to determine the user’s permissionsto the OU. You log on to the domain controller as Administrator and view the Security tabof the OU’s Properties dialog box. What do you do next?
  • 13. 
    Which of the following is a reason for establishing multiple sites? ( Choose all that apply.)
    • A. 

      Improving authentication efficiency

    • B. 

      Enabling more frequent replication

    • C. 

      Reducing traffic on the WAN

    • D. 

      Having only one IP subnet

  • 14. 
    Which of the following is a reason to use multiple domains? ( Choose all that apply.)
    • A. 

      Need for different name identities

    • B. 

      Replication control

    • C. 

      Need for differing account policies

    • D. 

      Easier access to resources

  • 15. 
    Trust relationships between all domains in a forest are two-way transitive trusts. True or False?
    • A. 

      True

    • B. 

      False

  • 16. 
    What can you do to integrate user authentication between Linux and Active Directory?
    • A. 

      Create a realm trust.

    • B. 

      Create an external trust.

    • C. 

      Create a one-way trust.

    • D. 

      Create a transitive trust.

  • 17. 
    What can you do to reduce the delay caused by authentication referral?
    • A. 

      Create a forest trust.

    • B. 

      Create an external trust.

    • C. 

      Create a shortcut trust.

    • D. 

      Create a transitive trust.

  • 18. 
    Which of the following is a valid reason for using multiple forests?
    • A. 

      Centralized management

    • B. 

      Need for different schemas

    • C. 

      Easy access to all domain resources

    • D. 

      Need for a single global catalog

  • 19. 
    You have an Active Directory forest of two trees and eight domains. You haven’t changed any of the operations master domain controllers. On which domain controllers is the schema master?
    • A. 

      All domain controllers

    • B. 

      The last domain controller installed

    • C. 

      The first domain controller in the forest root domain

    • D. 

      The first domain controller in each tree

  • 20. 
    Which of the following is not a function of the global catalog?
    • A. 

      Facilitates forestwide searches

    • B. 

      Keeps universal group memberships

    • C. 

      Facilitates intersite replication

    • D. 

      Facilitates forestwide logons

  • 21. 
    Which of the following do all domains in the same forest have in common? ( Choose all that apply.)
    • A. 

      The same domain name

    • B. 

      The same schema

    • C. 

      The same user accounts

    • D. 

      The same global catalog

  • 22. 
    Your company has merged with another company that also uses Windows Server 2008 andActive Directory. You want to give the other company’s users access to your company’sdomain resources and vice versa without duplicating account information and with the leastadministrative effort. How can you accomplish this? (create what?)
  • 23. 
    Which is responsible for determining the replication topology?
    • A. 

      GPO

    • B. 

      RID

    • C. 

      KCC

    • D. 

      PDC

  • 24. 
    Which is responsible for management of adding, removing, and renaming domains in a forest?
    • A. 

      Schema master

    • B. 

      Infrastructure master

    • C. 

      Domain naming master

    • D. 

      RID master

  • 25. 
    Which of the following is a directory partition? (Choose all that apply.)
    • A. 

      Domain directory partition

    • B. 

      Group policy partition

    • C. 

      Schema directory partition

    • D. 

      Configuration partition

Related Topics
Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.