Michael Marcus
Quiz by , created more than 1 year ago

70-411 Final College Exam

476
1
0
Michael Marcus
Created by Michael Marcus about 5 years ago
Close
  • Quiz 15 & 16

    Question 1 of 35

    1

    Where are you most likely to see a Read-Only Domain Controller (RODC)?

    Select one of the following:

    • in a small network instead of in an enterprise

    • in an enterprise network

    • in a remote site

    • in the place of a standard domain controller

    Explanation

    Question 2 of 35

    1

    Which of the following is the format for a virtual account used with Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

    Select one of the following:

    • domainname\servicename

    • computername\servicename

    • NT Service\servicename

    • NT Service\servicename$

    Explanation

    Question 3 of 35

    1

    NTLM uses a challenge-response mechanism for authentication without doing what?

    Select one of the following:

    • revealing the client's operating system to the server

    • revealing the protocol to the server

    • sending a password to the server

    • sending an encrypt/decrypt message to the server

    Explanation

    Question 4 of 35

    1

    Which three components make up a service principal name (SPN)

    Select one of the following:

    • service name, IP address, and port number

    • service name, URL and host name

    • service name, host name, and IP address

    • service class, host name, and port number

    Explanation

    Question 5 of 35

    1

    Before you can create an MSA object type, you must create what?

    Select one of the following:

    • a key services MSA group

    • a key services MSA distributed domain account

    • a key distribution services root key

    • a key distribution services Master MSA

    Explanation

    Question 6 of 35

    1

    What are the two restrictions for adding SPNs to an account?

    Select one or more of the following:

    • Domain Administrator privileges

    • full control permissions for the folder

    • local administrator privileges

    • the editor runs from the domain controller

    Explanation

    Question 7 of 35

    1

    Although the changes are easy to make, why is changing the AD schema such a big deal

    Select one of the following:

    • The changes replicate to all domain controllers.

    • The changes could corrupt the database.

    • Doing so affects all objects for that object type.

    • Doing so requires controlled changes.

    Explanation

    Question 8 of 35

    1

    Where in the forest is a global catalog automatically created?

    Select one of the following:

    • the PDC Emullator

    • the most powerful system

    • the first domain controller

    • the schema master

    Explanation

    Question 9 of 35

    1

    You do not place the infrastructure master on a global catalog server unless what situation exists?

    Select one of the following:

    • You have a single domain

    • You have Windows NT 4.0 systems to support

    • You have multiple schemas

    • Your AD DS is Windows 2008 or higher

    Explanation

    Question 10 of 35

    1

    Beginning with which server version can you safely deploy domain controllers in a virtual machine?

    Select one of the following:

    • Windows Server 2003

    • Windows Server 2008

    • Windows Server 2008 R2

    • Windows Server 2012

    Explanation

    Question 11 of 35

    1

    Which of the following commands issued at the fsmo maintenance prompt would successfully seize the role of an Operations Master Holder? Select all that apply

    Select one or more of the following:

    • seize schema master

    • seize global master

    • seize PDC

    • seize domain control

    Explanation

    Question 12 of 35

    1

    Identify another utility that you can use to add SPNs to an account

    Select one of the following:

    • dnscmd

    • spnedit

    • setspn

    • netsh

    Explanation

    Question 13 of 35

    1

    What happens if a client submits a service ticket request for an SPN that does not exist in the identity store?

    Select one of the following:

    • An event is written to the Kerberos server's event log.

    • The client receives an access denied error

    • The Kerberos server receives an access denied error

    • The Kerberos ticket for that service is destroyed.

    Explanation

    Question 14 of 35

    1

    Kerberos security and authentication are based on what type of technology?

    Select one of the following:

    • secure transmission

    • secret key

    • challenge-response

    • legacy code

    Explanation

    Question 15 of 35

    1

    What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?

    Select one of the following:

    • 1 minute

    • 5 minutes

    • 15 minutes

    • 45 minutes

    Explanation

    Question 16 of 35

    1

    When creating accounts for separating systems, processes, and services, you should always configure them with what two things in mind?

    Select one or more of the following:

    • using strong passwords

    • using cryptic user names

    • granting the least rights possible

    • using built-in accounts

    Explanation

    Question 17 of 35

    1

    What is the name by which a client uniquely identifies an instance of a service?

    Select one of the following:

    • service instance name

    • service account name

    • service provider name

    • service principal name

    Explanation

    Question 18 of 35

    1

    What is the default authentication protocol for contemporary domain controllers

    Select one of the following:

    • NTLM

    • PAP

    • CHAP

    • Kerberos

    Explanation

    Question 19 of 35

    1

    Which version of Windows Server introduced incremental universal group membership replication?

    Select one of the following:

    • Windows Server 2000

    • Windows Server 2003

    • Windows Server 2008

    • Windows Server 2012

    Explanation

    Question 20 of 35

    1

    What are the three types of groups in a domain?

    Select one of the following:

    • domain trust groups, domain schema groups, and universal groups

    • domain local groups, global groups, and universal groups

    • global groups, domain trust groups and schema groups

    • universal groups, global catalog groups and schema groups.

    Explanation

    Question 21 of 35

    1

    When you add attributes to an Active Directory object, what part of the domain database are you actually changing?

    Select one of the following:

    • FSMO

    • schema

    • directory structure

    • organizational units

    Explanation

    Question 22 of 35

    1

    The domain controllers are the computers that store and run the:

    Select one of the following:

    • user database

    • services database

    • Managed Service Accounts database

    • Active Directory database

    Explanation

    Question 23 of 35

    1

    Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?

    Select one of the following:

    • Schema Master

    • Forest

    • RODC

    • Operations Master

    Explanation

    Question 24 of 35

    1

    What service right does an MSA account automatically receive upon creation?

    Select one of the following:

    • log on interactively

    • log on as a service

    • domain administrator

    • domain power user

    Explanation

    Question 25 of 35

    1

    Name two benefits to using Managed Service Accounts (MSAs).

    Select one or more of the following:

    • Microsoft technology

    • automatic password management

    • simplified SPN management

    • simplified account troubleshooting

    Explanation

    Question 26 of 35

    1

    What does the acronym NTLM stand for?

    Select one of the following:

    • NT LInk Messenger

    • NT Link Manager

    • NT LAN Manager

    • NT LAN Messenger

    Explanation

    Question 27 of 35

    1

    Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?

    Select one of the following:

    • netdom /RODCPrep

    • netsh /RODCPrep

    • ntdsutil /RODCPrep

    • ADPrep /RODCPrep

    Explanation

    Question 28 of 35

    1

    Which tool can you use to add SPNs to an account?

    Select one of the following:

    • Notepad

    • LDAP

    • Microsoft Word

    • ADSI Edit

    Explanation

    Question 29 of 35

    1

    How many global catalogs are recommended for every organization?

    Select one of the following:

    • at least one

    • at least two

    • at least three

    • no fewer than four

    Explanation

    Question 30 of 35

    1

    How many PDC Emulators are required, if needed, in a domain?

    Select one of the following:

    • one

    • two

    • three

    • four

    Explanation

    Question 31 of 35

    1

    By default, which service accounts will the Windows PowerShell cmdlets manage?

    Select one of the following:

    • standalone MSAs

    • standard local services accounts

    • group MSAs

    • domain user accounts designated as service accounts

    Explanation

    Question 32 of 35

    1

    What type of account is an account under which an operating system, process, or service runs?

    Select one of the following:

    • user

    • system

    • service

    • network

    Explanation

    Question 33 of 35

    1

    The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.

    Select one or more of the following:

    • logon

    • object searches

    • universal group membership

    • schema integrity

    Explanation

    Question 34 of 35

    1

    Which type of system must you connect to and use to make changes to Active Directory?

    Select one of the following:

    • RODC

    • forest master

    • writable domain controller

    • domain tree

    Explanation

    Question 35 of 35

    1

    What utility must you run on a cloned system to ensure that the clone receives its own SID?

    Select one of the following:

    • adprep/renew

    • sysprep

    • dcpromo

    • ntconfig

    Explanation