Michael Marcus
Quiz by , created more than 1 year ago

70-411 Final College Exam

511
1
0
Michael Marcus
Created by Michael Marcus over 8 years ago
Close

Quiz 15 & 16

Question 1 of 35

1

Where are you most likely to see a Read-Only Domain Controller (RODC)?

Select one of the following:

  • in a small network instead of in an enterprise

  • in an enterprise network

  • in a remote site

  • in the place of a standard domain controller

Explanation

Question 2 of 35

1

Which of the following is the format for a virtual account used with Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

Select one of the following:

  • domainname\servicename

  • computername\servicename

  • NT Service\servicename

  • NT Service\servicename$

Explanation

Question 3 of 35

1

NTLM uses a challenge-response mechanism for authentication without doing what?

Select one of the following:

  • revealing the client's operating system to the server

  • revealing the protocol to the server

  • sending a password to the server

  • sending an encrypt/decrypt message to the server

Explanation

Question 4 of 35

1

Which three components make up a service principal name (SPN)

Select one of the following:

  • service name, IP address, and port number

  • service name, URL and host name

  • service name, host name, and IP address

  • service class, host name, and port number

Explanation

Question 5 of 35

1

Before you can create an MSA object type, you must create what?

Select one of the following:

  • a key services MSA group

  • a key services MSA distributed domain account

  • a key distribution services root key

  • a key distribution services Master MSA

Explanation

Question 6 of 35

1

What are the two restrictions for adding SPNs to an account?

Select one or more of the following:

  • Domain Administrator privileges

  • full control permissions for the folder

  • local administrator privileges

  • the editor runs from the domain controller

Explanation

Question 7 of 35

1

Although the changes are easy to make, why is changing the AD schema such a big deal

Select one of the following:

  • The changes replicate to all domain controllers.

  • The changes could corrupt the database.

  • Doing so affects all objects for that object type.

  • Doing so requires controlled changes.

Explanation

Question 8 of 35

1

Where in the forest is a global catalog automatically created?

Select one of the following:

  • the PDC Emullator

  • the most powerful system

  • the first domain controller

  • the schema master

Explanation

Question 9 of 35

1

You do not place the infrastructure master on a global catalog server unless what situation exists?

Select one of the following:

  • You have a single domain

  • You have Windows NT 4.0 systems to support

  • You have multiple schemas

  • Your AD DS is Windows 2008 or higher

Explanation

Question 10 of 35

1

Beginning with which server version can you safely deploy domain controllers in a virtual machine?

Select one of the following:

  • Windows Server 2003

  • Windows Server 2008

  • Windows Server 2008 R2

  • Windows Server 2012

Explanation

Question 11 of 35

1

Which of the following commands issued at the fsmo maintenance prompt would successfully seize the role of an Operations Master Holder? Select all that apply

Select one or more of the following:

  • seize schema master

  • seize global master

  • seize PDC

  • seize domain control

Explanation

Question 12 of 35

1

Identify another utility that you can use to add SPNs to an account

Select one of the following:

  • dnscmd

  • spnedit

  • setspn

  • netsh

Explanation

Question 13 of 35

1

What happens if a client submits a service ticket request for an SPN that does not exist in the identity store?

Select one of the following:

  • An event is written to the Kerberos server's event log.

  • The client receives an access denied error

  • The Kerberos server receives an access denied error

  • The Kerberos ticket for that service is destroyed.

Explanation

Question 14 of 35

1

Kerberos security and authentication are based on what type of technology?

Select one of the following:

  • secure transmission

  • secret key

  • challenge-response

  • legacy code

Explanation

Question 15 of 35

1

What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?

Select one of the following:

  • 1 minute

  • 5 minutes

  • 15 minutes

  • 45 minutes

Explanation

Question 16 of 35

1

When creating accounts for separating systems, processes, and services, you should always configure them with what two things in mind?

Select one or more of the following:

  • using strong passwords

  • using cryptic user names

  • granting the least rights possible

  • using built-in accounts

Explanation

Question 17 of 35

1

What is the name by which a client uniquely identifies an instance of a service?

Select one of the following:

  • service instance name

  • service account name

  • service provider name

  • service principal name

Explanation

Question 18 of 35

1

What is the default authentication protocol for contemporary domain controllers

Select one of the following:

  • NTLM

  • PAP

  • CHAP

  • Kerberos

Explanation

Question 19 of 35

1

Which version of Windows Server introduced incremental universal group membership replication?

Select one of the following:

  • Windows Server 2000

  • Windows Server 2003

  • Windows Server 2008

  • Windows Server 2012

Explanation

Question 20 of 35

1

What are the three types of groups in a domain?

Select one of the following:

  • domain trust groups, domain schema groups, and universal groups

  • domain local groups, global groups, and universal groups

  • global groups, domain trust groups and schema groups

  • universal groups, global catalog groups and schema groups.

Explanation

Question 21 of 35

1

When you add attributes to an Active Directory object, what part of the domain database are you actually changing?

Select one of the following:

  • FSMO

  • schema

  • directory structure

  • organizational units

Explanation

Question 22 of 35

1

The domain controllers are the computers that store and run the:

Select one of the following:

  • user database

  • services database

  • Managed Service Accounts database

  • Active Directory database

Explanation

Question 23 of 35

1

Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?

Select one of the following:

  • Schema Master

  • Forest

  • RODC

  • Operations Master

Explanation

Question 24 of 35

1

What service right does an MSA account automatically receive upon creation?

Select one of the following:

  • log on interactively

  • log on as a service

  • domain administrator

  • domain power user

Explanation

Question 25 of 35

1

Name two benefits to using Managed Service Accounts (MSAs).

Select one or more of the following:

  • Microsoft technology

  • automatic password management

  • simplified SPN management

  • simplified account troubleshooting

Explanation

Question 26 of 35

1

What does the acronym NTLM stand for?

Select one of the following:

  • NT LInk Messenger

  • NT Link Manager

  • NT LAN Manager

  • NT LAN Messenger

Explanation

Question 27 of 35

1

Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?

Select one of the following:

  • netdom /RODCPrep

  • netsh /RODCPrep

  • ntdsutil /RODCPrep

  • ADPrep /RODCPrep

Explanation

Question 28 of 35

1

Which tool can you use to add SPNs to an account?

Select one of the following:

  • Notepad

  • LDAP

  • Microsoft Word

  • ADSI Edit

Explanation

Question 29 of 35

1

How many global catalogs are recommended for every organization?

Select one of the following:

  • at least one

  • at least two

  • at least three

  • no fewer than four

Explanation

Question 30 of 35

1

How many PDC Emulators are required, if needed, in a domain?

Select one of the following:

  • one

  • two

  • three

  • four

Explanation

Question 31 of 35

1

By default, which service accounts will the Windows PowerShell cmdlets manage?

Select one of the following:

  • standalone MSAs

  • standard local services accounts

  • group MSAs

  • domain user accounts designated as service accounts

Explanation

Question 32 of 35

1

What type of account is an account under which an operating system, process, or service runs?

Select one of the following:

  • user

  • system

  • service

  • network

Explanation

Question 33 of 35

1

The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.

Select one or more of the following:

  • logon

  • object searches

  • universal group membership

  • schema integrity

Explanation

Question 34 of 35

1

Which type of system must you connect to and use to make changes to Active Directory?

Select one of the following:

  • RODC

  • forest master

  • writable domain controller

  • domain tree

Explanation

Question 35 of 35

1

What utility must you run on a cloned system to ensure that the clone receives its own SID?

Select one of the following:

  • adprep/renew

  • sysprep

  • dcpromo

  • ntconfig

Explanation