Quiz 7 & 8

Description

Final Test quiz
Michael Marcus
Quiz by Michael Marcus, updated more than 1 year ago
Michael Marcus
Created by Michael Marcus over 8 years ago
105
1

Resource summary

Question 1

Question
where can you view audit events?
Answer
  • in the C:\Temp\Logs folder as text files
  • in System logs in Events Viewer
  • in Security logs in Event Viewer
  • by using audit/logs at the command line

Question 2

Question
Auditing is used for what purpose?
Answer
  • authenticating users
  • authorizing users
  • recording user's actions
  • assessing a user's permissions

Question 3

Question
why would auditing include logon and logoff times?
Answer
  • these are simply default audit types for accounts
  • logon and logoff times can help track user's work hours
  • logon and logoff times can help pinpoint who was logged on during a failure
  • logon and logoff events can track system usage for capacity planning

Question 4

Question
why is it a good idea (other that the effect on system performance) to set up auditing for only those objects that you really need to focus on?
Answer
  • object auditing is complex and requires a lot of time to set up
  • searching through too many events makes finding problems more difficult
  • by enabling objects auditing, you also enable many other events
  • auditing too many events adds an extra layer of complexity to management tasks

Question 5

Question
why is choosing what to audit, instead of auditing everything that a user does, a good idea?
Answer
  • high level of auditing can affect system preformance
  • auditing sets up an air of suspicion for users
  • extensive audit trails often lead to too much troubleshooting
  • auditing requires a high level of expertise to set up and maintain

Question 6

Question
which utility do you use to access advance audit policy settings?
Answer
  • Local Policy Editor
  • Group Policy Editor
  • Domain Policy Editor
  • Schema Policy Editor

Question 7

Question
what is one of the primary advantages to using Active Directory to store DNS information?
Answer
  • fault tolerance
  • zero configuration
  • low maintenance
  • reverse zone lookups

Question 8

Question
which type of DNS zone resolves host names to IP addresses?
Answer
  • forward lookup zone
  • reverse lookup zone
  • backward lookup zone
  • null lookup zone

Question 9

Question
when resetting audit settings back to basic mode, what file must you remove as part of the process?
Answer
  • policies.txt
  • audit.txt
  • policies.csv
  • audit.csv

Question 10

Question
which TCP/UDP port does the DNS service use to communicate?
Answer
  • 25
  • 53
  • 80
  • 443

Question 11

Question
what is the first and most important step in installing and deploying DNS in your network?
Answer
  • setting up Active Directory so that DNS can be integrated into it
  • planning the infrastructure and service requirements
  • configuring the forward and reverse lookup zones correctly
  • splitting the network into subdomains

Question 12

Question
which one of the following is an example of an FQDN?
Answer
  • SERVER1
  • 192.168.1.50
  • sales.microsoft.com
  • C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS

Question 13

Question
what is the primary advantage of a caching-only DNS server?
Answer
  • it requires no maintenance
  • it provides DNS to a select few DNS clients
  • is speeds DNS queries by building a DNS request cache
  • it increases network traffic only on external networks

Question 14

Question
authorization is used for what purpose?
Answer
  • to grant access to a user
  • to verify a user's identity
  • to determine security restrictions
  • to calculate effective permissions

Question 15

Question
why are success audits as important as failure audits?
Answer
  • successes are important to troubleshooting for establishing baselines of normal behavior
  • successes are included by default and can be filtered out
  • successes can point to security breaches as well as normal behavior
  • successes allow you to track activity such as new account creation

Question 16

Question
authentication is used for what purpose?
Answer
  • to grant access to a user
  • to verify a user's identity
  • to determine security restrictions
  • to calculate effective permissions

Question 17

Question
why would you implement a caching-only DNS server on your network?
Answer
  • to speed DNS queries and decrease network traffic
  • to avoid installing and configuring a full-blown DNS server
  • to reduce the amount of maintenance for administrator
  • to reduce complexity in a network environment

Question 18

Question
what is the primary advantage of a caching-only DNS server?
Answer
  • it requires no maintenance
  • it provides DNS to a select few DNS clients
  • it speeds DNS queries by building a DNS request cache
  • it increases network traffic only on external networks

Question 19

Question
by using the Active Directory-integrated zone, DNS follows what kind of model?
Answer
  • master-slave
  • multi-master
  • primary-secondary
  • forward-reverse

Question 20

Question
what type of structure does DNS have?
Answer
  • hierarchical distributed
  • flat distributed
  • top-down distributed
  • wheel-spoke distributed

Question 21

Question
A specific, individual computer or other network device in a domain is known as what?
Answer
  • server
  • entity
  • top-level system
  • host

Question 22

Question
the Domain Name System (DNS) works much like a phone book to associate URLs (names) with what kinds of numbers?
Answer
  • ID numbers
  • World Wide Web number
  • domain addresses
  • IP addresses

Question 23

Question
which of the following is an example of a second-level domain?
Answer
  • blah.com
  • .net
  • server1
  • corporate.local

Question 24

Question
which of the following is an example of a top-level domain?
Answer
  • .local
  • .net
  • .business
  • microsoft.com

Question 25

Question
which auditing feature allows you to define computer-wide system access control lists for the file system or the registry?
Answer
  • Global Object Access Auditing
  • Filereg Auditing
  • Registry Trail Auditing
  • System Tracker Auditing snap-in

Question 26

Question
What type of audit event notifies you that an account failed to log on?
Answer
  • DS access
  • object access
  • privilege use
  • logon/logoff

Question 27

Question
Why should you avoid using basic audit policy settings and advanced audit policy settings together?
Answer
  • that amount of auditing will fill out event logs too quickly
  • the two audit setting ranges have too much redundancy or overlap between them
  • setting too many policies can put your system in an 'out of compliance" state
  • Audit policies might cause conflicts or erratic behavior.

Question 28

Question
By using what type of policy can you track, limit, or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012 R2?
Answer
  • USB Storage Access
  • Removable Storage Access
  • Removable Device Access
  • Storage Device Audit

Question 29

Question
Which command do you use to manage auditing at the command prompt?
Answer
  • Audit.exe
  • AdPolicy.exe
  • Auditpol.exe
  • Policy.exe

Question 30

Question
Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of how many audit subsettings?
Answer
  • 23
  • 53
  • 56
  • 64

Question 31

Question
What does the acronym FQDN stand for?
Answer
  • File Quota Domain Number
  • Fully Qualified Domain Number
  • Fully Qualified Domain Name
  • Full Query Domain Name

Question 32

Question
A stub zone is a zone copy that contains only what type of records?
Answer
  • host entries
  • subdomain entries
  • necessary resource entries
  • query record entries
Show full summary Hide full summary

Similar

Quiz 21-22
Michael Marcus
Quiz 19-20
Michael Marcus
Quiz 5 & 6
Michael Marcus
Quiz 3&4
Michael Marcus
Quiz 11 & 12
Michael Marcus
Quiz 17 & 18
Michael Marcus
Quiz 13 & 14
Michael Marcus
Quiz 15 & 16
Michael Marcus
Quiz 1&2
Michael Marcus
Quiz 9&10
Michael Marcus
70-411 - MCSA: Administering Windows Server 2012 - Exam 4
Mike M