Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
119 Cards in this Set
- Front
- Back
Enables users to log on to any computer that is a domain member in an AD forest.
|
Domain User Account
|
|
Provides single sign on access to domain resources in the forest and other trusted entities to which the account has permissions.
|
Domain User Account
|
|
What is managed by Group Policies and are subject to account policies linked to the domain?
|
Domain User Accounts
|
|
Having full access to all aspects of a computer.
|
Local Administrator Account
|
|
Has full access to all aspects of a domain.
|
Domain Administrator Account
|
|
These should be renamed and given a very strong password due to the fact they are created on every computer and domain.
|
Administrator Accounts
|
|
Should only be used to log to a computer or domain when performing administrative operations.
|
Administrator Accounts
|
|
Network Administrators should use a _____ user account for logging on to perform non-administrative tasks.
|
regular
|
|
The Administrator account can be _____ or disabled, but not deleted.
|
renamed
|
|
The Administrator account can be renamed or _____, but not deleted.
|
disabled
|
|
The Administrator account can be renamed or disabled, but not _____.
|
deleted
|
|
Must be unique throughout the domain is a characteristic of what?
|
User Account Object Name
|
|
Are not case sensitive is a characteristic of what?
|
User Account Object Name
|
|
Must be between 1-20 characters in length is characteristic of what?
|
User Account Object Name
|
|
", [,],:,;,<,>,?,*,+,@,|,^,=, and ,
|
Special characters that can NOT be used in Account names.
|
|
"
|
Special character that can NOT be used in Account names.
|
|
[
|
Special character that can NOT be used in Account names.
|
|
]
|
Special character that can NOT be used in Account names.
|
|
:
|
Special character that can NOT be used in Account names.
|
|
;
|
Special character that can NOT be used in Account names.
|
|
<
|
Special character that can NOT be used in Account names.
|
|
>
|
Special character that can NOT be used in Account names.
|
|
?
|
Special character that can NOT be used in Account names.
|
|
*
|
Special character that can NOT be used in Account names.
|
|
+
|
Special character that can NOT be used in Account names.
|
|
@
|
Special character that can NOT be used in Account names.
|
|
|
|
Special character that can NOT be used in Account names.
|
|
^
|
Special character that can NOT be used in Account names.
|
|
=
|
Special character that can NOT be used in Account names.
|
|
,
|
Special character that can NOT be used in Account names.
|
|
Freebie, when dealing with the "special characters" question, look for the username with the _____.
|
@
|
|
When using DSADD, you can get away with with specifying the user _____ name and password.
|
logon
|
|
When using DSADD, you can get away with with specifying the user logon name and _____.
|
password
|
|
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as UPN, User Logon Name (pre-Windows 2000), and _____ and Confirm _____.
|
Password
|
|
When you use Active Directory Users and Computers, you must enter a value for the following attributes: _____ Name, User Logon Name other wise known as UPN, User Logon Name (pre-Windows 2000), and Password and Confirm Password.
|
Full
|
|
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as _____, User Logon Name (pre-Windows 2000), and Password and Confirm Password.
|
User Principal Name (UPN)
|
|
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as UPN, User Logon Name (_____), and Password and Confirm Password.
|
pre-Windows 2000
|
|
Characteristics of a user template include being a _____ object as well as not being a special thing.
|
user
|
|
Characteristics of a user template include being a user object as well as _____ being a special thing.
|
not
|
|
How do you rename a user account?
|
Right click or use Action Menu
|
|
An AD object that usually represents a person for information purposes only, much like an address book entry.
|
Contact
|
|
Most commonly used for integration into Exchange's Address Book.
|
Contact
|
|
A collection of a users personal files and settings that define his or her working environment.
|
User Profile
|
|
Included in the user profile are _____, Desktop, Documents, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
|
AppData
|
|
Included in the user profile are AppData, _____, Documents, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
|
Desktop
|
|
Included in the user profile are AppData, Desktop, _____, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
|
Documents
|
|
Included in the user profile are AppData, Desktop, Documents, _____, Favorites, Music, Pictures, and Ntuser.dat.
|
Downloads
|
|
Included in the user profile are AppData, Desktop, Documents, Downloads, _____, Music, Pictures, and Ntuser.dat.
|
Favorites
|
|
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, _____, Pictures, and Ntuser.dat.
|
Music
|
|
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, Music, _____, and Ntuser.dat.
|
Pictures
|
|
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, Music, Pictures, and _____.___.
|
Ntuser.dat
|
|
Stored on the same system where the user logs on.
|
Local Profile
|
|
Follows user no matter where they log in.
|
Roaming Profile
|
|
A user profile that can be changed during a users logon session, but the reverts to to original state.
|
Mandatory Profile
|
|
A user profile type that prevents a user from logging onto the domain when the mandatory profile is unavailable. (if not available, can not log in)
|
Super Mandatory Profile
|
|
On the matching questions for differences between profile types, _____ profile possibly the left out.
|
roaming profile.
|
|
The main AD object administrators use to manage network resource access and grant rights to users.
|
Security Group
|
|
Used when you want to group users together, mainly for sending emails to several people at once with an AD interpreted email application such as Exchange.
|
Distribution Group
|
|
The main security principal recommended for assigning rights and permissions to domain resources.
|
Domain local Group
|
|
Used mainly to group users from the same domain when they have similar access and rights requirements.
|
Global Group
|
|
Can contain users from any domain in the forest and be assigned permission to resources in any domain in the forest.
|
Universal Group
|
|
The three three group scopes are _____ _____, Global, and Universal.
|
Domain Local
|
|
The three three group scopes are Domain Local, _____, and Universal.
|
Global
|
|
The three three group scopes are Domain Local, Global, and _____.
|
Universal
|
|
Resources on any DC or member computer in the domain; domain local groups in the Builtin folder can be added to DACLs only on the DCs, not on member computers.
|
Domain Local Group
|
|
Resources on any DC or member computer in any domain in the forest or trusted domains in another forest.
|
Both Global and Universal Groups
|
|
Located in the BuiltIn folder are: _____, Guests, and Users.
|
Administrators
|
|
Located in the BuiltIn folder are: Administrators, _____, and Users.
|
Guests
|
|
Located in the BuiltIn folder are: Administrators, Guests, and _____.
|
Users
|
|
Located in the Users folder are: _____ and Enterprise Administrators.
|
Domain
|
|
Located in the Users folder are: Domain and _____ Administrators.
|
Enterprise
|
|
Located in the Special Identity Group are: _____/_____, Everyone, and Authenticated Users.
|
Creator/Owner
|
|
Located in the Special Identity Group are: Creator/Owner, _____, and Authenticated Users.
|
Everyone
|
|
Located in the Special Identity Group are: Creator/Owner, Everyone, and _____ Users.
|
Authenticated
|
|
Adds objects to AD. Used mainly for adding account objects but can be used to create OUs and Contacts.
|
DSADD
|
|
Displays an objects properties onscreen by default, but the output can be redirected to a file.
|
DSGET
|
|
Modifies existing AD objects.
|
DSMOD
|
|
Moves objects in a domain to another folder or OU or renames the object.
|
DSMOVE
|
|
Finds and displays objects in AD that meet specified criteria. The output can be displayed on screen or sent (piped) to other commands.
|
DSQUERY
|
|
Removes, or deletes objects from AD.
|
DSRM
|
|
The two tools that can be used to bulk import or export AD objects are _____ and LDIFDE.
|
Comma Seperated Value Data Exchange (CSVDE)
|
|
The two tools that can be used to bulk import or export AD objects are CSVDE and _____.
|
Lightweight Data Interchange Format Data Exchange (LDIFDE)
|
|
MAX. Parition size/create = 32 GB
|
FAT32
|
|
MAX. Partition size/read = 2 TB
|
FAT32
|
|
MAX. File Size = 4GB
|
FAT32
|
|
Max file size for FAT32 is 32GB. True or False?
|
False
|
|
Enable quota management is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
Deny disk space to users exceeding quota limit is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
Don not limit disk usage is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
Limit disk space to is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
Log event when a user exceeds their warning level is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
Quota Entries is an option possible when setting what on an NTFS volume?
|
Disk quotas
|
|
A feature that enables users to access a volume as a folder in another volume instead of by using a drive letter.
|
Volume mount point
|
|
The options for shadow copies on an NTFS volume are: _____ on this volume, Details, Maximum size, and Schedule.
|
Located
|
|
The options for shadow copies on an NTFS volume are: Located on this volume, _____, Maximum size, and Schedule.
|
Details
|
|
The options for shadow copies on an NTFS volume are: Located on this volume, Details, _____ size, and Schedule.
|
Maximum
|
|
The options for shadow copies on an NTFS volume are: Located on this volume, Details, Maximum size, and _____.
|
Schedule
|
|
Compress entire volume or single items is what type of file attribute?
|
File Compression
|
|
Can only encrypt files and folders is what kind of file attribute?
|
File Encryption
|
|
Applied to shared folders that protect files accessed across the network. The only method for protecting files on FAT volumes.
|
Share Permissions
|
|
Set on folders and files on an NTFS formatted volume. NTFS permissions protect both network and interactive file access.
|
NTFS Permissions
|
|
Read, Change, and Full control are what type of permissions?
|
Shared Permissions
|
|
There are 5 standard NTFS permissions that folders and files share: _____, Read & Execute, Write, Modify, Full Control.
|
Read
|
|
There are 5 standard NTFS permissions that folders and files share: Read, _____&_____, Write, Modify, Full Control.
|
Read & Execute
|
|
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, _____, Modify, Full Control.
|
Write
|
|
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, Write, _____, Full Control.
|
Modify
|
|
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, Write, Modify, _____Control.
|
Full
|
|
What is the 6th NTFS permission that Folders do NOT share with files?
|
List Folder Contents
|
|
What service must be running to allow file sharing?
|
File Services Role
|
|
Admin$ is what?
|
Administrative Share
|
|
Drive$ is what?
|
Administrative Share
|
|
IPC$ is what?
|
Administrative Share
|
|
NETLOGON is what?
|
Domain Controller Share
|
|
Sysvol is what?
|
Domain Controller Share
|
|
What are the naming conventions for shares that allows them to be hidden?
|
$ at end (IE. C$)
|
|
The four methods of accessing file shared from a client computer are: _____ Path, AD Search, Map drive letter, and Browsing the Network.
|
UNC
|
|
The four methods of accessing file shared from a client computer are: UNC Path, _____ Search, Map drive letter, and Browsing the Network.
|
AD
|
|
The four methods of accessing file shared from a client computer are: UNC Path, AD Search, _____ drive letter, and Browsing the Network.
|
Map
|
|
The four methods of accessing file shared from a client computer are: UNC Path, AD Search, Map drive letter, and Browsing the _____.
|
Network
|