1. What does a directory server provide?
Answers
·
A real-time communication service.
·
A replication service.
·
A lookup service for an
organization.
· A network time service.
2. What benefits does
replication provide? Check all that apply.
Answers
·
Redundancy
·
Decreased latency
·
Virtualization
· Enhanced security
3. What is the most
popular directory services protocol used today?
Answers
·
Lightweight Directory
Access Protocol
·
Directory System Protocol
·
Directory Operational Binding
Management Protocol
· Directory Access Protocol
Explanation: According to the most recent information that I have gathered, which was in January 2022, the Lightweight Directory Access Protocol (LDAP) is now one of the most widely used directory services protocols. Accessing and maintaining directory information services using LDAP has gained widespread use. It offers a standardized means of gaining access to directory services via an Internet Protocol (IP) network as well as maintaining such services.
4. Active Directory is
the LDPA implementation for ________________.
Answers
·
MAC
·
Linux
·
Microsoft
· Ubuntu
Explanation: Microsoft Windows installations often make use of Active Directory as their LDAP implementation. It provides centralized authentication and authorization services for Windows domain networks, serving as the directory service for such networks. Active Directory makes use of a protocol known as LDAP, which stands for Lightweight Directory Access Protocol, in order to access and manage directory information. Within a Windows environment, the organization and administration of people, workstations, and other network resources may be achieved via the use of this integration.
5. The containers in a
Directory Service are referred to as _____________.
Answers
·
user accounts
·
organized structure
·
organizational units (OUs)
·
subfolders
Explanation: "Organizational Units" (abbreviated to OUs) are the names given to the containers that make up a Directory Service. Within a directory service like Microsoft Active Directory, OUs are used to assist in the organization and categorization of items such as users, computers, and many other resources. The use of organizational units (OUs) offers a method for structuring and managing the directory hierarchy. This makes it possible for administrators to apply rules, rights, and settings to certain groupings of objects. This organizational structure contributes to the effective management and protection of the resources that are included inside a network.
6. Which of these are
examples of centralized management? Check all that apply.
Answers
·
Role-based access control
·
Centralized configuration
management
·
Copying configurations to various
systems
· Local authentication
7. Which of these are
components of an LDAP entry? Check all that apply.
Answers
·
Uncommon Name
·
Common Name
·
Organizational User
· Distinguished Name
8. What's does the LDAP
Bind operation do exactly?
Answers
·
Modifies entries in a directory server
·
Looks up information in a directory
server
·
Authenticates a client to
the directory server
· Changes the password for a user account on the directory server
Explanation: When it comes to protecting access to directory information, the LDAP Bind action is very necessary. It guarantees that only clients who have been authenticated and given permission to communicate with the directory server may do so. The authentication procedure may make use of a number of different techniques, such as a straightforward authentication based on a password or other, more secure ways like SASL (Simple Authentication and Security Layer).
9. Which of the
following are authentication types supported by the LDAP Bind operation? Check
all that apply.
Answers
·
Anonymous
·
Simple
·
Complex
· SASL
10. Which of these are
examples of centralized management? Check all that apply.
Answers
·
Centralized configuration
management
·
Role-based access control
·
Copying configurations to various
systems
· Local authentication
11. Which of these are
components of an LDAP entry? Check all that apply.
Answers
·
Distinguished Name
·
Kerberos
·
Common Name
· Uncommon Name
12. What does the LDAP
Bind operation do exactly?
Answers
·
Changes the password for a user
account on the directory server
·
Modifies entries in a directory server
·
Authenticates a client to
the directory server
· Looks up information in a directory server
Explanation: When it comes to protecting access to directory information, the LDAP Bind action is very necessary. It makes ensuring that the LDAP directory server may only be interacted with by clients who have been authenticated and given permission to do so. The authentication procedure may be as simple as entering a username and password, or it might include more complex processes such as Simple Authentication and Security Layer, abbreviated as SASL.
13. Which of the
following are authentication types supported by the LDAP Bind operation? Check
all that apply.
Answers
·
Simple
·
Anonymous
·
Complex
·
SASL
14. Which of the
following are services provided for the Directory Services?
Answers
·
Accounting
·
Local authentication
·
Centralized Authentication
· Authorization
15. What is the
difference between a policy and a preference?
Answers
·
They are the exact same thing.
·
A policy is used to set a preference.
·
A policy can be modified by a local
user, while a preference is enforced by AD.
· A policy is enforced by AD, while a preference can be modified by a local user.
Explanation: A preference is a user's or system's particular option or setting that enables customization within specific constraints, while a policy is a collection of rules or guidelines that are authoritative and sometimes needed. To summarize, a policy is a set of rules or guidelines that are authoritative and frequently required. While policies are more concerned with enforcing norms and laws, preferences are more concerned with accommodating individual preferences and improving the user experience.
16. Select the right
order of enforcement of GPOs:
Answers
·
Site –> Domain –> OU
·
OU –> Domain –> Sit
·
Domain –> Site –> OU
· Site –> OU –> Domain
17. What can be used to
determine what policies will be applied to a given machine?
Answers
·
An RSOP report
·
A control panel
·
gpupdate
· A test domain
18. Which of the
following could prevent logging into a domain-joined computer? Check all that
apply.
Answers
·
Unable to reach the domain
controller
·
The are time and date are
incorrect
·
The user account is locked
· Your computer is connected to Wifi
19. How does a client
discover the address of a domain controller?
Answers
·
It sends a broadcast to the local
network
·
It is provided via DHCP
·
It is pushed via an AD GPO
· It makes a DNS query, asking for the SRV record for the domain
20. Directory services store
information in a hierarchical structure. Which statements about Organizational
Units (OUs) of a directory service hierarchy are true? (Choose all that apply)
Answers
·
Sub-member OUs inherit the characteristics of
their parent OU.
·
Specific files within an OU, or container, are
called “objects”.
·
Changes can be made to one sub-OU without
affecting other sub-OUs within the same parent.
· Parent OUs inherit characteristics of their sub-members.
21.
Which directory service software would be used exclusively on a Windows
network?
Answers
·
DISP
·
DSP
·
Active Directory
· OpenLDAP
Explanation: Microsoft Active Directory is the
directory service software that is used most often for a Windows-based network.
Microsoft's Active Directory (AD) is a directory service and identity
management system that the company developed in-house. It offers a single
repository for managing and organizing information about network resources, and
it is especially built to function in Windows systems.
22. What roles does a directory
server play in centralized management? (Choose all that apply)
Answers
·
Centralized
authentication
·
Confidentiality
·
Authorization
·
Accounting
Answers
·
Domain
name
·
Distinguished name
·
Distinguished
number
·
Distinct
name
Answers
·
Remove
·
Modify
·
Bind
·
Add
Answers
·
A DNS server
·
A Kerberos authentication server
·
A server that holds a replica of the Active
Directory database
·
A
container
Answers
·
Changes
that are safe to be made by multiple Domain Controllers at once are tasked by
granting them Flexible Single-Master Operations.
·
The default Organizational Unit (OU), called
Domain Controllers, contains all Domain Controllers in the domain.
·
Delegation can be used in Active Directory.
·
Always
use the Domain Admin or Enterprise Admin for day-to-day use.
Answers
·
Ask
Juan questions to help him remember his password.
·
Check
the “User must change password at next logon” box so a new password must be
created at the next logon.
·
Issue a temporary password.
·
Make sure the password reset is authorized by verifying that Juan
is who he says he is.
Answers
·
Preferences
are reapplied every 90 minutes, and policies are more of a settings template.
·
A
policy is editable only by admins, but anyone can edit a group policy
preference.
·
Policies are reapplied every 90 minutes, and
preferences are a settings template that the user can change on the computer.
·
A
preference is editable only by admins, but anyone can edit a policy.
Answers
·
AAAA
record
·
TXT
record
·
SRV record
·
A
record
Answers
·
centralized
authentication
·
centralized management
·
active
directory
· LDAP
Explanation: Rather than granting
permissions or access rights to individual users, group-based access control
entails the creation of groups and the assignment of those permissions or
rights to the group. After that, users are added to suitable groups according
to their positions, responsibilities, or the projects they are affiliated with.
This method both simplifies administration and guarantees consistency, which
makes it much simpler to control access for a large number of users. Instead of
making changes to each individual user account, it is possible to make
modifications at the group level, which will have an effect on all members of
the group, in the event that access restrictions change. This is especially
helpful in bigger workplaces, where it would be impossible to manage individual
access for each person.
Answers
·
All
Users
·
Domain
Users
·
Resource
Users
· Enterprise Admins
Explanation: If a system administrator has to
provide access to a resource for all of the users in a domain, they may utilize
the "Domain Users" group in Active Directory to accomplish this task.
Every user account that has ever been created in the domain is included in the
"Domain Users" group, which is a pre-existing group. The
administrator may guarantee that all users in the domain have access to a
particular resource by either including the "Domain Users" group in
the access control list (ACL) of that resource or by giving rights to the
"Domain Users" group.
32. Which of these statements are
true about managing through Active Directory? (Choose all that apply)
Answers
·
Domain Local, Global, and Universal are
examples of group scopes.
·
Distribution
groups can be used to assign permission to resources.
·
The
default group’s Domain Users and Domain Admins are security groups.
·
ADAC uses PowerShell.
33.
Which of the following are common reasons a group policy doesn't take effect
correctly? (Choose all that apply)
Answers
·
Kerberos may have issues with the UTC time on
the clock.
·
Fast Logon Optimization may delay GPO changes
from taking effect.
·
Replication failure may occur.
·
The
GPO may be linked to the OU that contains the computer.
34.
Which of the following is not an advantage of replication of data in terms of
directory services?
Answers
·
It allows local management of user accounts.
·
It
decreases latency when accessing the directory service.
·
It
allows flexibility, allowing for easy creation of new object types as needs
change.
·
It
provides redundancy for data.
35.
A Lightweight Directory Access Protocol (LDAP) entry reads as follows: dn:
CN=John Smith ,OU=Sysadmin,DC=jsmith,DC=com. \n. What is the organizational
unit of this entry?
Answers
·
CN=John
Smith ,OU=Sysadmin,DC=jsmith,DC=com
·
Sysadmin
·
John
Smith
· Jsmith
36.
A particular computer on your network is a member of several GPOs. GPO-A has
precedence set to 1. GPO-B has precedence set to 2, and GPO-C has precedence
set to 3. According to the given levels of precedence, what will be the
resultant set of policy (RSOP) for this machine?
Answers
·
GPO-A
will take precedence and overwrite any conflicting settings.
·
The
computer will default to local policy due to the confusion.
·
GPO-B
will take precedence and overwrite any conflicting settings.
· GPO-C will take precedence and overwrite any conflicting settings.
Explanation: The combination of these GPOs will produce the final set of policy (RSOP) for the system. This will be done by taking into consideration the settings of each GPO, as well as any user or computer specifications, and the order of precedence.
Due to the
fact that it has the lowest precedence (1), GPO-A will be given preference over
both GPO-B and GPO-C in this scenario. As a result, the settings that were
applied by GPO-A will be reflected in the RSOP for the machine, followed by the
settings that were applied by GPO-B and GPO-C.
Answers
·
Edit
the Windows Registry to change group policy settings
·
Manually
edit config files in SYSVOL
·
Open
ADAC and edit policy settings there
·
Open the Group Policy Management Console by running gpmc.msc from
the CLI
Answers
·
By a hierarchical model of objects and
containers
·
By
a flat text file
·
By
a relational database structure
·
By
a series of nested groups
Answers
·
Configuration
can take place on each device.
·
Configuration
management is centralized.
·
Access
and authorization are managed in one place.
·
Role-Based Access Control (RBAC) can organize user groups
centrally.
40. To authenticate user accounts on
a computer against AD, what must be done to the computer first?
Answers
·
Enable
the administrator account
·
Configure
remote logging
·
Join
it to the domain
·
Configure
the firewall
Answers
·
ADUC
·
OpenLDAP
·
Microsoft’s
Active Directory
·
RDP
Shuffle Q/A 2
Answers
·
Simple
bind
·
Anonymous
bind
·
SASL
·
PGP
Answers
·
AD
includes a tool called the Active Directory Authentication Center, or ADAC.
·
AD
can “speak” LDAP.
·
AD
is used as a central repository of group policy objects, or GPOs.
· AD is incompatible with Linux, OS X, and other non-Windows hosts.
44. Which directory
standard was approved in 1988 and includes protocols like the Directory Access
Protocol?
Answers
·
LDAP
·
Active Directory
·
DISP
·
X.500
Explanation: X.500 is the standard for directories that was established in 1988 and contains protocols such as the Directory Access Protocol. The Directory Access Protocol (DAP), which is used for accessing directory information, is one of the protocols that are defined in the X.500 standard, which also contains other models and protocols for directory services. The X.500 standard includes a framework that allows for the hierarchical and decentralized organization of directory information as well as its access. It is the basis for the Lightweight Directory Access Protocol (LDAP), which is a protocol for directory services that is more lightweight and is used by a large number of organizations.
45. By default, Active
Directory adds new computers to what group?
Answers
·
New Computers
·
Domain Computers
·
Added Computers
· All Computers
Explanation: By default, when a new computer is added
to the Active Directory domain, it is automatically placed in the "Domain
Computers" group. The "Domain Computers" group is a built-in
group in Active Directory that includes all computer accounts in the domain.
Members of this group have certain default permissions and rights within the
domain, allowing them to access resources and perform basic operations.
This default placement in the "Domain Computers" group ensures that the new computer has the
necessary permissions and access rights to interact with other domain resources. Administrators can further customize permissions and group memberships based on the specific needs of the organization.