• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/119

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

119 Cards in this Set

  • Front
  • Back
Enables users to log on to any computer that is a domain member in an AD forest.
Domain User Account
Provides single sign on access to domain resources in the forest and other trusted entities to which the account has permissions.
Domain User Account
What is managed by Group Policies and are subject to account policies linked to the domain?
Domain User Accounts
Having full access to all aspects of a computer.
Local Administrator Account
Has full access to all aspects of a domain.
Domain Administrator Account
These should be renamed and given a very strong password due to the fact they are created on every computer and domain.
Administrator Accounts
Should only be used to log to a computer or domain when performing administrative operations.
Administrator Accounts
Network Administrators should use a _____ user account for logging on to perform non-administrative tasks.
regular
The Administrator account can be _____ or disabled, but not deleted.
renamed
The Administrator account can be renamed or _____, but not deleted.
disabled
The Administrator account can be renamed or disabled, but not _____.
deleted
Must be unique throughout the domain is a characteristic of what?
User Account Object Name
Are not case sensitive is a characteristic of what?
User Account Object Name
Must be between 1-20 characters in length is characteristic of what?
User Account Object Name
", [,],:,;,<,>,?,*,+,@,|,^,=, and ,
Special characters that can NOT be used in Account names.
"
Special character that can NOT be used in Account names.
[
Special character that can NOT be used in Account names.
]
Special character that can NOT be used in Account names.
:
Special character that can NOT be used in Account names.
;
Special character that can NOT be used in Account names.
<
Special character that can NOT be used in Account names.
>
Special character that can NOT be used in Account names.
?
Special character that can NOT be used in Account names.
*
Special character that can NOT be used in Account names.
+
Special character that can NOT be used in Account names.
@
Special character that can NOT be used in Account names.
|
Special character that can NOT be used in Account names.
^
Special character that can NOT be used in Account names.
=
Special character that can NOT be used in Account names.
,
Special character that can NOT be used in Account names.
Freebie, when dealing with the "special characters" question, look for the username with the _____.
@
When using DSADD, you can get away with with specifying the user _____ name and password.
logon
When using DSADD, you can get away with with specifying the user logon name and _____.
password
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as UPN, User Logon Name (pre-Windows 2000), and _____ and Confirm _____.
Password
When you use Active Directory Users and Computers, you must enter a value for the following attributes: _____ Name, User Logon Name other wise known as UPN, User Logon Name (pre-Windows 2000), and Password and Confirm Password.
Full
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as _____, User Logon Name (pre-Windows 2000), and Password and Confirm Password.
User Principal Name (UPN)
When you use Active Directory Users and Computers, you must enter a value for the following attributes: Full Name, User Logon Name other wise known as UPN, User Logon Name (_____), and Password and Confirm Password.
pre-Windows 2000
Characteristics of a user template include being a _____ object as well as not being a special thing.
user
Characteristics of a user template include being a user object as well as _____ being a special thing.
not
How do you rename a user account?
Right click or use Action Menu
An AD object that usually represents a person for information purposes only, much like an address book entry.
Contact
Most commonly used for integration into Exchange's Address Book.
Contact
A collection of a users personal files and settings that define his or her working environment.
User Profile
Included in the user profile are _____, Desktop, Documents, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
AppData
Included in the user profile are AppData, _____, Documents, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
Desktop
Included in the user profile are AppData, Desktop, _____, Downloads, Favorites, Music, Pictures, and Ntuser.dat.
Documents
Included in the user profile are AppData, Desktop, Documents, _____, Favorites, Music, Pictures, and Ntuser.dat.
Downloads
Included in the user profile are AppData, Desktop, Documents, Downloads, _____, Music, Pictures, and Ntuser.dat.
Favorites
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, _____, Pictures, and Ntuser.dat.
Music
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, Music, _____, and Ntuser.dat.
Pictures
Included in the user profile are AppData, Desktop, Documents, Downloads, Favorites, Music, Pictures, and _____.___.
Ntuser.dat
Stored on the same system where the user logs on.
Local Profile
Follows user no matter where they log in.
Roaming Profile
A user profile that can be changed during a users logon session, but the reverts to to original state.
Mandatory Profile
A user profile type that prevents a user from logging onto the domain when the mandatory profile is unavailable. (if not available, can not log in)
Super Mandatory Profile
On the matching questions for differences between profile types, _____ profile possibly the left out.
roaming profile.
The main AD object administrators use to manage network resource access and grant rights to users.
Security Group
Used when you want to group users together, mainly for sending emails to several people at once with an AD interpreted email application such as Exchange.
Distribution Group
The main security principal recommended for assigning rights and permissions to domain resources.
Domain local Group
Used mainly to group users from the same domain when they have similar access and rights requirements.
Global Group
Can contain users from any domain in the forest and be assigned permission to resources in any domain in the forest.
Universal Group
The three three group scopes are _____ _____, Global, and Universal.
Domain Local
The three three group scopes are Domain Local, _____, and Universal.
Global
The three three group scopes are Domain Local, Global, and _____.
Universal
Resources on any DC or member computer in the domain; domain local groups in the Builtin folder can be added to DACLs only on the DCs, not on member computers.
Domain Local Group
Resources on any DC or member computer in any domain in the forest or trusted domains in another forest.
Both Global and Universal Groups
Located in the BuiltIn folder are: _____, Guests, and Users.
Administrators
Located in the BuiltIn folder are: Administrators, _____, and Users.
Guests
Located in the BuiltIn folder are: Administrators, Guests, and _____.
Users
Located in the Users folder are: _____ and Enterprise Administrators.
Domain
Located in the Users folder are: Domain and _____ Administrators.
Enterprise
Located in the Special Identity Group are: _____/_____, Everyone, and Authenticated Users.
Creator/Owner
Located in the Special Identity Group are: Creator/Owner, _____, and Authenticated Users.
Everyone
Located in the Special Identity Group are: Creator/Owner, Everyone, and _____ Users.
Authenticated
Adds objects to AD. Used mainly for adding account objects but can be used to create OUs and Contacts.
DSADD
Displays an objects properties onscreen by default, but the output can be redirected to a file.
DSGET
Modifies existing AD objects.
DSMOD
Moves objects in a domain to another folder or OU or renames the object.
DSMOVE
Finds and displays objects in AD that meet specified criteria. The output can be displayed on screen or sent (piped) to other commands.
DSQUERY
Removes, or deletes objects from AD.
DSRM
The two tools that can be used to bulk import or export AD objects are _____ and LDIFDE.
Comma Seperated Value Data Exchange (CSVDE)
The two tools that can be used to bulk import or export AD objects are CSVDE and _____.
Lightweight Data Interchange Format Data Exchange (LDIFDE)
MAX. Parition size/create = 32 GB
FAT32
MAX. Partition size/read = 2 TB
FAT32
MAX. File Size = 4GB
FAT32
Max file size for FAT32 is 32GB. True or False?
False
Enable quota management is an option possible when setting what on an NTFS volume?
Disk quotas
Deny disk space to users exceeding quota limit is an option possible when setting what on an NTFS volume?
Disk quotas
Don not limit disk usage is an option possible when setting what on an NTFS volume?
Disk quotas
Limit disk space to is an option possible when setting what on an NTFS volume?
Disk quotas
Log event when a user exceeds their warning level is an option possible when setting what on an NTFS volume?
Disk quotas
Quota Entries is an option possible when setting what on an NTFS volume?
Disk quotas
A feature that enables users to access a volume as a folder in another volume instead of by using a drive letter.
Volume mount point
The options for shadow copies on an NTFS volume are: _____ on this volume, Details, Maximum size, and Schedule.
Located
The options for shadow copies on an NTFS volume are: Located on this volume, _____, Maximum size, and Schedule.
Details
The options for shadow copies on an NTFS volume are: Located on this volume, Details, _____ size, and Schedule.
Maximum
The options for shadow copies on an NTFS volume are: Located on this volume, Details, Maximum size, and _____.
Schedule
Compress entire volume or single items is what type of file attribute?
File Compression
Can only encrypt files and folders is what kind of file attribute?
File Encryption
Applied to shared folders that protect files accessed across the network. The only method for protecting files on FAT volumes.
Share Permissions
Set on folders and files on an NTFS formatted volume. NTFS permissions protect both network and interactive file access.
NTFS Permissions
Read, Change, and Full control are what type of permissions?
Shared Permissions
There are 5 standard NTFS permissions that folders and files share: _____, Read & Execute, Write, Modify, Full Control.
Read
There are 5 standard NTFS permissions that folders and files share: Read, _____&_____, Write, Modify, Full Control.
Read & Execute
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, _____, Modify, Full Control.
Write
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, Write, _____, Full Control.
Modify
There are 5 standard NTFS permissions that folders and files share: Read, Read & Execute, Write, Modify, _____Control.
Full
What is the 6th NTFS permission that Folders do NOT share with files?
List Folder Contents
What service must be running to allow file sharing?
File Services Role
Admin$ is what?
Administrative Share
Drive$ is what?
Administrative Share
IPC$ is what?
Administrative Share
NETLOGON is what?
Domain Controller Share
Sysvol is what?
Domain Controller Share
What are the naming conventions for shares that allows them to be hidden?
$ at end (IE. C$)
The four methods of accessing file shared from a client computer are: _____ Path, AD Search, Map drive letter, and Browsing the Network.
UNC
The four methods of accessing file shared from a client computer are: UNC Path, _____ Search, Map drive letter, and Browsing the Network.
AD
The four methods of accessing file shared from a client computer are: UNC Path, AD Search, _____ drive letter, and Browsing the Network.
Map
The four methods of accessing file shared from a client computer are: UNC Path, AD Search, Map drive letter, and Browsing the _____.
Network