CNIT 242 Exam |267 Questions with
Correct Answers
Pruning and Grafting - -objects can be easily moved from one location to
aother
- Schema - -Defines the attribute types a directory can contain, along with
the structure (like a template)
Housed on domain controllers
- Leaf Objects - -Any object that cannot contain another object in the
directory (an object that has no child objects)
Can inherit attributes from its parent containers
Ex. person, computer, printer
- Directory - -A directory is a centralized, hierarchical information repository
about objects in an IT system
- Directory Functions - -provides centralized authentication
enables a general "phone book" about network users
provides for granularity of administration
- T/F:
Active Directory uses LDAP to do Authentication and Authorization. - -F
- T/F
X.500is the original basis for Kerberos.? - -F
- T/F
Context refers to a container that can be nested to create a hierarch in a
directory. - -F
- T/F
Naming in Active Directory follows the LDAP standard. - -T
,- T/F
In an enterprise environment, it is best to assign permissions to individual
users. - -F
- T/F
Access Control Lists provide one method of authentication. - -F
- T/F
Active Directory uses LDAP to do Authentication and Authorization. - -F
- T/F
A directory can be used to provide centralized user authentications. - -T
- T/F
Authentication is the process of determining what users should be able to do.
- -F
- T/F
Leaf objects can inherit attributes from it's parent containers. - -T
- T/F
The two basic parts of authentication are usernames and passwords. - -F
- T/F
Naming in Active Diectory follows the LDAP standard - -T
- T/F
Trust relationship among domain trees needs to be established explicitly or
implicitly to build a domain forest. - -T
- T/F
If a DDNS server is not available during the AD install, the installation will
finish but asks you to install one later. - -F
- T/F
To maximize performance, AD groups should be created as "Universal". - -F
- T/F
, Authoritative DNS server will be contacted only when the configured DNS
server does not have the record in its database/cache. - -T
- T/F
An advantage of Roaming User Profiles is that users can access their files
even if they aren't connected to the network. - -F
- T/F
It's recommended to link each Group Policy at a user level. - -F
- T/F
Group Policy is applied in the following order: local, site, domain, OU. - -T
- T/F
If parent GPO settings conflict with child GPO settings, the child settings win.
- -T
- T/F
An administratively enforced GPO cannot be blocked or overruled by a child's
settings. - -T
- T/F
A NAS is used for block stargage and a SAN is used for file level storage - -F
- T/F
NAS can be implemented using either fiber channel or iSCSI - -T
- T/F
iSCSI must used TCP port 3260 - -T
- T/F
An iSCI qualified name takes the form of iqn.yyyy.mm:optional_unique_ID - -
T
- T/F
Raid 0 (Striping) is used for fault tolerance - -F
- T/F
Authorization and Authentication are required between an iSCSI initiator and
target - -F
- T/F
A block device must be formatted and partitioned before use - -T
- T/F
A formatted partition is considered a logical partition - -T
Correct Answers
Pruning and Grafting - -objects can be easily moved from one location to
aother
- Schema - -Defines the attribute types a directory can contain, along with
the structure (like a template)
Housed on domain controllers
- Leaf Objects - -Any object that cannot contain another object in the
directory (an object that has no child objects)
Can inherit attributes from its parent containers
Ex. person, computer, printer
- Directory - -A directory is a centralized, hierarchical information repository
about objects in an IT system
- Directory Functions - -provides centralized authentication
enables a general "phone book" about network users
provides for granularity of administration
- T/F:
Active Directory uses LDAP to do Authentication and Authorization. - -F
- T/F
X.500is the original basis for Kerberos.? - -F
- T/F
Context refers to a container that can be nested to create a hierarch in a
directory. - -F
- T/F
Naming in Active Directory follows the LDAP standard. - -T
,- T/F
In an enterprise environment, it is best to assign permissions to individual
users. - -F
- T/F
Access Control Lists provide one method of authentication. - -F
- T/F
Active Directory uses LDAP to do Authentication and Authorization. - -F
- T/F
A directory can be used to provide centralized user authentications. - -T
- T/F
Authentication is the process of determining what users should be able to do.
- -F
- T/F
Leaf objects can inherit attributes from it's parent containers. - -T
- T/F
The two basic parts of authentication are usernames and passwords. - -F
- T/F
Naming in Active Diectory follows the LDAP standard - -T
- T/F
Trust relationship among domain trees needs to be established explicitly or
implicitly to build a domain forest. - -T
- T/F
If a DDNS server is not available during the AD install, the installation will
finish but asks you to install one later. - -F
- T/F
To maximize performance, AD groups should be created as "Universal". - -F
- T/F
, Authoritative DNS server will be contacted only when the configured DNS
server does not have the record in its database/cache. - -T
- T/F
An advantage of Roaming User Profiles is that users can access their files
even if they aren't connected to the network. - -F
- T/F
It's recommended to link each Group Policy at a user level. - -F
- T/F
Group Policy is applied in the following order: local, site, domain, OU. - -T
- T/F
If parent GPO settings conflict with child GPO settings, the child settings win.
- -T
- T/F
An administratively enforced GPO cannot be blocked or overruled by a child's
settings. - -T
- T/F
A NAS is used for block stargage and a SAN is used for file level storage - -F
- T/F
NAS can be implemented using either fiber channel or iSCSI - -T
- T/F
iSCSI must used TCP port 3260 - -T
- T/F
An iSCI qualified name takes the form of iqn.yyyy.mm:optional_unique_ID - -
T
- T/F
Raid 0 (Striping) is used for fault tolerance - -F
- T/F
Authorization and Authentication are required between an iSCSI initiator and
target - -F
- T/F
A block device must be formatted and partitioned before use - -T
- T/F
A formatted partition is considered a logical partition - -T