FOR MORE OF THIS COURSE AND ANY OTHER COURSES, TEST BANKS, FINAL EXAMS, AND SOLUTION MANUALS
CONTACT US
AT WHISPERHILLS@GMAIL.COM
Chapter 1: The Assessment Stage
TRUE/FALSE
1. The logical components in AD are: domains,
domain trees, forests and organizational units.
2. To ensure that each domain controller has an
identical copy of the directory database, Active Directory information is
replicated to every DC within a domain.
3. Although domains can be interconnected into
trees, trees cannot be interconnected into forests.
4. By default, the administrative tools for
Active Directory encrypt LDAP traffic using signing to ensure that packets have
not been tampered with.
5. It is not a good idea to include a DNS server
on each subnet.
MODIFIED TRUE/FALSE
1. Every Active Directory structure has a(n) forest,
even if it consists of only a single domain. ____________________________
2. A company with national geographic
scope has its facilities within a city, or areas surrounding that city.
_________________________
3. Trust relationships in legacy NT domains are one-way.
_________________________
4. The domain naming master is in charge
of updating changes that are made to group memberships.
_________________________
5. DNS is a hierarchical, distributed
database that allows users to find a particular resource by entering a
user-friendly domain name such as www.course.com, and then it looks up the IP
address for that domain. _________________________
MULTIPLE CHOICE
1. _____ are used to manage domains and are used
to modify the directory, allowing network administrators to make changes to
user and computer accounts, domain structure, site topology, and control
access.
a.
|
Active directories
|
c.
|
SLAs
|
b.
|
Domain controllers
|
d.
|
Schema masters
|
2. _____ uses the Lightweight Directory Access
Protocol for communications between clients and directory servers.
a.
|
X.500
|
c.
|
Active Directory
|
b.
|
DNS
|
d.
|
Zone transfers
|
3. _____ is an established standard that defines
directory services. It was developed by the International Telecommunication
Union and published by the International Organization for Standardization.
a.
|
X.500
|
c.
|
X.200
|
b.
|
Zone transfer
|
d.
|
Operations masters
|
4. In a(n) _____ domain model, the resource
domains are trusting while the master domain is trusted.
a.
|
complete trust
|
c.
|
operations
|
b.
|
single
|
d.
|
master
|
5. _____ are domain controllers that provide
special services to the network by keeping a master copy of certain data in
Active Directory and copying data to other domain controllers for backup
purposes.
a.
|
X.500s
|
c.
|
DNSs
|
b.
|
Operations masters
|
d.
|
Zone transfers
|
6. The _____ is a domain controller that is in
charge of all changes to the Active Directory schema.
a.
|
zone transfers
|
c.
|
stub zone
|
b.
|
BIND
|
d.
|
schema master
|
7. The _____ is a domain controller that is in
charge of adding new domains and removing unneeded ones from the forest.
a.
|
schema master
|
c.
|
domain naming master
|
b.
|
BIND
|
d.
|
stub zone
|
8. The _____ is responsible for creating a
unique identifying number for every object in a domain.
a.
|
Relative ID master
|
c.
|
domain naming master
|
b.
|
schema master
|
d.
|
stub zone
|
9. The _____ is designed to act as a Windows NT
primary domain controller.
a.
|
network topology
|
c.
|
BIND
|
b.
|
Primary Domain Controller Emulator
|
d.
|
Relative ID master
|
10. The _____ is a partial set of attributes of every object in an
Active Directory forest.
a.
|
Relative ID master
|
c.
|
Global Catalog
|
b.
|
Primary Domain Controller Emulator
|
d.
|
schema master
|
11. _____ are areas of a network that can slow performance or even
stop a process from being performed.
a.
|
Zone transfers
|
c.
|
Namespaces
|
b.
|
Bottlenecks
|
d.
|
BINDs
|
12. A DNS _____ is a naming scheme used by servers in a network; it
shows the relationship of servers to one another in a domain tree and forest.
a.
|
schema master
|
c.
|
operations master
|
b.
|
active directory
|
d.
|
namespace
|
13. A DNS _____ is the placement of DNS servers on a network.
a.
|
infrastructure
|
c.
|
schema master
|
b.
|
zone transfer
|
d.
|
bottleneck
|
14. _____ is the process of copying the contents of the zone file
located on a primary DNS server to a secondary DNS server.
a.
|
BIND
|
c.
|
Replication
|
b.
|
Stubbing
|
d.
|
Zone transfer
|
15. _____ contain a partial copy of a zone that can be hosted by a DNS
server and used to resolve recursive or iterative queries.
a.
|
SOAs
|
c.
|
BINDs
|
b.
|
Stub zones
|
d.
|
Schema masters
|
16. _____ is defined as the pattern of interconnection between nodes.
a.
|
BIND
|
c.
|
Stub zones
|
b.
|
Schema masters
|
d.
|
Network topology
|
YES/NO
1. When a child domain is created, does it imply
that a two-way transitive trust relationship exists between parent and child
domains?
2. Can bottlenecks occur at WAN links?
3. Is it important to centrally locate the DNS
servers on your network?
4. Are one-way, non-transitive trusts the
default used in domain trees and forests?
5. Can servers running on the Web Edition of
Windows 2003 Server act as domain controllers?
COMPLETION
1. A(n) ____________________ is a logical
grouping of network elements, consisting of computers, users, printers, and
other components that makeup the network and allow people to perform their
jobs.
2. ____________________ is an implementation of
DNS that has run in many variations on UNIX servers.
3. A(n) ____________________ is an agreement
between those who will use a particular service and those who will provide it.
4. The ____________________ domain will contain
a server acting in the role of primary domain controller (PDC) that contains
information on user accounts and passwords, and possibly one or more backup
domain controllers, which contains a backup of information from the PDC and is
used for authenticating.
5. The process of constructing a baseline is
commonly referred to as _________________________.
MATCHING
Match each item with a statement below.
a.
|
Transitive relationship
|
f.
|
Schema master
|
b.
|
Organizational units
|
g.
|
Domain naming master
|
c.
|
National model
|
h.
|
Stub zones
|
d.
|
Service Level Agreement
|
i.
|
Metadirectory
|
e.
|
Domain controllers
|
1. Containers that allow you to store users,
computers, and groups.
2. Serves as a contract between clients and
service providers, and spells out what services will be supplied, what is
expected from the service, and who will fix the service if it does not meet an
expected level of performance.
3. Used to write to the directory’s schema,
which is then replicated to other domain controllers in the forest.
4. Contain the Start of Authority resource
records of the zone, the DNS resource records that list the zone’s
authoritative servers, and the glue address.
5. A mechanism for synchronizing and storing the
information in multiple directories.
6. Responsible for any changes to the domain
namespace.
7. Has facilities scattered across a large area,
with offices located in different states or provinces.
8. Servers that store a writable copy of Active
Directory.
9. Pass-through authentication is transferred
across all domains that trust one another.
SHORT ANSWER
1. What are the four domain models available in
Windows NT?
2. List the three transfer modes that are used
in a Windows Server 2003 configuration.
3. Provide a definition for the term baseline.
4. Provide three reasons why you would want to
use multiple domains.
5. List four specifications that you would
gather if taking an inventory of a computer
Chapter 2: Developing the Active Directory
Infrastructure Design
TRUE/FALSE
1. Data administrators do not have any access to
the Active Directory infrastructure; instead, they simply manage the objects,
or a subset thereof, within an Active Directory domain.
2. Each DNS namespace within the organization
must be unique, and the corresponding NetBIOS names of all domains within the
forests must be unique across the whole enterprise.
3. It is highly recommended that all service
admin objects be segregated from the rest of the domain objects so that their
attributes are not viewable by all users in the domain.
4. Objects within an OU are not accessible by
forest and domain admins.
5. All inter-site connection objects are
established by the Knowledge Consistency Checker (KCC).
MODIFIED TRUE/FALSE
1. Autonomy can be achieved at the
service admin level, implying that domain service admins have independence from
service admins in other domains, but that these service admins accept that
there are admins elsewhere in the forest with greater rights.
_________________________
2. The root domain in a forest
establishes the first tree and first DNS namespace in the forest.
_________________________
3. The functional OU model starts by
creating object-type OUs at the root of the domain, and then further
segregating objects below that as appropriate. _________________________
4. The first domain controller in each site
(regardless of domain membership) will assume the role of the Knowledge
Consistency Checker. _________________________
5. The full mesh topology design might be
suitable for a small organization with a small number of sites and where
redundancy is important. _________________________
MULTIPLE CHOICE
1. The _____ is, by default, the location of the
two forestwide Flexible Single Operations Master roles: the Schema Master and
Domain Naming Master.
a.
|
ring topology
|
c.
|
root domain
|
b.
|
hub and spoke
|
d.
|
DNS
|
2. _____ are generally created for one of two
reasons: delegation of rights or group policy.
a.
|
OUs
|
c.
|
Subnets
|
b.
|
GPOs
|
d.
|
Sites
|
3. The _____ starts by creating functional-based
OUs at the root of the domain, and then further segregating objects below that
as appropriate.
a.
|
autonomous
|
c.
|
hybrid
|
b.
|
functional model
|
d.
|
object type model
|
4. A(n) _____ is a useful tool for granting
autonomy to a group over objects that the group manages.
a.
|
GPO
|
c.
|
site
|
b.
|
OU
|
d.
|
subnet
|
5. A(n) _____ is a collection of well-connected
IP subnets.
a.
|
subnet
|
c.
|
OU
|
b.
|
KCC
|
d.
|
site
|
6. A(n) _____ is a logical collection of
contiguous IP addresses, all within the same LAN segment or virtual segment.
a.
|
OU
|
c.
|
subnet
|
b.
|
site
|
d.
|
connection object
|
7. _____ must be defined with both a network ID
and a subnet mask to uniquely identify them.
a.
|
Subnets
|
c.
|
Sites
|
b.
|
Connection objects
|
d.
|
Site links
|
8. _____ are used to construct optimal paths
between one site and another, so that low-cost routes are used with preference
above higher cost routes.
a.
|
Subnets
|
c.
|
Costs
|
b.
|
Site link bridges
|
d.
|
OUs
|
9. The _____ at regular intervals evaluates the
site topology and available DCs and then generates intra-site connection
objects for the local DC with other DCs in the same site to ensure efficient
replication of Active Directory data.
a.
|
ISTG
|
c.
|
SYSVOL
|
b.
|
KCC
|
d.
|
FRS
|
10. The _____ is responsible for assessing the replication needs of
the site in which it resides in relation to other sites and the site links
established by the administrator
a.
|
KCC
|
c.
|
FRS
|
b.
|
SYSVOL
|
d.
|
ISTG
|
11. _____ is typically used to house scripts and group policies, which
are stored on each DC on an NT file System (NTFS) partition and replicated to
all DCs in the same domain using the FRS replication mechanism.
a.
|
KCC
|
c.
|
SYSVOL
|
b.
|
Site link bridges
|
d.
|
ISTG
|
12. _____ is used to replicate SYSVOL data between DCs in the same
domain.
a.
|
FRS
|
c.
|
Multimaster replication
|
b.
|
KCC
|
d.
|
ISTG
|
13. A(n) _____ topology requires 2n unidirectional site links,
where n is the number of sites in the ring.
a.
|
fully meshed
|
c.
|
ring
|
b.
|
hybrid
|
d.
|
hub and spoke
|
14. A(n) _____ topology requires n(n-1) unidirectional site
links.
a.
|
ring
|
c.
|
hybrid
|
b.
|
mesh
|
d.
|
hub and spoke
|
15. _____ designs offer the ability to segment data within a specific
geographic area.
a.
|
Mesh
|
c.
|
Full mesh
|
b.
|
Ring
|
d.
|
Hub and spoke
|
16. What is the role of the Service Administrator?
a.
|
Management and maintenance of domain
controllers.
|
b.
|
Management of user objects.
|
c.
|
Management of group objects.
|
d.
|
Management of machine objects.
|
YES/NO
1. Although the forest owner is responsible for
the operation of the forest, is it necessary for he/she to make operational
changes to the environment?
2. If a dedicated root domain is not used, does
the first domain created assume the role of the root domain?
3. Once the appropriate sites and subnets are
defined, is it necessary to establish links to determine the direction and
nature of flow of Active Directory data replication between sites?
4. Should data be replicated across site links
at random time intervals?
5. Are inter-site connections normally able to
accommodate more traffic than intra-site connections?
COMPLETION
1. ____________________ are responsible for
maintaining the Active Directory infrastructure and for ensuring that this
infrastructure provides the necessary functions and services to end users.
2. ____________________ implies that only the
administrators of the resource have access and that there are no other
administrators elsewhere with sufficient rights to access or manage those
resources.
3. When designing Active Directory forests and
domains, one must remember that each domain has two names: a NetBIOS name and
a(n) ____________________ name.
4. The first domain deployed into any forest is
known as the ____________________ domain.
5. A ring topology of four sites requires
____________________ unidirectional links.
MATCHING
Match each item with a statement below.
a.
|
Resource model
|
f.
|
Ring topology
|
b.
|
Isolation
|
g.
|
Hybrid model
|
c.
|
Cost
|
h.
|
Data administrator
|
d.
|
Schedules
|
i.
|
Dedicated root
|
e.
|
ISTG
|
1. Exclusive access and control.
2. Used in conjunction with intervals to create
a “replication timetable.”
3. Involves constructing a loop with each site
connected to two neighbor sites.
4. Uses a combination of any or all network
topologies.
5. Will ensure that DCs in the site receive a
copy of Schema, Configuration, and Local Domain partitions, while GCs receive
the same and also partial copies of all other domain partitions.
6. Responsible for the management of member
servers and workstations.
7. Deployed to exist as the root domain.
8. Indicates the cost of the physical links
between two sites.
9. Separate forest is deployed that houses
resources that relate to a specific project or business.
SHORT ANSWER
1. What are the NetBIOS rules for Active
Directory domains?
2. List two disadvantages of the single tree
approach to namespace design.
3. What is the purpose of a site?
4. Describe two ways in which intra-site
replication differs from inter-site replication.
5. Why do intra-site replication mechanisms
differ from those used in intra-sites?
Chapter 3: Developing the Network Services
Design
TRUE/FALSE
1. DHCP, WINS, and Remote Access services need
never be implemented in order for an Active Directory DC to be installed or for
it to function.
2. The DNS system, once configured correctly, is
transparent to the user.
3. When there are too many security gatekeepers
in a network, performance suffers.
4. When there are two computers configured with
the same NetBIOS name, they will not be able to access the network.
5. Each DHCP server requires a dynamically
applied IP address for renewal of IP address leases.
MODIFIED TRUE/FALSE
1. A DC for an Active Directory domain can
be installed without DNS being installed somewhere on the network and
configured on the DC as well. _________________________
2. Each zone is maintained by a primary name
server. _________________________
3. By having two separately administered DNS
zones, the administrative overhead doubles. _________________________
4. BIND depends on broadcasts for hosts
on the network to resolve names; a limitation that will affect the design of a
WINS network. _________________________
5. WINS is the name of the text file that
contains NetBIOS names mapped to IP addresses on the network.
_________________________
MULTIPLE CHOICE
1. Each DNS client uses a(n) _____ to query the
name server that they have been configured to use.
a.
|
resolver
|
c.
|
RRAS
|
b.
|
DHCP
|
d.
|
DNS
|
2. _____ records are in the reverse lookup
zones, providing IP address to host name resolution for those instances when an
IP address is known but the host name is not.
a.
|
Host address
|
c.
|
DNS namespace
|
b.
|
pointer or PTR
|
d.
|
Root hints
|
3. _____ records are in the forward lookup
zones, providing host name to IP address resolution.
a.
|
PTR
|
c.
|
Split Brain DNS
|
b.
|
Root hints
|
d.
|
Host address or A
|
4. _____ should always be the first
consideration on the network.
a.
|
SRV records
|
c.
|
Security
|
b.
|
WINS
|
d.
|
BOOTP
|
5. The time for replication to fully synchronize
across all WINS servers is called _____.
a.
|
conditional forwarding
|
c.
|
IAS
|
b.
|
convergence time
|
d.
|
BOOTP
|
6. A network that has a highly unstable
satellite link to a location that has thousands of clients will require its own
_____.
a.
|
performance monitor
|
c.
|
WINS
|
b.
|
root hints
|
d.
|
DHCP server
|
7. _____ are used in networks that use routing
between subnets and do not have DHCP servers on those subnets.
a.
|
LMHOSTS
|
c.
|
SRV records
|
b.
|
DHCP Relay Agents
|
d.
|
Host addresses
|
8. The DHCP Discover message is a(n) _____
message.
a.
|
host
|
c.
|
broadcast
|
b.
|
IAS
|
d.
|
root
|
9. _____ are kept within the same segment,
unless they are specifically routed.
a.
|
Broadcasts
|
c.
|
Root hints
|
b.
|
VPNs
|
d.
|
SRV records
|
10. _____ allows a client computer to register its own IP address and
host name with a DNS server.
a.
|
Conditional forwarding
|
c.
|
WINS
|
b.
|
Split brain DNS
|
d.
|
Dynamic DNS
|
11. _____ is the software within Windows Server 2003 that allows a
server to act as either a router, a remote access server, or both.
a.
|
WINS
|
c.
|
IAS
|
b.
|
RRAS
|
d.
|
DNS
|
12. A(n) _____ receives data from a dial-up line or the Internet, and
then forwards that data to the private network.
a.
|
remote access server
|
c.
|
BOOTP
|
b.
|
DHCP server
|
d.
|
IAS
|
13. _____ bring a remote user’s data through the Internet connection
to the network.
a.
|
Host addresses
|
c.
|
VPNs
|
b.
|
DHCP servers
|
d.
|
Routers
|
14. To integrate with _____, the RRAS server must be configured as
either a dial-up remote access server or a VPN gateway.
a.
|
RADIUS
|
c.
|
WINS
|
b.
|
VPN
|
d.
|
DNS
|
15. Windows Server 2003 includes a supporting technology for RRAS
called the _____.
a.
|
root hint
|
c.
|
split brain DNS
|
b.
|
IAS
|
d.
|
BOOTP
|
16. The summit of the DNS namespace is the _____.
a.
|
PTR
|
c.
|
convergence time
|
b.
|
host address
|
d.
|
root
|
YES/NO
1. Is the DNS system transparent to
administrators?
2. Is it necessary for a small organization to
have Round Robin DNS?
3. If a DNS server cannot be located, does
communication continue?
4. Can you route NetBIOS over TCP/IP or IPX?
5. Does the network topology help determine the
number of DHCP servers you need on a network?
COMPLETION
1. Windows Server 2003 used the
____________________ for name resolution
2. ____________________ is used to name the
domain, to name the DC, and then to help clients and servers locate the Active
Directory services available on the network.
3. ____________________ are used by DNS servers
to communicate directly with the root name servers on the Internet.
4. A(n) ____________________ receives data from
one network subnet and forwards it to another network subnet.
5. When ____________________ is incorporated
into the DNS server, clients can dynamically register their IP addresses and
associated host names with the DNS server.
MATCHING
Match each item with a statement below.
a.
|
DNS namespace
|
f.
|
WINS
|
b.
|
Root hints
|
g.
|
Performance Monitor
|
c.
|
Conditional forwarding
|
h.
|
IAS
|
d.
|
Split Brain DNS
|
i.
|
DHCP server
|
e.
|
SRV record
|
1. Used in simple recursive queries for name
resolution to any host on the Internet.
2. System that uses separate internal and
external DNS.
3. Allows multiple servers to provide the same
type of service on the same network.
4. Used to connect to remote computers.
5. Can be configured to act as a RADIUS server.
6. Requires a statically applied IP address for
renewal of IP address leases.
7. Could be considered the shared server version
of LMHOSTS
8. Used to organize DNS into a hierarchy.
9. Client sends a query to its local DNS server.
SHORT ANSWER
1. What are the relevant rules when planning or
designing zones?
2. Under what circumstances will you need
NetBIOS naming and WINS on the network?
3. Provide four benefits of using a Windows
Server DHCP server.
4. What are the features that drive DNS designs?
5. When designing your DNS, list three reasons
why you would need to add servers.
.
No comments:
Post a Comment