ITE 382 Exam 2

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

A UNC is written in the format of ______________.

1 / 41

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

42 Terms

1

A UNC is written in the format of ______________.

\\server\share

New cards
2

A ______ ______ that is stored on a central server can be used to automatically set up shared drives and provide updates every time a user logs into the domain.

login script

New cards
3

To create a hidden share, add this to the end of a share name: ___

$ (Dollar Sign)

New cards
4

If a share named ENG_DATA is published on a Windows server named DATA_SRV, the UNC to access the resource should be _________________

\\data_srv\eng_data

New cards
5

Auditing actions are written to the __________ log of the event viewer.

Security

New cards
6

All files and folders under a parent folder will have the same permissions as the parent by default. This is known as ____________.

Inheritance

New cards
7

The windows command line command for displaying existing shares and permissions is ________ ________.

Net Share

New cards
8

In Windows, the ________ permissions are the permissions that will be enforced on a user or group.

Effective

New cards
9

In Windows, security tracking is only available on _________ formatted volumes.

NTFS

New cards
10

The Windows command line command for accessing a network share is _________ _________.

Net Use

New cards
11

Tracking of access and what was done is known as _________.

Auditing

New cards
12

__________ file sharing grants users access to network resources.

Standard

New cards
13

__________ file sharing is configured via Network and Sharing Center and has no access restrictions by default.

Public

New cards
14

What are some of the special shares?

Drive shares: C$, D$, E$
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
PUBLIC
SYSVOL

New cards
15

______ permissions are the actual permissions that will be enforced on a user/group and applies only to file and folder permissions.

Effective

New cards
16

The ______ user type is used only for email and has no SID.

Contact

New cards
17

The ______ account has full control and cannot be deleted.

Administrator

New cards
18

Account policies are determined by the highest precedence ______ ______ ______.

Group Policy object (GPO)

New cards
19

What are important password policies to keep in mind?

Password History - cannot use same password until X number of passwords have been used

Minimum Password Age - How often the user must change password

Minimum Password Length - How long the password must be

Password Complexity - must contain certain characters (special characters, numbers, etc.) and cannot contain account name

Account Lockout - Locks account after X number of failed login attempts

New cards
20

______ is applied only to domain user accounts and allows for two-way (mutual) authentication. It involves a Key Distribution Center (KDC) to act as a central clearinghouse.

Kerberos

New cards
21

A ______ user profile is saved on the local machine.

Local

New cards
22

A ______ user profile can move from computer to computer and is stored on DC network share.

Roaming

New cards
23

A ______ user profile is a roaming profile kept on a server and can be applied to users or groups.

Mandatory

New cards
24

Each user account has a unique ____. It is never reused. It is often better to disable a profile than delete it due to this.

SID

New cards
25

______ groups control access to resources and are defined in the directory access control lists.

Security

New cards
26

______ groups are used for unsecured email lists and can be used by email servers.

Distribution

New cards
27

______ groups contain resources such as printers and network shares.

Global

New cards
28

______ ______ groups give groups or users access to local domain resources.

Domain local

New cards
29

______ groups can be used across domains in the forest and are stored in the global catalog.

Universal

New cards
30

Implicit groups are also referred to as ______ ______.

Special Identities

New cards
31

______ ______ provides a central way of managing user and computer configurations.

Group Policy

New cards
32

______ ______ ______ is a collection of system settings that a System Administrator can create and can be associated with one or more Active Directory containers.

Group Policy Objects (GPO)

New cards
33

What order are Group Policy Objects (GPO's) processes?

Local Policies
Site Policies
Domain Policies
Organization Unit Policies

New cards
34

A ______ is a group of computers and users attached to the same LAN.

Site

New cards
35

______ ______ are used when policy settings have to apply to one or more Windows computers or users in an AD site.

Site Policies

New cards
36

A ______ is a collection of computers that work under a common name, database, and/or policies.

Domain

New cards
37

A ______ ______ is a subdivision within an Active Directory into which you can place users, groups, computers, and other organizational units.

Organizational Unit (OU)

New cards
38

When do group policy settings for users take effect?

At Sign-In and During Periodic Background Refreshes

New cards
39

When do group policy settings for computers take place?

At Startup and During Periodic Background Refreshes

New cards
40

What are the four steps to group policy?

Create the Policy

Edit the Policy

Link the Policy

Enforce the Policy

New cards
41

What is the command used to find IP addresses in Windows?

ipconfig

New cards
42

When the users of a system do not know the details of the network because it seamlessly integrates with the computer they are using, this is known as the concept of ________.

Transparency

New cards

Explore top notes

note Note
studied byStudied by 85 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
4.8(4)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 36 people
... ago
5.0(1)
note Note
studied byStudied by 4290 people
... ago
4.5(14)

Explore top flashcards

flashcards Flashcard (237)
studied byStudied by 74 people
... ago
5.0(2)
flashcards Flashcard (44)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (188)
studied byStudied by 51 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 47 people
... ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 15 people
... ago
5.0(2)
flashcards Flashcard (81)
studied byStudied by 52 people
... ago
5.0(5)
flashcards Flashcard (42)
studied byStudied by 5 people
... ago
5.0(1)
robot