Looks like no one added any tags here yet for you.
A UNC is written in the format of ______________.
\\server\share
A ______ ______ that is stored on a central server can be used to automatically set up shared drives and provide updates every time a user logs into the domain.
login script
To create a hidden share, add this to the end of a share name: ___
$ (Dollar Sign)
If a share named ENG_DATA is published on a Windows server named DATA_SRV, the UNC to access the resource should be _________________
\\data_srv\eng_data
Auditing actions are written to the __________ log of the event viewer.
Security
All files and folders under a parent folder will have the same permissions as the parent by default. This is known as ____________.
Inheritance
The windows command line command for displaying existing shares and permissions is ________ ________.
Net Share
In Windows, the ________ permissions are the permissions that will be enforced on a user or group.
Effective
In Windows, security tracking is only available on _________ formatted volumes.
NTFS
The Windows command line command for accessing a network share is _________ _________.
Net Use
Tracking of access and what was done is known as _________.
Auditing
__________ file sharing grants users access to network resources.
Standard
__________ file sharing is configured via Network and Sharing Center and has no access restrictions by default.
Public
What are some of the special shares?
Drive shares: C$, D$, E$
ADMIN$
FAX$
IPC$
NETLOGON
PRINT$
PUBLIC
SYSVOL
______ permissions are the actual permissions that will be enforced on a user/group and applies only to file and folder permissions.
Effective
The ______ user type is used only for email and has no SID.
Contact
The ______ account has full control and cannot be deleted.
Administrator
Account policies are determined by the highest precedence ______ ______ ______.
Group Policy object (GPO)
What are important password policies to keep in mind?
Password History - cannot use same password until X number of passwords have been used
Minimum Password Age - How often the user must change password
Minimum Password Length - How long the password must be
Password Complexity - must contain certain characters (special characters, numbers, etc.) and cannot contain account name
Account Lockout - Locks account after X number of failed login attempts
______ is applied only to domain user accounts and allows for two-way (mutual) authentication. It involves a Key Distribution Center (KDC) to act as a central clearinghouse.
Kerberos
A ______ user profile is saved on the local machine.
Local
A ______ user profile can move from computer to computer and is stored on DC network share.
Roaming
A ______ user profile is a roaming profile kept on a server and can be applied to users or groups.
Mandatory
Each user account has a unique ____. It is never reused. It is often better to disable a profile than delete it due to this.
SID
______ groups control access to resources and are defined in the directory access control lists.
Security
______ groups are used for unsecured email lists and can be used by email servers.
Distribution
______ groups contain resources such as printers and network shares.
Global
______ ______ groups give groups or users access to local domain resources.
Domain local
______ groups can be used across domains in the forest and are stored in the global catalog.
Universal
Implicit groups are also referred to as ______ ______.
Special Identities
______ ______ provides a central way of managing user and computer configurations.
Group Policy
______ ______ ______ is a collection of system settings that a System Administrator can create and can be associated with one or more Active Directory containers.
Group Policy Objects (GPO)
What order are Group Policy Objects (GPO's) processes?
Local Policies
Site Policies
Domain Policies
Organization Unit Policies
A ______ is a group of computers and users attached to the same LAN.
Site
______ ______ are used when policy settings have to apply to one or more Windows computers or users in an AD site.
Site Policies
A ______ is a collection of computers that work under a common name, database, and/or policies.
Domain
A ______ ______ is a subdivision within an Active Directory into which you can place users, groups, computers, and other organizational units.
Organizational Unit (OU)
When do group policy settings for users take effect?
At Sign-In and During Periodic Background Refreshes
When do group policy settings for computers take place?
At Startup and During Periodic Background Refreshes
What are the four steps to group policy?
Create the Policy
Edit the Policy
Link the Policy
Enforce the Policy
What is the command used to find IP addresses in Windows?
ipconfig
When the users of a system do not know the details of the network because it seamlessly integrates with the computer they are using, this is known as the concept of ________.
Transparency