Chapter 1 Manage Users, Computers and Groups...2. Chapter 2 Managing and Maintaining Access to Resources...43



Similar documents
Chapter 4: Implementing and Managing Group and Computer Accounts. Objectives

Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Chapter 1 Implement EIGRP operations Chapter 2 Implement multiarea OSPF operations Chapter 4 Implement Cisco IOS routing features...

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Using LDAP Authentication in a PowerCenter Domain

Active Directory Change Notifier Quick Start Guide

CHAPTER THREE. Managing Groups

Microsoft Virtual Labs. Active Directory New User Interface

Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

Configuring and Using the TMM with LDAP / Active Directory

BMC Performance Manager Windows Security White Paper DCOM / WMI

EventTracker: Support to Non English Systems

DCOM Configuration for Windows NT4, Windows 2000, Windows XP, and Windows XP Service Pack 2

Sentinel Installation Guide

Troubleshooting Active Directory Server

CardAccess 3000 V2.9.x New Features Configuration Guide

Application Note. SA Server and ADAM

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

Microsoft Corporation. Status: Preliminary documentation

Module 1: Introduction to Active Directory Infrastructure

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Deploying System Center 2012 R2 Configuration Manager

Version 9. Active Directory Integration in Progeny 9

PriveonLabs Research. Cisco Security Agent Protection Series:

DIGIPASS CertiID. Getting Started 3.1.0

Module 3: Implementing an Organizational Unit Structure

Administering Group Policy with Group Policy Management Console

Lepide Exchange Recovery Manager

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Sharing Pictures, Music, and Videos on Windows Media Center Extender

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

File and Printer Sharing with Microsoft Windows

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Outlook Profiler 2.5 Series Instruction Manual

Application Note. Gemalto s SA Server and OpenLDAP

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

4.0. Offline Folder Wizard. User Guide

Project management integrated into Outlook

Project management integrated into Outlook

Oracle Enterprise Manager

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Subversion Server for Windows

AD RMS Step-by-Step Guide

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

Any system currently running the Schneider Electric MBX Driver Suite or any activated Cyberlogic software suite.

Sharpdesk V3.5. Push Installation Guide for system administrator Version

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

Object Level Authentication

Mailbox Recovery for Microsoft Exchange 2000 Server. Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3

Sample Configuration: Cisco UCS, LDAP and Active Directory

WirelessOffice Administrator LDAP/Active Directory Support

AvePoint CRM Migration Manager for Microsoft Dynamics CRM. Release Notes

Windows SharePoint Services Installation Guide

Dell Spotlight on Active Directory Deployment Guide

Agent Configuration Guide

About Recovery Manager for Active

Integrated Citrix Servers

Module 4: Implementing User, Group, and Computer Accounts

Installing the BlackBerry Enterprise Server Management console with a remote database

Office Language Interface Pack for Farsi (Persian) Content

Ultimus and Microsoft Active Directory

8.7. Target Exchange 2010 Environment Preparation

Managing an Active Directory Infrastructure O BJECTIVES

LDAP Synchronization Agent Configuration Guide for

Automating client deployment

StarTeam/CaliberRM LDAP QuickStart Manager Administration Guide

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Adobe Acrobat 9 Deployment on Microsoft Systems Management

Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor

Deploying ModusGate with Exchange Server. (Version 4.0+)

User Management Resource Administrator. UMRA tables. User Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

How to - Install EventTracker and Change Audit Agent

Crystal Reports Developer 11 Installation Guide

Installation Guide Supplement

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012

Migrating Active Directory to Windows Server 2012 R2

How to install Small Business Server 2003 in an existing Active

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees

Requesting Access to IBM Director Agent on Windows Planning / Implementation

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Management Reporter Integration Guide for Microsoft Dynamics AX

Using Exclaimer Signature Manager with Office 365

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Defender Delegated Administration. User Guide

Connection to USOE Terminal Server 3/30/2006

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

Transcription:

Table of Contents Chapter 1 Manage Users, Computers and Groups...2 Answer Key 170 Explanations 184 Chapter 2 Managing and Maintaining Access to Resources...43 Answer Key 173 Explanations 216 Chapter 3 Managing and Maintaining A Server Environment...74 Answer Key 175 Explanations 234 Chapter 4 Managing and Implementing Disaster Recovery...99 Answer Key 177 Explanations 258 Chapter 5 Implementing, Managing, and Maintaining Name Resolution...117 Answer Key 179 Explanations 273 Chapter 6 Implementing, Managing, and Maintaining Network Security...141

Answer Key 181 Explanations 296

Managing a Server 2003 Environment Upgrade Copyright 2009 by PrepLogic, LLC. Product ID: 1018 Production Date: May 22, 2009 Total Questions: 246 All rights reserved. No part of this document shall be stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Warning and Disclaimer Every effort has been made to make this document as complete and as accurate as possible, but no warranty or fitness is implied. The publisher and authors assume no responsibility for errors or omissions. The information provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this document. Volume, Corporate, and Educational Sales PrepLogic offers favorable discounts on all products when ordered in quantity. For more information, please contact PrepLogic directly: 1-800-418-6789 solutions@preplogic.com

Manage Users, Computers and Groups 2 Chapter 1 Manage Users, Computers and Groups 1. Bob is migrating his network from Windows NT 4.0 to Windows Server 2003. His company, Legat Industries, utilizes many legacy applications for which there are no available upgrades. Previously, in Windows NT 4.0, his users had little trouble running these legacy applications. To continue running those legacy applications, which group should Bob utilize in Windows Server 2003 that is most like the Users group in Windows NT 4.0? Select the correct answer. A. Power Users B. Users C. Administrators D. Everyone Find the Answer p. 170

2. Ronald is trying to simplify the domain he now administrates. His domain, Atlanta.Georgia.US.BigCorpNA.com is part of a forest that is made up of two trees. The root of the tree in which Ronald is a domain administrator is named BigCorpNA.com. The tree is part of a two tree forest. The root of the forest is BigCorpEurope.com. He needs to identify the names of the groups of which he is a member. When he opens up the Active Directory User and Computers Microsoft Management Console (MMC) and reviews his account, he studies the Members Of dialog box. What does Ronald read in the list? Select the correct answer. A. All the groups in the forest of which he is a member B. All the groups in the tree of which he is a member C. All the groups in the domain of which he is a member. D. Nothing. The Member of dialog box is blank until you specify the scope of the search you are performing. Find the Answer p. 170 Manage Users, Computers and Groups 3

3. Jack is a domain user in the Nuvabot.com domain which is a company involved in the development of robotic equipment. He is a member of the Domain Users group. His domain is linked to the Sales.Nubabot.com domain and the Dev.Nuvabot.com domain. In the Sales.Nuvabot.com domain, his account is a member of the Administrators Group. In the Dev.Nuvabot.com domain, his account is a member of the Users Group. When you examine his account in the Active Directory, which groups appear in his Member Of list? Select the correct answer. A. All of the groups he is a member of B. The Administrators group only C. The Domain Users group only D. The Users group and the Domain Users group Find the Answer p. 170 Manage Users, Computers and Groups 4 4. David wants to extract a list of all the groups in the Win2k3.local domain of which Bud is a member. Which is the correct syntax for the command line to get this list? Select the correct answer. A. dsget user cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand B. dsquery user cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand C. dsget user cn=bud,cn=users,dc=win2k3,dc=local -memberof -recursive D. dsget user cn=bud,cn=users,dc=win2k3,dc=com -memberof -expand Find the Answer p. 170

5. Tom Johnson is a member of an OU named Denver in a domain named Win2k3.local. You need to discover the names of all the groups of which Tom Johnson is a member. Which of the following command-line commands would accomplish this? Select the correct answer. A. dsget user "cn=tom jones,ou=denver,dc=win2k3,dc=local" -memberof -expand B. dsget user cn=tom jones,ou=denver,dc=win2k3,dc=local -memberof -expand C. dsget user "cn=tom jones,cn=denver,dc=win2k3,dc=local" -memberof -expand D. dsget user "cn=tom jones,ou=denver,dc=win2k3.local" -memberof -expand Find the Answer p. 170 Manage Users, Computers and Groups 5 6. Roy Roberts is a member of the Sales OU, which is a sub-organizational unit of the Denver organizational unit in the Win2k3.local domain. What is the proper syntax for the command that enables you to learn which groups Roy is directly or indirectly a member of? Select the correct answer. A. dsget user "cn=roy roberts,ou=sales,ou=denver,dc=win2k3,dc=local" -memberof -expand B. dsget user "cn=roy roberts,ou=denver,ou=sales,dc=win2k3,dc=local" -memberof -expand C. dsget user "cn=roy roberts,ou=sales/denver,dc=win2k3,dc=local" -memberof -expand D. dsget user "cn=roy roberts,ou=denver.sales,dc=win2k3,dc=local" -memberof -expand Find the Answer p. 170

Manage Users, Computers and Groups 170 Answers: Chapter 1 1. A Review Question p. 2 Detailed Explanation p. 184 2. C Review Question p. 3 Detailed Explanation p. 184 3. C Review Question p. 4 Detailed Explanation p. 185 4. A Review Question p. 4 Detailed Explanation p. 185 5. A Review Question p. 5 Detailed Explanation p. 186 6. A Review Question p. 5 Detailed Explanation p. 186 7. A Review Question p. 6 Detailed Explanation p. 187 8. B Review Question p. 7 Detailed Explanation p. 187 9. A Review Question p. 7 Detailed Explanation p. 188 10. A Review Question p. 8 Detailed Explanation p. 188 11. A Review Question p. 9 Detailed Explanation p. 189 12. C Review Question p. 10 Detailed Explanation p. 190 13. D Review Question p. 11 Detailed Explanation p. 190 14. D Review Question p. 11 Detailed Explanation p. 191 15. D Review Question p. 12 Detailed Explanation p. 191 16. A Review Question p. 12 Detailed Explanation p. 192 17. B Review Question p. 13 Detailed Explanation p. 193 18. A Review Question p. 14 Detailed Explanation p. 194 19. C Review Question p. 15 Detailed Explanation p. 194 20. D Review Question p. 16 Detailed Explanation p. 194 21. B Review Question p. 17 Detailed Explanation p. 195 22. C Review Question p. 17 Detailed Explanation p. 195 23. C Review Question p. 20 Detailed Explanation p. 196

Manage Users, Computers and Groups 184 Explanations: Chapter 1 1. Review Question p. 2 Answers: A Explanation A. Many applications used on Windows NT 4.0 required elevated permissions to run correctly. The default Windows 2000, Windows XP Professional, and Windows Server 2003 family security settings for Power Users are very similar to the default security settings for Users in Windows NT 4.0. Any program that a user can run in Windows NT 4.0, a Power User can run in Windows 2000, Windows XP Professional or Windows Server 2003 family. Explanation B. Many applications used on Windows NT 4.0 required elevated permissions to run correctly. The default Windows 2000, Windows XP Professional, and Windows Server 2003 family security settings for Power Users are very similar to the default security settings for Users in Windows NT 4.0. Any program that a user can run in Windows NT 4.0, a Power User can run in Windows 2000, Windows XP Professional or Windows Server 2003 family. Explanation C. Many applications used on Windows NT 4.0 required elevated permissions to run correctly. The default Windows 2000, Windows XP Professional, and Windows Server 2003 family security settings for Power Users are very similar to the default security settings for Users in Windows NT 4.0. Any program that a user can run in Windows NT 4.0, a Power User can run in Windows 2000, Windows XP Professional or Windows Server 2003 family. The administrators group is too powerful for this migration strategy. Explanation D. Many applications used on Windows NT 4.0 required elevated permissions to run correctly. The default Windows 2000, Windows XP Professional, and Windows Server 2003 family security settings for Power Users are very similar to the default security settings for Users in Windows NT 4.0. Any program that a user can run in Windows NT 4.0, a Power User can run in Windows 2000, Windows XP Professional or Windows Server 2003 family. Although the Everyone group no longer includes the Anonymous account by default, it does not have enough default privileges to the file system and Registry to run legacy applications. PrepLogic Question: 1018-100 2. Review Question p. 3 Answers: C Explanation A. The Member Of tab for a user displays a list of groups in the domain

Manage Users, Computers and Groups 185 in trusted domains where the user is a member. Explanation B. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. Explanation C. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. Explanation D. The Member Of box does not permit searches to discover the names of the groups of which you are a member. The Member Of tab for a user automatically displays a list of groups in the domain where the user's account is located. Active Directory does not display groups that reside in trusted domains where the user is a member. PrepLogic Question: 1018-101 3. Review Question p. 4 Answers: C Explanation A. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. Explanation B. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. Explanation C. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. Explanation D. The Member Of tab for a user displays a list of groups in the domain in trusted domains where the user is a member. The account is only located in the Domain Users account. The Domain Users group is listed within the Users group. PrepLogic Question: 1018-102 4. Review Question p. 4 Answers: A Explanation A. This is a correct answer. dsget user

cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand is the correct command-line syntax to extract a list of all the groups in the Win2k3.local domain. Explanation B. This is an incorrect answer. The correct answer is dsget user cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand. The valued, -memberof is an unknown parameter. Explanation C. This is an incorrect answer. The correct answer is dsget user cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand. The parameter, -recursive is an unknown parameter. Explanation D. This is an incorrect answer. The correct answer is dsget user cn=bud,cn=users,dc=win2k3,dc=local -memberof -expand The name of the domain is w2k3.local, not w2k3.com. Manage Users, Computers and Groups 186 PrepLogic Question: 1018-103 5. Review Question p. 5 Answers: A Explanation A. This is correct. The command follows the format: dsget user UserDN -memberof -expand UserDN Specifies the distinguished name of the user object for which you want to display group membership. Explanation B. This is incorrect. Quotation marks need to surround the DN because it is comprised of spaces. Explanation C. This is incorrect. Denver is an OU, not a standard container object. Explanation D. This is incorrect. Win2k3.local needs to be separated into its component names. The correct format is: dsget user "cn=tom jones,ou=denver,dc=win2k3,dc=local" -memberof -expand PrepLogic Question: 1018-104 6. Review Question p. 5 Answers: A Explanation A. This is correct. The organizational unit structure is always represented in the distinguished name by placing the user before the sub-organizational unit and the sub-organizational unit before the organizational unit in which it is contained.