Week 4 – Directory Services

1. What does a directory server provide?

Answers

·        A real-time communication service.

·        A replication service.

·        A lookup service for an organization.

·        A network time service.

2. What benefits does replication provide? Check all that apply.

Answers

·        Redundancy

·        Decreased latency

·        Virtualization

·        Enhanced security

3. What is the most popular directory services protocol used today?

Answers

·        Lightweight Directory Access Protocol

·        Directory System Protocol

·        Directory Operational Binding Management Protocol

·        Directory Access Protocol

Explanation: According to the most recent information that I have gathered, which was in January 2022, the Lightweight Directory Access Protocol (LDAP) is now one of the most widely used directory services protocols. Accessing and maintaining directory information services using LDAP has gained widespread use. It offers a standardized means of gaining access to directory services via an Internet Protocol (IP) network as well as maintaining such services.

4. Active Directory is the LDPA implementation for ________________.

Answers

·        MAC

·        Linux

·        Microsoft

·        Ubuntu

Explanation: Microsoft Windows installations often make use of Active Directory as their LDAP implementation. It provides centralized authentication and authorization services for Windows domain networks, serving as the directory service for such networks. Active Directory makes use of a protocol known as LDAP, which stands for Lightweight Directory Access Protocol, in order to access and manage directory information. Within a Windows environment, the organization and administration of people, workstations, and other network resources may be achieved via the use of this integration.

5. The containers in a Directory Service are referred to as _____________.

Answers

·        user accounts

·        organized structure

·        organizational units (OUs)

·        subfolders

Explanation: "Organizational Units" (abbreviated to OUs) are the names given to the containers that make up a Directory Service. Within a directory service like Microsoft Active Directory, OUs are used to assist in the organization and categorization of items such as users, computers, and many other resources. The use of organizational units (OUs) offers a method for structuring and managing the directory hierarchy. This makes it possible for administrators to apply rules, rights, and settings to certain groupings of objects. This organizational structure contributes to the effective management and protection of the resources that are included inside a network.

6. Which of these are examples of centralized management? Check all that apply.

Answers

·        Role-based access control

·        Centralized configuration management

·        Copying configurations to various systems

·        Local authentication

7. Which of these are components of an LDAP entry? Check all that apply.

Answers

·        Uncommon Name

·        Common Name

·        Organizational User

·        Distinguished Name

8. What's does the LDAP Bind operation do exactly?

Answers

·        Modifies entries in a directory server

·        Looks up information in a directory server

·        Authenticates a client to the directory server

·        Changes the password for a user account on the directory server

Explanation: When it comes to protecting access to directory information, the LDAP Bind action is very necessary. It guarantees that only clients who have been authenticated and given permission to communicate with the directory server may do so. The authentication procedure may make use of a number of different techniques, such as a straightforward authentication based on a password or other, more secure ways like SASL (Simple Authentication and Security Layer).

9. Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

Answers

·        Anonymous

·        Simple

·        Complex

·        SASL

10. Which of these are examples of centralized management? Check all that apply.

Answers

·        Centralized configuration management

·        Role-based access control

·        Copying configurations to various systems

·        Local authentication

11. Which of these are components of an LDAP entry? Check all that apply.

Answers

·        Distinguished Name

·        Kerberos

·        Common Name

·        Uncommon Name

12. What does the LDAP Bind operation do exactly?

Answers

·        Changes the password for a user account on the directory server

·        Modifies entries in a directory server

·        Authenticates a client to the directory server

·        Looks up information in a directory server

Explanation: When it comes to protecting access to directory information, the LDAP Bind action is very necessary. It makes ensuring that the LDAP directory server may only be interacted with by clients who have been authenticated and given permission to do so. The authentication procedure may be as simple as entering a username and password, or it might include more complex processes such as Simple Authentication and Security Layer, abbreviated as SASL.

13. Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

Answers

·        Simple

·        Anonymous

·        Complex

·        SASL

14. Which of the following are services provided for the Directory Services?

Answers

·        Accounting

·        Local authentication

·        Centralized Authentication

·        Authorization

15. What is the difference between a policy and a preference?

Answers

·        They are the exact same thing.

·        A policy is used to set a preference.

·        A policy can be modified by a local user, while a preference is enforced by AD.

·        A policy is enforced by AD, while a preference can be modified by a local user.

Explanation: A preference is a user's or system's particular option or setting that enables customization within specific constraints, while a policy is a collection of rules or guidelines that are authoritative and sometimes needed. To summarize, a policy is a set of rules or guidelines that are authoritative and frequently required. While policies are more concerned with enforcing norms and laws, preferences are more concerned with accommodating individual preferences and improving the user experience.

16. Select the right order of enforcement of GPOs:

Answers

·        Site –> Domain –> OU

·        OU –> Domain –> Sit

·        Domain –> Site –> OU

·        Site –> OU –> Domain

17. What can be used to determine what policies will be applied to a given machine?

Answers

·        An RSOP report

·        A control panel

·        gpupdate

·        A test domain

18. Which of the following could prevent logging into a domain-joined computer? Check all that apply.

Answers

·        Unable to reach the domain controller

·        The are time and date are incorrect

·        The user account is locked

·        Your computer is connected to Wifi

19. How does a client discover the address of a domain controller?

Answers

·        It sends a broadcast to the local network

·        It is provided via DHCP

·        It is pushed via an AD GPO

·        It makes a DNS query, asking for the SRV record for the domain


20. Directory services store information in a hierarchical structure. Which statements about Organizational Units (OUs) of a directory service hierarchy are true? (Choose all that apply)

Answers

·        Sub-member OUs inherit the characteristics of their parent OU.

·        Specific files within an OU, or container, are called “objects”.

·        Changes can be made to one sub-OU without affecting other sub-OUs within the same parent.

·        Parent OUs inherit characteristics of their sub-members.


21. Which directory service software would be used exclusively on a Windows network?

Answers

·        DISP

·        DSP

·        Active Directory

·        OpenLDAP

Explanation: Microsoft Active Directory is the directory service software that is used most often for a Windows-based network. Microsoft's Active Directory (AD) is a directory service and identity management system that the company developed in-house. It offers a single repository for managing and organizing information about network resources, and it is especially built to function in Windows systems.

22. What roles does a directory server play in centralized management? (Choose all that apply)

Answers

·        Centralized authentication

·        Confidentiality

·        Authorization

·        Accounting

 

23. In LDAP, what does dn stand for at the beginning of the entry?

Answers

·        Domain name

·        Distinguished name

·        Distinguished number

·        Distinct name

 

24. When logging into a website that uses a directory service, what command authenticates your username and password?

Answers

·        Remove

·        Modify

·        Bind

·        Add

 

25. In Active Directory, which of the following can be functions of the Domain? (Choose all that apply)

Answers

·        A DNS server

·        A Kerberos authentication server

·        A server that holds a replica of the Active Directory database

·        A container

 

26. Which of these statements are true about Domain Controllers (DCs)? (Choose all that apply)

Answers

·        Changes that are safe to be made by multiple Domain Controllers at once are tasked by granting them Flexible Single-Master Operations.

·        The default Organizational Unit (OU), called Domain Controllers, contains all Domain Controllers in the domain.

·        Delegation can be used in Active Directory.

·        Always use the Domain Admin or Enterprise Admin for day-to-day use.

 

27. Juan, a network user, sends an email to you, the IT admin of the network, stating that his account is locked because he has lost his password. Select all appropriate steps in helping Juan resolve his situation. (Choose all that apply)

Answers

·        Ask Juan questions to help him remember his password.

·        Check the “User must change password at next logon” box so a new password must be created at the next logon.

·        Issue a temporary password.

·        Make sure the password reset is authorized by verifying that Juan is who he says he is.

 

28. What is the difference between a group policy and a group policy preference?

Answers

·        Preferences are reapplied every 90 minutes, and policies are more of a settings template.

·        A policy is editable only by admins, but anyone can edit a group policy preference.

·        Policies are reapplied every 90 minutes, and preferences are a settings template that the user can change on the computer.

·        A preference is editable only by admins, but anyone can edit a policy.

 

29. A client discovers the address of a domain controller by making a DNS query for which record?

Answers

·        AAAA record

·        TXT record

·        SRV record

·        A record

 

Shuffle Q/A 1


30. Instead of assigning access for each user account individually, ________ is a more efficient and easier-to-manage approach.

Answers

·        centralized authentication

·        centralized management

·        active directory

·        LDAP

Explanation: Rather than granting permissions or access rights to individual users, group-based access control entails the creation of groups and the assignment of those permissions or rights to the group. After that, users are added to suitable groups according to their positions, responsibilities, or the projects they are affiliated with. This method both simplifies administration and guarantees consistency, which makes it much simpler to control access for a large number of users. Instead of making changes to each individual user account, it is possible to make modifications at the group level, which will have an effect on all members of the group, in the event that access restrictions change. This is especially helpful in bigger workplaces, where it would be impossible to manage individual access for each person.

 

31. If a system administrator needs to give access to a resource to everyone in a domain, what group in Active Directory can they use?

Answers

·        All Users

·        Domain Users

·        Resource Users

·        Enterprise Admins

Explanation: If a system administrator has to provide access to a resource for all of the users in a domain, they may utilize the "Domain Users" group in Active Directory to accomplish this task. Every user account that has ever been created in the domain is included in the "Domain Users" group, which is a pre-existing group. The administrator may guarantee that all users in the domain have access to a particular resource by either including the "Domain Users" group in the access control list (ACL) of that resource or by giving rights to the "Domain Users" group.

32. Which of these statements are true about managing through Active Directory? (Choose all that apply)

Answers

·        Domain Local, Global, and Universal are examples of group scopes.

·        Distribution groups can be used to assign permission to resources.

·        The default group’s Domain Users and Domain Admins are security groups.

·        ADAC uses PowerShell.

 

33. Which of the following are common reasons a group policy doesn't take effect correctly? (Choose all that apply)

Answers

·        Kerberos may have issues with the UTC time on the clock.

·        Fast Logon Optimization may delay GPO changes from taking effect.

·        Replication failure may occur.

·        The GPO may be linked to the OU that contains the computer.

 

34. Which of the following is not an advantage of replication of data in terms of directory services?

Answers

·        It allows local management of user accounts.

·        It decreases latency when accessing the directory service.

·        It allows flexibility, allowing for easy creation of new object types as needs change.

·        It provides redundancy for data.

 

35. A Lightweight Directory Access Protocol (LDAP) entry reads as follows: dn: CN=John Smith ,OU=Sysadmin,DC=jsmith,DC=com. \n. What is the organizational unit of this entry?

Answers

·        CN=John Smith ,OU=Sysadmin,DC=jsmith,DC=com

·        Sysadmin

·        John Smith

·        Jsmith


36. A particular computer on your network is a member of several GPOs. GPO-A has precedence set to 1. GPO-B has precedence set to 2, and GPO-C has precedence set to 3. According to the given levels of precedence, what will be the resultant set of policy (RSOP) for this machine?

Answers

·        GPO-A will take precedence and overwrite any conflicting settings.

·        The computer will default to local policy due to the confusion.

·        GPO-B will take precedence and overwrite any conflicting settings.

·        GPO-C will take precedence and overwrite any conflicting settings.

Explanation: The combination of these GPOs will produce the final set of policy (RSOP) for the system. This will be done by taking into consideration the settings of each GPO, as well as any user or computer specifications, and the order of precedence.

Due to the fact that it has the lowest precedence (1), GPO-A will be given preference over both GPO-B and GPO-C in this scenario. As a result, the settings that were applied by GPO-A will be reflected in the RSOP for the machine, followed by the settings that were applied by GPO-B and GPO-C.

 

37. You'd like to change the minimum password length policy in the Default Domain Policy group policy preference (GPO). What's the best way to go about doing this?

Answers

·        Edit the Windows Registry to change group policy settings

·        Manually edit config files in SYSVOL

·        Open ADAC and edit policy settings there

·        Open the Group Policy Management Console by running gpmc.msc from the CLI

 

38. How are things organized in a directory server?

Answers

·        By a hierarchical model of objects and containers

·        By a flat text file

·        By a relational database structure

·        By a series of nested groups

 

39. Which of these are advantages of centralized management using directory services? (Choose all that apply)

Answers

·        Configuration can take place on each device.

·        Configuration management is centralized.

·        Access and authorization are managed in one place.

·        Role-Based Access Control (RBAC) can organize user groups centrally.

 

40. To authenticate user accounts on a computer against AD, what must be done to the computer first?

Answers

·        Enable the administrator account

·        Configure remote logging

·        Join it to the domain

·        Configure the firewall

Explanation: When these processes are finished, the computer will be added to the Active Directory domain, and users will be able to authenticate themselves against the domain controller by using the credentials they have been given for the domain. This procedure builds confidence between the computer and the Active Directory infrastructure, which makes it possible to perform user authentication and authorization in a centralized location.

 

41. Which of the following are examples of Lightweight Directory Access Protocol (LDAP)-based directory server software? (Choose all that apply)

Answers

·        ADUC

·        OpenLDAP

·        Microsoft’s Active Directory

·        RDP

 

Shuffle Q/A 2

42. Which of the following are ways to authenticate to an LDAP server? (Choose all that apply)

Answers

·        Simple bind

·        Anonymous bind

·        SASL

·        PGP


43. Which of these statements about Active Directory (AD) are true? (Choose all that apply)

Answers

·        AD includes a tool called the Active Directory Authentication Center, or ADAC.

·        AD can “speak” LDAP.

·        AD is used as a central repository of group policy objects, or GPOs.

·        AD is incompatible with Linux, OS X, and other non-Windows hosts.

44. Which directory standard was approved in 1988 and includes protocols like the Directory Access Protocol?

Answers

·        LDAP

·        Active Directory

·        DISP

·        X.500

Explanation: X.500 is the standard for directories that was established in 1988 and contains protocols such as the Directory Access Protocol. The Directory Access Protocol (DAP), which is used for accessing directory information, is one of the protocols that are defined in the X.500 standard, which also contains other models and protocols for directory services. The X.500 standard includes a framework that allows for the hierarchical and decentralized organization of directory information as well as its access. It is the basis for the Lightweight Directory Access Protocol (LDAP), which is a protocol for directory services that is more lightweight and is used by a large number of organizations.

45. By default, Active Directory adds new computers to what group?

Answers

·        New Computers

·        Domain Computers

·        Added Computers

·        All Computers

Explanation: By default, when a new computer is added to the Active Directory domain, it is automatically placed in the "Domain Computers" group. The "Domain Computers" group is a built-in group in Active Directory that includes all computer accounts in the domain. Members of this group have certain default permissions and rights within the domain, allowing them to access resources and perform basic operations.

This default placement in the "Domain Computers" group ensures that the new computer has the necessary permissions and access rights to interact with other domain resources. Administrators can further customize permissions and group memberships based on the specific needs of the organization.

Post a Comment

Previous Post Next Post