Computer Networking > EXAM > Google IT- Intro to Directory Services-Intro to System Admin and IT-Infrastructure Services-Week 4 - (All)

Google IT- Intro to Directory Services-Intro to System Admin and IT-Infrastructure Services-Week 4 - Part 1 Exam

Document Content and Description Below

A ________________________ contains a lookup service that provides mapping between network resources and network addresses. It's used to organize and look up organizational objects and entities includ... ing user accounts, user groups, telephone numbers, and network shares. - ANSWER directory server __________________ means that the stored directory data can be copied and distributed across a number of physically distributed servers but still appear as one unified data store for querying and administering. Provides redundancy. - ANSWER Replication Directory services are useful for organizing data and making it searchable for an organization. This is achieved through the use of a hierarchal model of _________________ and ______________________. - ANSWER objects; containers Containers are referred to as _____________________________ or OUs, and they can contain objects or more organizational units, similar to the organizational structure of a file system. OUs are like folders which can contain individual files or objects for a directory service and can contain additional folders. - ANSWER organizational units DAP - ANSWER Directory Access Protocol DSP - ANSWER Directory System Protocol DISP - ANSWER Directory Information Shadowing Protocol DOP - ANSWER Directory Operational Bindings Management Protocol LDAP - ANSWER Lightweight Directory Access Protocol - used to access information in directory services like over a network; most popular for directory services _________________________________________________ is a central service that provides instructions to all of the different parts of an IT infrastructure. - ANSWER Centralized management Directory services provide centralized authentication, authorization, and accounting, also known as ___________. - ANSWER AAA In most organizations, access to computer and network resources is based on your _________ in the organization. - ANSWER role When you manage access to resources on a computer and on the network, you'll often grant and deny access based on _____________________________________. - ANSWER user groups RBAC - ANSWER Role Based Access Control - manage each person's access to specific areas in the information system Dedicated configuration management frameworks like Chef, Puppet or SCCM can be used for super simple or super powerful ______________________________________. - ANSWER configuration management Two of the most popular directory services that use LDAP are _______________________ and _______________________________. - ANSWER active directory; openLDAP When we say entry, we're referring to the LDAP entry format or _________________ for records in the directory service. - ANSWER LDAP notation The format of an LDAP entry has a unique entry name denoted by dn or ______________________, then attributes and values associated with that entry. - ANSWER distinguished name cn - ANSWER common name - refers to the individual object (person's name; meeting room; recipe name; job title; etc.) for whom/which you are querying. ou - ANSWER organizational unit - refers to the organizational unit (or sometimes the user group) that the user is part of. If the user is part of more than one group, you may specify as such, e.g., OU= Lawyer, OU= Judge. dc - ANSWER domain component - refers to each component of the domain. For example www.google.com would be written as DC=www,DC=google,DC=com dn - ANSWER distinguished name - refers to the name that uniquely identifies an entry in the directory The ______________________ authenticates clients to the directory server. - ANSWER Bind operation The three common ways to authenticate are _________________, ____________________________, and ________________________________________. - ANSWER anonymous, simple, SASL (simple authentication and security layer) An LDAP server that allows anonymous binds does not require any type of credentialed ____________________________ [Show More]

Last updated: 2 years ago

Preview 1 out of 5 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$6.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

53
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 02, 2022

Number of pages

5

Written in

Seller


seller-icon
MARKALLAN

Member since 3 years

58 Documents Sold

Reviews Received
5
2
0
0
1
Additional information

This document has been written for:

Uploaded

Sep 02, 2022

Downloads

 0

Views

 53

Document Keyword Tags

Recommended For You

Get more on EXAM »

$6.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·