System Administration and IT
Infrastructure Service Latest 2022
Contains a lookup service that provides mapping between network resources and their network
addresses ✔✔Directory Server
Active Directory stores a _____
...
System Administration and IT
Infrastructure Service Latest 2022
Contains a lookup service that provides mapping between network resources and their network
addresses ✔✔Directory Server
Active Directory stores a ____________________________ of the password. ✔✔One-way
cryptographic hash
This method of authentication can employ the help of security protocols like TLS. Requires the
client and the directory server to authenticate using some method. One of the most common
methods is using Kerberos. ✔✔SASL Authentication.
Passwords can be easily turned into a ______________, but _____________ cant be easily turned
back into passwords. ✔✔Hash/Hashes
In most organizations, access to computer and network resources is based on ✔✔Your role in the
organization
If there's more then one person who can _______________ using the same username and
password, then __________________ becomes difficult or even impossible ✔✔Authenticate
Auditing
A network authentication protocol that's used to authenticate user identity, secure the transfer of
user credentials, and more. ✔✔Kerberos
If someone forgets there password. Someone with Sysadmin responsibilities, may be authorized
to _____________ their password for them. ✔✔Reset
Why is replication important? ✔✔It provides redundancy by having multiple servers available
simultaneously. Decreases latency when you access the directory service.
When you _________ a GPO, all of the computers or users under that domain, site, or OU will
have that policy applied ✔✔Link
If this person has used the NTFS ___________________________or ______Feature to encrypt
files, They can lose access to those files if their password is reset. ✔✔Encrypting file system (EFS)
What does the LDAP Bind Operation do exactly? ✔✔Authenticates a client to the directory server
When you manage access to resources on a computer and on the network, you'll often grant and
deny access based on ✔✔User Groups
Authentication types supported by LDAP Bind Operation? ✔✔Anonymous
Simple
SASL
Settings that are reapplied every few minutes, and aren't meant to be changed even by the local
administrators ✔✔Policies
Useful for organizing data and making it searcha
[Show More]