When users log on to Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. 7. A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. 8. Each CSV file needs to begin with a(n) __header record__ when used with the CSVDE command-line tool.
To use federated search, you must download or create XML files for specific sites called search connectors. 5. The only operating system edition that you can upgrade in place to Windows 7 Professional is Windows 7 Ultimate. 6. Upgrading a computer running Windows 7 starter to Windows 7 ultimate using Windows Anytime Upgrade requires------------------ megabytes of additional hard disk space.
Which of the following filters is used with Network Monitor when you want to capture all DHCP packets that pass between a client computer called PC1 (MAC address 00-20-C4-15-22-C1) and a DHCP server called Server1 (MAC address 00-18-31-C3-23-CD and IP address of 192.168.1.1)? D. Ethernet.Address == 0020C41522C1 && DHCP 3. You just opened a capture file with Network Monitor. You want to show mnemonic host names instead of IP addresses. Which of the following actions should you perform?
* You can use which and whereis to locate the utility and locate to search for files. You can use VIM to create and edit a file. 8. What is the result of giving which utility the name if a command that resides in a directory that is not in your search path? * It will say that this command cannot be found.
• two-way transitive 9) _______ allows a user at a remote site to be able to log into active directory without needing to contact a global catalog server. • Universal group caching 10) Active directory clients rely on ________ in DNS to locate active directory resources such as domain controllers and global catalog servers. • SRV records PG 57-58 Multiple Choice 1-10 1) What mechanism within DNS is used to set up load balancing between multiple servers that are advertising the same SRV records? • Priority 2) What security improvement allows you to begin the installation of an RODC from a secure central location before completing it at the remote site where the RODC will be housed? • Staged Installation 3) What does each class or attribute that you add to the active directory schema need to have?
Enables a database application to access specific records in a database file stored on a SAN drive array B. Identifies specific devices in a drive array C. Installed by default in Windows Server 2008 D. Provided with some SAN drive arrays E. Supports copper and fiber optic media F. Requires redundant drives and redundant host adapters G. Fibre Channel topology H. Hard drive installed inside a computer I. Maintains a database of targets and initiators J. Disk array that does not use RAID Multiple Choice: Select one or more correct answers for each of the following questions. 1. Which of the following statements are true of striped volumes?
Setting | Value | Network Discovery | Turned off | File and printer sharing | Turned off | Public folder sharing | Turned off | Media streaming | Choose media streaming options | File sharing connections | Use 128-bit encryption | Table 3-1 Exercise 3.2 | Enabling Network Map | Overview | In Exercise 3.2, you use local Group Policy to disable Network Map (which displays a diagram of the network in the work profile). In order to increase the security of your network, employees should not be able to display a map of the network. In this Exercise we will disable the ability to display network maps in the private network. | Completion time | 10 minutes | 12. Take a screen shot of the Network Map window by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab03_worksheet file in the page provided by pressing Ctrl + V. * Exercise 3.3 | Manually Configuring TCP/IP | Overview | Because the lab network you are constructing for Contoso, Ltd. must be isolated from the production network, you do not want lab computers to obtain their TCP/IP settings from the DHCP servers on the production network.
Which commands can you use to determine who is logged in on a specific terminal? Give the command mesg n to keep ordinary users from writing to your terminal. You can take this action when you do not want to be disturbed or when you are viewing something on your screen that you do not want overwritten. 4. How can you find out which utilities are available on your system for editing files?