Test 3 - CHAPTER 07 Designing an Administrative Security...

Test 3
Download Document
Showing pages : 1 - 2 of 46
This preview has blurred sections. Sign up to view the full version! View Full Document
CHAPTER 07 Designing an Administrative Security Structure MULTIPLE CHOICE 1. Which of the following objects can be contained in an organizational unit? a. Site links b. Shared folders c. GPO links d. External trusts ANSWER: B EXPLANATION: Organizational units (OUs) can contain users, computers, groups, printers, applications, security policies, shared folders, and nested OUs. (Discussion starts on page 196.) DIF: Demonstration REF: Chapter 7 2. Which of the following is one of the five models used for designing OU structures? a. Open Systems Interconnection (OSI) b. Hybrid of location, then organization c. Multimaster d. Single-master ANSWER: B EXPLANATION: The five standard models for structuring OUs are: Location-based Organization-based Function-based Hybrid of location, then organization Hybrid of organization, then location The Open Systems Interconnection model is a theoretical network model that is used as a teaching tool; it divides a computer’s networking functions into seven layers. The Windows Server 2003 Active Directory database replication model is multimaster replication. To prevent conflicting updates in Windows Server 2003, Active Directory performs updates to certain objects in a single-master fashion. In a single-master model, only one domain controller (DC) in the entire directory is allowed to process updates. This is similar to the role given to a primary domain controller (PDC) in earlier versions of Windows. (Discussion starts on page 197.) DIF: Demonstration REF: Chapter 7 3. When applying Group Policy settings to an OU, what feature can you use to allow an administrator to enforce the User Configuration settings for a set of computers in a particular OU? a. No Override b. Block Policy Inheritance
Background image of page 1
c. Loopback Processing d. Folder Redirection ANSWER: C EXPLANATION: Loopback processing allows an administrator to enforce User Configuration settings for a set of computers in a particular OU. Folder redirection can be used to redirect the Applications Data, Desktop, My Documents, and Start Menu folders. No Override is a group policy feature used to prevent settings in other Group Policy Objects from overriding settings in the policy with No Override enabled. The Block Policy Inheritance setting blocks Group Policy Objects that apply higher in the Active Directory hierarchy of sites, domains, and OUs. Block Policy Inheritance does not block Group Policy Objects if they have No Override enabled. (Discussion starts on page 211.) DIF: Demonstration REF: Chapter 7 4. To which of the following Active Directory objects can a Group Policy Object (GPO) be linked? a. Computers b. Users c. Organizational units d. Printers ANSWER: C EXPLANATION: Group Policy Objects can be linked to sites, domains and organizational units. Computers, users, and printers can be contained within an OU. (Discussion starts on page 211.) DIF: Demonstration REF: Chapter 7 5. To which of the following objects can you not link a Group Policy Object (GPO)? a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Create a FREE account now to get started. Log In

The email address you entered is not valid. The email address you provided is already in use.
Your username must be at least 5 characters. Your username must consist of only alphanumeric characters. Your username must contain at least one letter. Your username contains inappropriate language. Another user has already claimed this username.
Your password must be at least 6 characters in length.
{[ $select.selected.label ]} Please select a valid school.
By creating an account you agree to our Privacy Policy, Terms of Use, and Honor Code.
Create my FREE account Processing...
Sign Up with Facebook

We will never post anything without your permission.

Already on Course Hero? Log In