Knowledge Assessment 1-4

In: Computers and Technology

Submitted By tooeasy92
Words 5416
Pages 22
Lesson 1
Overview of Active Directory Domain Services
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in the blanks provided.
1. The Active Directory database is stored on each domain controller in a file called _____ntds.dit____.
2. The Active Directory __forest____ is considered the security boundary for an Active Directory environment.
3. To provide fault tolerance, Active Directory utilizes a _multimaster_ replication model.
4. To create a trust relationship with an NT4 domain, you will configure a(n) __external trust__.
5. The _ Domain_ naming context is replicated across the domain.
6. Each object in the schema must have a unique ___OID___.
7. A(n) __cross-forest trust__ provides a two-way transitive trust relationship between all domains within two forests.
8. Each domain in an Active Directory forest has a(n) ___two-way transitive___ trust relationship with every other domain in a forest.
9. ___Universal group caching___ allows a user at a remote site to be able to log into Active Directory without needing to contact a global catalog server.
10. Active Directory clients rely on ___SRV records___ in DNS to locate Active Directory resources such as domain controllers and global catalog servers.
Multiple Choice
Circle the correct choice.
1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU Except for a user object, all of the listed choices are container objects that can contain additional Active Directory objects within them. A user object is the only leaf object listed.
2. Which of the following domain controllers can be joined to a forest that is currently set at the Windows Server 2008 forest functional level? a. Windows 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows NT 4.0…...

Similar Documents

Knowledge and Assessment

...Lesson 1 Knowledge Assessment Fill in the Blank 1. Enterprise, Ultimate, and Starter 2. Minwin 3. Save Location 4. Search connectors 5. Window Vista Business 6. 0 megabytes 7. User State Migration 8. Aero Peak 9. (32 bit) 4GB, (64 bit) 192GB True/False 1. F 2. F 3. T 4. F 5. T 6. F 7. T 8. F 9. F 10. F Review Question 1. All of the editions are included on a single DVD disk. The operating system setup program determines which edition to install from the product key you enter during the installation process. 2. ReadyBoost – Windows Vista and Windows 7 enables a computer to utilize an external storage device as a cache for data that would ordinarily be swapped to a (slower) hard disk. In Windows 7 version of ReadyBoost enhances the system’s caching capability by supporting larger caches on as many as eight external devices simultaneously. Lesson 2 Knowledge Assessment Fill in the Blank 1. Side by side, and wipe and load 2. Window RE (window Recovery Environment) 3. Easy transfer or User State migration tool 4. 72 Hours 5. Floppy Disk 6. MUI Multi Language User Interface 7. RAM Disk 8. Clean Install 9. User Profile Folders 10. Networking and NTFS True/False 1. F 2. F 3. T 4. T 5. T 6. F 7. F 8. T 9. F 10. F Review Question 1.  a. Native 32-bit and 64-bit support. (Enables the computer to address......

Words: 1677 - Pages: 7

Assessment 1

...Risk review Candidate’s name | | Phone number | | Email address | | Date submitted | | Performance objective For this task you are required to determine the risk context associated with establishing a new business outlet, within the existing business structure. They will be required to review internal and external environment factors and liaise with all stakeholders to generate a list of risks. Assessment description For the case study provided with this Assessment Task, you are required to review risk management processes and determine scope and objectives, taking into account stakeholder input and both internal and external environmental factors affecting the organisation. With the information gathered, you are to identify risks and present this to relevant parties for feedback. Page numbers in blue denote the appropriate section of the Student Workbook which you should refer to when necessary. ------------------------------------------------- Case Study: Business plan (excerpt) MacVille business plan FY 2011/12 Mission MacVille cafes serve competitively priced, high quality coffee and gourmet food in a safe and comfortable cafe-style environment. Our friendly, well-trained staff provides superior customer service. Vision MacVille aims to deliver our valued customers the very best cafe-going experience. In three years, the business will have established a presence across Queensland and NSW, with the opening of additional cafes. ...

Words: 4699 - Pages: 19

Unit 4 Assessment

...Unit four: Principles of supporting change in a business environment Assessment You should use this file to complete your Assessment. • The first thing you need to do is save a copy of this document, either onto your computer or a disk • Then work through your Assessment, remembering to save your work regularly • When you’ve finished, print out a copy to keep for reference • Then, go to and send your completed Assessment to your tutor via your My Study area – make sure it is clearly marked with your name, the course title and the Unit and Assessment number. Please note that this Assessment document has 3 pages and is made up of 3 Sections. Name: Ioannis Louizos Section 1 – Understand why change happens in a business environment 1. Explain why change happens in a business environment. You should include at least three reasons in your answer. Change happens in a business environment as a result of several factors which broadly can be broken down into 4 reasons: Political which is as a result of changes in laws, regulations, political upheaval such as wars or conflicts abroad, trade union disputes and legislation, for example the outlawing of certain chemicals in a manufacturing process. Economic such as the recent credit crunch, unemployment, inflation, interest rates, foreign exchange rates, reaction to changes in raw material or fuel and utility prices. Social such as changes in consumer behaviours and attitudes. Best...

Words: 1229 - Pages: 5

Lesson 3 Knowledge Assessment

...Knowledge Assessment Lesson 3 1. uses two or more drives used in combination to create a fault-tolerant system. 2. is a commonly used RAID technology that does not provide fault tolerance. 3. A(n) is an extra drive that can be automatically swapped when a drive fails. 4. A(n) is an architecture used for disk arrays, tape libraries, and optical jukeboxes based on networking technology. 5. The sends SCSI commands to a SAN over a TCP/IP network. 6. The is a Windows Server 2008 feature that allows you to create and manage logical unit numbers (LUNs) on both Fibre Channel and iSCSI disk storage subsystems that support VDS. 7. A(n) is a method of storing and organizing computer files so that you can easily find them and access them. 8. NTFS can support up to of storage space for each volume. 9. The program is the command interface to partition drives. 10. A(n) uses volumes stored on two separate physical disks to write data onto both disks simultaneously and redundantly. Lesson 6 1. To print to a printer, you need the permission. 2. The NTFS special permission that allows you to move through a folder to reach lower files or folders is . 3. The Windows component that allows you to manage shares and NTFS permissions is . 4. Permissions that flow from a parent......

Words: 308 - Pages: 2

Assessment 1

...------------------------------------------------- | 1. You can use surveys, such as email surveys, paper surveys and internet surveys. 2. You can use suggestion boxes.3. You could hold focus groups. | | a) Internal customers ☐ b) External customers ☐ Suggestion boxes can generate good ideas from the customers, however they do require maintenance, such as follow-ups in order to make the customers feel valued after they have made their suggestion. The suggestion boxes should be placed in the store where customers have easy access to them | The 5 components are:*Problem identification*Research in to product or service solutions*Evaluation of alternatives*Purchase/use*Post purchase/useThe general process described varies from customer to customer, depending on their different needs and individual characteristics. Every customer is different, to some degree. The idea that, even though individual customers vary from each other, in respect to some personal attributes, consumers act in similar ways with respect to their decision-making and purchasing behaviour. It is this idea that the science of the marketing of products and of services depends on. | 1. Cost (Price) The product was highly overpriced, as I could have gone somewhere else and bought a similar product for cheaper. | 2. Quality The quality was not what I expected, given the sales persons sales pitch. | 3. Time (Delivery) I was given a turnaround time of a few days and ended up......

Words: 757 - Pages: 4

Lesson 1-4 Knowledge Accessment

...Lesson 1 Introducing Windows 7 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except __________, __________, and __________. Starter, Home Basic, and Enterprise 2. The core module that provides all the Windows 7 capability that isn’t language- or edition-specific is called __________. MinWin 3. When you copy a file to a library, Windows Explorer writes the file to the folder designated as the __________. save location 4. To use federated search, you must download or create XML files for specific sites called __________. search connectors 5. The only operating system edition that you can upgrade in-place to Windows 7 Professional is __________. Windows Vista Business 6. Upgrading a computer running Windows 7 Starter to Windows 7 Ultimate using Windows Anytime Upgrade requires __________ megabytes of additional hard disk space. zero 7. To migrate a computer running Windows XP to Windows 7, you can use a utility called __________. User State Migration Tool 8. The new Windows 7 feature that renders all of the windows on the desktop transparent when you mouse over the right end of the taskbar is called __________. Aero Peek 9. The Windows 7 __________ edition is only available in a 32-bit version. Starter 10. The maximum amount of system memory......

Words: 4097 - Pages: 17

Lesson 2 Knowledge Assessment

...Lesson 2 knowledge Assessment Fill in the Blank 1. The primary tool used to configure the Windows environment and hardware is the control panel. 2. UAC is a feature that helps prevent a program making a change without you knowing about it. 3. Every computer in a network should have a unique computer name assigned to it. 4. A domain is a logical unit of computers that share the same security database and is usually associated with Microsoft’s Active Directory. 5. Romote Desktop allows you to connect to a server remotely to run programs just as if you were sitting in front of the computer. 6. For many security mechanisms to work, your computer needs to have the correct data and time. 7. Drivers are programs that control a device and act as a translator between the device and the operating sustem and programs that use the device. 8. Plug and play allows you to install or connect a device, and the operating system will automatically recognize, configure, and install the appropriate drivers for the device. 9. A Signal driver is a device driver that includes a digital signature proving who published the device driver and whether the device driver has been altered. 10. Device manager provides you with a graphical view of the hardware that is installed in your computer and gives you a way to manage and configure your devices. Multiple Choice 1. Which tool allows support personnel to interact with your session to help troubleshoot problems? B. Remote......

Words: 499 - Pages: 2

Lab #4 – Assessment Worksheet

...Lab #4 – Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses......

Words: 285 - Pages: 2

Assessment #1

...Pamela G. Branham Economics Assessment #1 I am pursuing an Associate’s degree in the Administrative Professional program at NWTC. I have worked in this field about 10 years and enjoy it very much. I recently moved to Green Bay, WI 4 years ago October 30th of this year. I have had the hardest time finding a job in this field here without my associate’s degree regardless of my experience. This is why I decided to come back to school. My economic cost is working part time 36 hours a week most likely making 9 dollars an hour without my degree. I would be making about 15,500 dollars a year. My school loans are about 10,000 a year and I plan to be in school for three years adding up to 30,000 for three year of. I would not be able to work full time because I am a single mother of two my youngest is just starting school. My son will start school full time in two year and that is when I will I go back to work full time. My opportunity cost is 47,000 a year (Labor, 2012) with my degree and experience. There are many skills need to be an administrative professional here are a couple I feel is a must technology skills, communication skills, organizational skills, and time management skills. To acquire these necessary skills you must be educated in the area rather it be school or training classes. There are many position I could peruse with this degree for example the front office of a school, in a daycare, a cooperate office. Almost every business has a specific person who......

Words: 440 - Pages: 2

Assessment 4

...Assessment Worksheet Applying OWASP to a Web Security Assessment Web Security Management COM-545 Course Name and Number: _____________________________________________________ Plinio Alves Student Name: ________________________________________________________________ Manh Nguyen Instructor Name: ______________________________________________________________ 10/30/15 Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the Open Web Application Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business functions and each security practice of OpenSAMM. The four business function are governance, construction, verification and deployment. 2. Identify and describe the four maturity levels for security practices in SAMM. Phase I: Awareness & Planning Phase II: Education & Testing Phase III: Architecture & Infrastructure Phase IV: Governance & Operational Security 3. What are some activities an organization could perform for the security practice of Threat Assessment? Starting with simple threat models and building to more detailed methods of threat analysis and weighting, an organization......

Words: 586 - Pages: 3

Knowledge Gained and Personal Assessment

...Assignment Four: Knowledge Gained and Personal Assessment Kim D. Duggared HRMN 495 Professor Jimmy Adkins 11 October 2015 University of Maryland University College in Europe Introduction and Purpose The purpose of this paper is to drawn knowledge gained during this capstone class and classes that have been taken during this degree program. The concept chosen, that is to represent key concepts, related to the key knowledge areas in Human Resources is Employee Engagement Academic definitions of the key terms Blessing white from the division of GP strategy defines employee engagement as “ the intersection of maximum contribution for the organization and maximum satisfactory for the individual,” (, 2013). To further define Engagement In comparing and contrasting employee satisfaction and engagement, satisfaction refers to how employees feel — their “happiness”— about their job and conditions, things like compensation, benefits, work environment, and career development opportunities (, 2012) While engagement, on the other hand, refers to employees’ commitment and connection to work as measured by the amount of effort they are willing to expend on behalf of their employer (, 2012). Highly engaged employees go above and beyond the core responsibilities outlined in their job descriptions, innovating and thinking outside the box to move their organizations forward while one can be satisfied with their work situation and not be......

Words: 1200 - Pages: 5

Knowledge Assessment

...Match the term in Column 1 to its description in Column 2. * a. authorize * b. automatic restore * c. class options * d. DHCPDECLINE * e. DHCPRELEASE * f. exclusion range * g. Joint Engine Technology (JET) * h. reservation * i. rogue DHCP server * j. T2 * E 1. This DHCP message type is sent by a DHCP client when it no longer requires the use of an IP address that it has leased from a DHCP server. * H 2. You can configure one of these to ensure that a DHCP client always receives the same IP address from a particular DHCP server. * F 3. This is used to ensure that a particular address or block of addresses within a scope is not assigned to DHCP clients by a DHCP server. * A 4. You must do this to any DHCP server that needs to function within an Active Directory domain. * D 5. A DHCP client will send this message type if it determines that an IP address offered by a DHCP server is already in use. * B 6. This is performed by a DHCP server when corruption is detected within the DHCP database. * G 7. The DHCP database is based on this database technology. * I 8. Authorizing DHCP servers in Active Directory is designed to prevent against these. * C 9. These provide DHCP parameters to DHCP clients based on vendor or user type. * J 10. This defaults to 87.5% of the total DHCP......

Words: 758 - Pages: 4

Assessment 4

... |Individual Assessments|Assessment 1 |S ( NS ( |Final Result |C ( | | |result | | | | | | | |Assessment 2 |S ( NS ( | | | | | |Assessment 3 |S ( NS ( | |NC ( | |Assessor | |Date | | |Signature | | | | |Feedback to Student | | | |I have received the Assessment Feedback on ____________________________(Date) | |Students Signature | | |Assessor Signature | |Date | | Assessment 1: Project : ......

Words: 3292 - Pages: 14

Mgt 312 All Knowledge Check (Week 1 to Week 4)

...MGT 312 All Knowledge Check (Week 1 To Week 4) To Buy This material Click below link MGT 312 Week 1 Knowledge Check 1. One of the four managerial functions involves grouping employees into departments and teams according to their skills and capabilities. This grouping is done to ensure that cooperation and communication are optimized for the accomplishment of organizational goals. Identify this managerial function. Planning Organizing Controlling Leading 2. When managers play the role of coach or mentor, which managerial function are they primarily performing? Organizing Planning Leading Controlling 3. Daniel is a project manager at Portrait Inc., an advertising agency. His eight-member-team is currently working on a new campaign, but it fails to meet its deadline. With the various organizational behavior tools at his disposal, Daniel is able to identify that the cause for the team’s failure was its inability to work together. To correct this situation, Daniel divides the team into pairs of workers and assigns each pair a different and more specific task. In this scenario, which managerial function is Daniel primarily performing? Planning Mediating Organizing Controlling 4.What is true about the nature of organizational behavior? It studies how organizations respond to people and situations. It is entirely based on intuition and instinct. It focuses exclusively on the......

Words: 2625 - Pages: 11

Assessment 1

...Michael Ayala 5/12/12 Psych 1 Assessment 1 Essay In the the first example, the researcher used the experimental design in his study to examine how poeple respond to pictures of faces with different racial features. The experimental design is when the experimenter isolates and controls all the variables excpet one, he makes sure that variable is the only one causing the desired effect. The The independent variable, which is the variable that the researcher is manipulating, is computer program that he created that will randomly generate the faces as each subject comes in. In this study the researcher used random assignment as the the subject would come in the the room. Random assignment is went the experimental and control groups a non-systematic and randomized way. The way he did this is by not telling his research nor the subjects knew which order they were going in. The team of researchers that found that the more time students spend interacting with technology, the less empathy they show towards other by doing a correlation study. Since many students already use technology a lot this was would be easier to use. The students increased use of their devices is one variable and their lower empathy towards other is the second one making a negative correlation. A negative correlation is a correlation indicating that the variables simultaneous in opposite directions. The second......

Words: 258 - Pages: 2