Michael Marcus
Quiz por , criado more than 1 year ago

Final Test quiz

108
1
0
Michael Marcus
Criado por Michael Marcus quase 9 anos atrás
Fechar

Quiz 7 & 8

Questão 1 de 32

1

where can you view audit events?

Selecione uma das seguintes:

  • in the C:\Temp\Logs folder as text files

  • in System logs in Events Viewer

  • in Security logs in Event Viewer

  • by using audit/logs at the command line

Explicação

Questão 2 de 32

1

Auditing is used for what purpose?

Selecione uma das seguintes:

  • authenticating users

  • authorizing users

  • recording user's actions

  • assessing a user's permissions

Explicação

Questão 3 de 32

1

why would auditing include logon and logoff times?

Selecione uma das seguintes:

  • these are simply default audit types for accounts

  • logon and logoff times can help track user's work hours

  • logon and logoff times can help pinpoint who was logged on during a failure

  • logon and logoff events can track system usage for capacity planning

Explicação

Questão 4 de 32

1

why is it a good idea (other that the effect on system performance) to set up auditing for only those objects that you really need to focus on?

Selecione uma das seguintes:

  • object auditing is complex and requires a lot of time to set up

  • searching through too many events makes finding problems more difficult

  • by enabling objects auditing, you also enable many other events

  • auditing too many events adds an extra layer of complexity to management tasks

Explicação

Questão 5 de 32

1

why is choosing what to audit, instead of auditing everything that a user does, a good idea?

Selecione uma das seguintes:

  • high level of auditing can affect system preformance

  • auditing sets up an air of suspicion for users

  • extensive audit trails often lead to too much troubleshooting

  • auditing requires a high level of expertise to set up and maintain

Explicação

Questão 6 de 32

1

which utility do you use to access advance audit policy settings?

Selecione uma das seguintes:

  • Local Policy Editor

  • Group Policy Editor

  • Domain Policy Editor

  • Schema Policy Editor

Explicação

Questão 7 de 32

1

what is one of the primary advantages to using Active Directory to store DNS information?

Selecione uma das seguintes:

  • fault tolerance

  • zero configuration

  • low maintenance

  • reverse zone lookups

Explicação

Questão 8 de 32

1

which type of DNS zone resolves host names to IP addresses?

Selecione uma das seguintes:

  • forward lookup zone

  • reverse lookup zone

  • backward lookup zone

  • null lookup zone

Explicação

Questão 9 de 32

1

when resetting audit settings back to basic mode, what file must you remove as part of the process?

Selecione uma das seguintes:

  • policies.txt

  • audit.txt

  • policies.csv

  • audit.csv

Explicação

Questão 10 de 32

1

which TCP/UDP port does the DNS service use to communicate?

Selecione uma das seguintes:

  • 25

  • 53

  • 80

  • 443

Explicação

Questão 11 de 32

1

what is the first and most important step in installing and deploying DNS in your network?

Selecione uma das seguintes:

  • setting up Active Directory so that DNS can be integrated into it

  • planning the infrastructure and service requirements

  • configuring the forward and reverse lookup zones correctly

  • splitting the network into subdomains

Explicação

Questão 12 de 32

1

which one of the following is an example of an FQDN?

Selecione uma das seguintes:

  • SERVER1

  • 192.168.1.50

  • sales.microsoft.com

  • C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS

Explicação

Questão 13 de 32

1

what is the primary advantage of a caching-only DNS server?

Selecione uma das seguintes:

  • it requires no maintenance

  • it provides DNS to a select few DNS clients

  • is speeds DNS queries by building a DNS request cache

  • it increases network traffic only on external networks

Explicação

Questão 14 de 32

1

authorization is used for what purpose?

Selecione uma das seguintes:

  • to grant access to a user

  • to verify a user's identity

  • to determine security restrictions

  • to calculate effective permissions

Explicação

Questão 15 de 32

1

why are success audits as important as failure audits?

Selecione uma das seguintes:

  • successes are important to troubleshooting for establishing baselines of normal behavior

  • successes are included by default and can be filtered out

  • successes can point to security breaches as well as normal behavior

  • successes allow you to track activity such as new account creation

Explicação

Questão 16 de 32

1

authentication is used for what purpose?

Selecione uma das seguintes:

  • to grant access to a user

  • to verify a user's identity

  • to determine security restrictions

  • to calculate effective permissions

Explicação

Questão 17 de 32

1

why would you implement a caching-only DNS server on your network?

Selecione uma das seguintes:

  • to speed DNS queries and decrease network traffic

  • to avoid installing and configuring a full-blown DNS server

  • to reduce the amount of maintenance for administrator

  • to reduce complexity in a network environment

Explicação

Questão 18 de 32

1

what is the primary advantage of a caching-only DNS server?

Selecione uma das seguintes:

  • it requires no maintenance

  • it provides DNS to a select few DNS clients

  • it speeds DNS queries by building a DNS request cache

  • it increases network traffic only on external networks

Explicação

Questão 19 de 32

1

by using the Active Directory-integrated zone, DNS follows what kind of model?

Selecione uma das seguintes:

  • master-slave

  • multi-master

  • primary-secondary

  • forward-reverse

Explicação

Questão 20 de 32

1

what type of structure does DNS have?

Selecione uma das seguintes:

  • hierarchical distributed

  • flat distributed

  • top-down distributed

  • wheel-spoke distributed

Explicação

Questão 21 de 32

1

A specific, individual computer or other network device in a domain is known as what?

Selecione uma das seguintes:

  • server

  • entity

  • top-level system

  • host

Explicação

Questão 22 de 32

1

the Domain Name System (DNS) works much like a phone book to associate URLs (names) with what kinds of numbers?

Selecione uma das seguintes:

  • ID numbers

  • World Wide Web number

  • domain addresses

  • IP addresses

Explicação

Questão 23 de 32

1

which of the following is an example of a second-level domain?

Selecione uma das seguintes:

  • blah.com

  • .net

  • server1

  • corporate.local

Explicação

Questão 24 de 32

1

which of the following is an example of a top-level domain?

Selecione uma das seguintes:

  • .local

  • .net

  • .business

  • microsoft.com

Explicação

Questão 25 de 32

1

which auditing feature allows you to define computer-wide system access control lists for the file system or the registry?

Selecione uma das seguintes:

  • Global Object Access Auditing

  • Filereg Auditing

  • Registry Trail Auditing

  • System Tracker Auditing snap-in

Explicação

Questão 26 de 32

1

What type of audit event notifies you that an account failed to log on?

Selecione uma das seguintes:

  • DS access

  • object access

  • privilege use

  • logon/logoff

Explicação

Questão 27 de 32

1

Why should you avoid using basic audit policy settings and advanced audit policy settings together?

Selecione uma das seguintes:

  • that amount of auditing will fill out event logs too quickly

  • the two audit setting ranges have too much redundancy or overlap between them

  • setting too many policies can put your system in an 'out of compliance" state

  • Audit policies might cause conflicts or erratic behavior.

Explicação

Questão 28 de 32

1

By using what type of policy can you track, limit, or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012 R2?

Selecione uma das seguintes:

  • USB Storage Access

  • Removable Storage Access

  • Removable Device Access

  • Storage Device Audit

Explicação

Questão 29 de 32

1

Which command do you use to manage auditing at the command prompt?

Selecione uma das seguintes:

  • Audit.exe

  • AdPolicy.exe

  • Auditpol.exe

  • Policy.exe

Explicação

Questão 30 de 32

1

Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of how many audit subsettings?

Selecione uma das seguintes:

  • 23

  • 53

  • 56

  • 64

Explicação

Questão 31 de 32

1

What does the acronym FQDN stand for?

Selecione uma das seguintes:

  • File Quota Domain Number

  • Fully Qualified Domain Number

  • Fully Qualified Domain Name

  • Full Query Domain Name

Explicação

Questão 32 de 32

1

A stub zone is a zone copy that contains only what type of records?

Selecione uma das seguintes:

  • host entries

  • subdomain entries

  • necessary resource entries

  • query record entries

Explicação