Question 1
Question
where can you view audit events?
Answer
-
in the C:\Temp\Logs folder as text files
-
in System logs in Events Viewer
-
in Security logs in Event Viewer
-
by using audit/logs at the command line
Question 2
Question
Auditing is used for what purpose?
Question 3
Question
why would auditing include logon and logoff times?
Answer
-
these are simply default audit types for accounts
-
logon and logoff times can help track user's work hours
-
logon and logoff times can help pinpoint who was logged on during a failure
-
logon and logoff events can track system usage for capacity planning
Question 4
Question
why is it a good idea (other that the effect on system performance) to set up auditing for only those objects that you really need to focus on?
Answer
-
object auditing is complex and requires a lot of time to set up
-
searching through too many events makes finding problems more difficult
-
by enabling objects auditing, you also enable many other events
-
auditing too many events adds an extra layer of complexity to management tasks
Question 5
Question
why is choosing what to audit, instead of auditing everything that a user does, a good idea?
Answer
-
high level of auditing can affect system preformance
-
auditing sets up an air of suspicion for users
-
extensive audit trails often lead to too much troubleshooting
-
auditing requires a high level of expertise to set up and maintain
Question 6
Question
which utility do you use to access advance audit policy settings?
Answer
-
Local Policy Editor
-
Group Policy Editor
-
Domain Policy Editor
-
Schema Policy Editor
Question 7
Question
what is one of the primary advantages to using Active Directory to store DNS information?
Answer
-
fault tolerance
-
zero configuration
-
low maintenance
-
reverse zone lookups
Question 8
Question
which type of DNS zone resolves host names to IP addresses?
Answer
-
forward lookup zone
-
reverse lookup zone
-
backward lookup zone
-
null lookup zone
Question 9
Question
when resetting audit settings back to basic mode, what file must you remove as part of the process?
Answer
-
policies.txt
-
audit.txt
-
policies.csv
-
audit.csv
Question 10
Question
which TCP/UDP port does the DNS service use to communicate?
Question 11
Question
what is the first and most important step in installing and deploying DNS in your network?
Answer
-
setting up Active Directory so that DNS can be integrated into it
-
planning the infrastructure and service requirements
-
configuring the forward and reverse lookup zones correctly
-
splitting the network into subdomains
Question 12
Question
which one of the following is an example of an FQDN?
Question 13
Question
what is the primary advantage of a caching-only DNS server?
Answer
-
it requires no maintenance
-
it provides DNS to a select few DNS clients
-
is speeds DNS queries by building a DNS request cache
-
it increases network traffic only on external networks
Question 14
Question
authorization is used for what purpose?
Answer
-
to grant access to a user
-
to verify a user's identity
-
to determine security restrictions
-
to calculate effective permissions
Question 15
Question
why are success audits as important as failure audits?
Answer
-
successes are important to troubleshooting for establishing baselines of normal behavior
-
successes are included by default and can be filtered out
-
successes can point to security breaches as well as normal behavior
-
successes allow you to track activity such as new account creation
Question 16
Question
authentication is used for what purpose?
Answer
-
to grant access to a user
-
to verify a user's identity
-
to determine security restrictions
-
to calculate effective permissions
Question 17
Question
why would you implement a caching-only DNS server on your network?
Answer
-
to speed DNS queries and decrease network traffic
-
to avoid installing and configuring a full-blown DNS server
-
to reduce the amount of maintenance for administrator
-
to reduce complexity in a network environment
Question 18
Question
what is the primary advantage of a caching-only DNS server?
Answer
-
it requires no maintenance
-
it provides DNS to a select few DNS clients
-
it speeds DNS queries by building a DNS request cache
-
it increases network traffic only on external networks
Question 19
Question
by using the Active Directory-integrated zone, DNS follows what kind of model?
Answer
-
master-slave
-
multi-master
-
primary-secondary
-
forward-reverse
Question 20
Question
what type of structure does DNS have?
Answer
-
hierarchical distributed
-
flat distributed
-
top-down distributed
-
wheel-spoke distributed
Question 21
Question
A specific, individual computer or other network device in a domain is known as what?
Answer
-
server
-
entity
-
top-level system
-
host
Question 22
Question
the Domain Name System (DNS) works much like a phone book to associate URLs (names) with what kinds of numbers?
Answer
-
ID numbers
-
World Wide Web number
-
domain addresses
-
IP addresses
Question 23
Question
which of the following is an example of a second-level domain?
Answer
-
blah.com
-
.net
-
server1
-
corporate.local
Question 24
Question
which of the following is an example of a top-level domain?
Answer
-
.local
-
.net
-
.business
-
microsoft.com
Question 25
Question
which auditing feature allows you to define computer-wide system access control lists for the file system or the registry?
Question 26
Question
What type of audit event notifies you that an account failed to log on?
Answer
-
DS access
-
object access
-
privilege use
-
logon/logoff
Question 27
Question
Why should you avoid using basic audit policy settings and advanced audit policy settings together?
Answer
-
that amount of auditing will fill out event logs too quickly
-
the two audit setting ranges have too much redundancy or overlap between them
-
setting too many policies can put your system in an 'out of compliance" state
-
Audit policies might cause conflicts or erratic behavior.
Question 28
Question
By using what type of policy can you track, limit, or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012 R2?
Answer
-
USB Storage Access
-
Removable Storage Access
-
Removable Device Access
-
Storage Device Audit
Question 29
Question
Which command do you use to manage auditing at the command prompt?
Answer
-
Audit.exe
-
AdPolicy.exe
-
Auditpol.exe
-
Policy.exe
Question 30
Question
Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of how many audit subsettings?
Question 31
Question
What does the acronym FQDN stand for?
Question 32
Question
A stub zone is a zone copy that contains only what type of records?