Term
| Name the five FSMO Roles. |
|
Definition
- Domain Naming Master
- Relative Identifier (RID) Master
- Infrastructure Master
- Primary Domain Controller (PDC) Emulator
- Schema Master
|
|
|
Term
| Name the Forest-Wide Master Roles. |
|
Definition
- Schema Master
- Domain Naming Master
|
|
|
Term
| Name the Domain-Wide Master Roles. |
|
Definition
- Relative Identifier (RID) Master
- Primary Domain Controller (PDC) Emulator
- Infrastructure Master
|
|
|
Term
| Explain the difference between transferring a Master Role and seizing a Master Role. |
|
Definition
Transfer - moving with cooperation of its current owner (move role from one server to another).
Seize - moving without the cooperation of its current owner (server holding role fails and you have no intent to restore it)
|
|
|
Term
| How many Schema Masters can be per forest? |
|
Definition
|
|
Term
| What does FSMO stand for? |
|
Definition
| Flexible Single Master Operations |
|
|
Term
| Which role ensures Domain names are unique in the forest? |
|
Definition
|
|
Term
| How many RID's are issued at a time by the RID Master? |
|
Definition
|
|
Term
| Which role provides backwards compatability with NT4 BDCs, Windows 98 and ME clients, controls time syncronization, and acts as the central manager for password changes, replication, and account lockouts? |
|
Definition
|
|
Term
| What is the RID for Built-in Administrator? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| (T/F) Small domains place RID Master and PDC Emulator roles on the same DC, whereas very large domains place them on separate DCs. |
|
Definition
|
|
Term
| (T/F) The Infrastructure Master Role should be assigned to the DC containing the Global Catalog. |
|
Definition
|
|
Term
| Where are forest roles usually assigned? |
|
Definition
|
|
Term
| Where are login attempt failures forwarded to before being rejected? |
|
Definition
|
|
Term
| The DC containing which role updates ACLs and group membership as required? |
|
Definition
|
|
Term
| What are three reasons to create multiple domains? |
|
Definition
- Meet security requirements
- Meet administrative requirements
- Optimize replication traffic
|
|
|
Term
| Explain the advantages of multiple domains in regards to security. |
|
Definition
| Allows you to vary Account Policies for your organization by defining separate domains to handle the different requirements. |
|
|
Term
| Explain the advantages of multiple domains in regards to network traffic. |
|
Definition
| By defining multiple small domains and replicating only objects relevant to a location, you can reduce network traffic and optimize replication. |
|
|
Term
| (T/F) By defining multiple small domains and replicating only objects relevant to a location, you can reduce network traffic and optimize replication. |
|
Definition
|
|
Term
| (T/F) In a forest with one domain, all objects in the forest are replicated to every domain controller in the forest. |
|
Definition
|
|
Term
| What policies are contained in the Account Policies subdirectory? |
|
Definition
- Password policy
- Account lockout policy
- Kerberos policy
|
|
|
Term
| What group must you be a member of in order to add or removed domains? |
|
Definition
|
|
Term
| What group must you be a member of to modify the Schema? |
|
Definition
|
|
Term
| Name the five predefined containers in Active Directory. |
|
Definition
- Builtin
- Computers
- Domain Controllers
- Foreign Security Principles
- Users
|
|
|
Term
| Which of the five predefined containers is an OU? |
|
Definition
|
|
Term
| What are three common types of Organization Unit hierarchy? |
|
Definition
- Location
- Organizational Function
- Object Type
- Combination
- Administrative Responsibility
|
|
|
Term
| What tool is used to delegate administrative control over an OU hierarchy? |
|
Definition
| Delegation of Control Wizard |
|
|
Term
| How would you describe the function of the Users or Groups page in the Delegation of Control Wizard? |
|
Definition
| Enables you to select the user accounts or groups to which you want to delegate control. |
|
|
Term
| How many layers are typical in OU nesting? |
|
Definition
|
|
Term
| (T/F) Delegation of Control Wizard can be used to remove permissions. |
|
Definition
|
|
Term
| To modify permissions for users and groups, what option under the View menu must be selected? |
|
Definition
|
|
Term
| What are the different ways to move objects between OUs? |
|
Definition
- Drag and drop
- Move menu option
- Dsmove
- Movetree
|
|
|
Term
| Where are first level OUs located in Active Directory? |
|
Definition
| Directly under the domain |
|
|
Term
| What are three characteristics common to all trusts? |
|
Definition
- Trusts can be created manually (explicitly) or automatically (implicitly)
- Trusts can be either transitive (not bound by the domains in the trust relationship) or non transitive (bound by the domains in the trust relationship)
- Trusts can be one-way or two-way
|
|
|
Term
| What are the six Trust Types? |
|
Definition
- Parent-child
- Tree root
- Shortcut
- External
- Forest
- Realm
|
|
|
Term
| What are the two trust protocols? |
|
Definition
|
|
Term
| What does NTLM stand for? |
|
Definition
| New Technology Local Area Manager |
|
|
Term
| What is the default protocol for Windows Server 2003 in the trusted domain? |
|
Definition
|
|
Term
| What trust type improves resoure access, reduces length of trust path, and is transitive? |
|
Definition
|
|
Term
| What trust type can be used for NT 4.0 and 2000 domain trusts and is nontransitive? |
|
Definition
|
|
Term
| What trust type is used between third-party kerberos implementations and is nontransitive? |
|
Definition
|
|
Term
| What are two ways to verify trusts? |
|
Definition
- Active Directory Domains and Trusts
- netdom trust domain1 /d: contoso /verify(words in italics and underlined vary depending on your domain name, etc)
|
|
|
Term
| How do you remove trust relationships? |
|
Definition
netdom trust domain1 /d: contoso /remove
(words in italics and underlined vary depending on your domain name, etc) |
|
|
Term
| What allows users to log on without specifying a domain seperately and can be the user's email address? |
|
Definition
| UPN (User Principal Name) |
|
|
Term
| What are the major time and money-saving reasons for information residing in more than one domain controller? |
|
Definition
- Fault Tolerance
- Load Balancing
- Proximity of Information
|
|
|
Term
| What are the actions that trigger replication between domain controllers? |
|
Definition
- Creating an object
- Modifying an object
- Moving an object
- Deleting an object
|
|
|
Term
| What are the recommended methods of forcing replication? |
|
Definition
- Active Directory Sites and Services
- Repadmin
- Replmon
- Scripts
- Script
|
|
|
Term
| Which replication partitions occur once per forest? |
|
Definition
- Schema partition
- Configuration partition
|
|
|
Term
| What are the two trade-offs associated with replication? |
|
Definition
- High replication load vs latency
- Replication in WAN vs user access in WAN
|
|
|
Term
| What makes up the physical structure of Active Directory? |
|
Definition
- Sites
- Replication
- Replicas
- Partitions
- Domain Controllers
- Global Catalog
|
|
|
Term
| What makes up the logical structure of Active Directory? |
|
Definition
- Domains
- OUs
- Trees
- Forests
|
|
|
Term
| What is a directory partition? |
|
Definition
|
|
Term
|
Definition
| A copy of the directory partition |
|
|
Term
| What are the default application partitions? |
|
Definition
- ForestDNSZones
- DomainDNSZones
|
|
|
Term
| When does Active Directory automatically build a replication topology? |
|
Definition
| When you have more than one domain controller. |
|
|
Term
| What controls replication changes between sites by comparing the USNs for recent changes and uses timestamp if modifications carry the same USN? |
|
Definition
|
|
Term
| What does USN stand for? (And NO, it's not United States Navy!) |
|
Definition
|
|
Term
What does the following:
- Creates initial replication topology (replication ring)
- Creates connection objects between DCs
- runs on each DC
|
|
Definition
| KCC (Knowledge Consistency Checker) |
|
|
Term
| When would you perform a Primary Restore? |
|
Definition
| When you need to rebuild your domain. |
|
|
Term
| What are the three types of restores? |
|
Definition
- Primary
- Authoritative
- Nonauthoritative
|
|
|
Term
| What type of restore involves the system state being replicated with another DC and is brought up-to-date by replicating after data is restored? |
|
Definition
|
|
Term
| What type of restore requires that the computer be started in DSRM, then run Ntdsutil.exe and marking specific objects prior to reboot? |
|
Definition
|
|
Term
| Where is Ntdsutil.exe located? |
|
Definition
|
|
Term
| What is contained in the System State? |
|
Definition
- Registry
- Com+ Class Registration Database
- System boot files
- Certificate Services
- SYSVOL (if DC)
- Active Directory Database (if DC)
|
|
|
Term
| (T/F) You can backup individual components of the System State. |
|
Definition
|
|
Term
| (T/F) System State can only be backed up on the local computer, not a remote computer. |
|
Definition
|
|
Term
|
Definition
| Directory Services Restore Mode |
|
|
Term
| What two things are impacted by an authoritative restore? |
|
Definition
|
|
Term
| What tools are provided to diagnose and resolve problems with Active Directory? |
|
Definition
- Directory Service Log
- Netdiag.exe (Network Connectivity Tester)
- Dcdiag.exe (Domain Controller diagnostic tool)
- Ntdsutil.exe (Active Directory diagnostic tool)
|
|
|
Term
| What event logs are used to monitor Active Directory Performance? |
|
Definition
- Application Log
- Directory Service Log
- File Replications Service Log
- System Log
|
|
|
Term
| What log contains Errors, Warnings, and Information that applications, such as database servers, and e-mail generates. |
|
Definition
|
|
Term
| What log contains Errors, Warnings, and Information that Active Directory generates. |
|
Definition
|
|
Term
| What log contains Errors, Warnings, and Information that File Replication Service generates? |
|
Definition
| File Replication Service Log |
|
|
Term
| What log contains Errors, Warnings, and Information that Windows generates? |
|
Definition
|
|
Term
| What is a command-line tool that analyzes the state of the DCs, tests functional area of Active Directory, Specifies DC, tests DNS Names and connectivity via IP, LDAP and RPC, and is a read-only tool? |
|
Definition
|
|
Term
| What utility removes metadata left behind by removed DCs, should be used by experience admins only and it is suggested that you do a backup prior to using? |
|
Definition
|
|
Term
| What is a command-line tool that assists administrators in diagnosing network and connectivity problems, does not require parameters, and fixes simple DNS problems with the /fix switch? |
|
Definition
|
|
Term
| What tools are used to monitor replication? |
|
Definition
- Windows Support Tools
- Dcdiag
- Repadmin
- Replmon
|
|
|
Term
| What is Replmon used for? |
|
Definition
- Check replication topology
- Force synchronization
- Generate status report to log file
- View Bridgehead servers
|
|
|
Term
| What are the four functions of user accounts? |
|
Definition
- A user object is an account that a user can log on with
- A user object is a placeholder for a collection of informational properties
- A user object is a security principal.
- The location of a user object in Active Directory dictates which group policies apply to the corresponding user
|
|
|
Term
| When would you disable an account? |
|
Definition
| To prevent the user from authenticating. |
|
|
Term
| When copying an account, such as a template, what properties from the Account tab are copied? |
|
Definition
| All properties except logon names. |
|
|
Term
| When you set the option "Account Expires" to Never, what are you doing to this account? |
|
Definition
| Allowing continuous access. |
|
|
Term
| Where are domain user accounts stored? |
|
Definition
| In Active Directory on the DC |
|
|
Term
| What three things does a user account consist of? |
|
Definition
- User name and password
- SID
- Access token
|
|
|
Term
| What are the restrictions for an account name? |
|
Definition
- 1-20 characters
- letters and numbers
|
|
|
Term
| What are the Account Options? |
|
Definition
- Logon hours
- Computers from which users can log on
- Account expiration
|
|
|
Term
| What tab contains first name, last name, display name, description, office location, telephone number(s), email address, home page, and additional web pages? |
|
Definition
|
|
Term
| What tab contains the user's street address, Post Office Box, City, State or Providence, Zip or Postal Code and Country or Region? |
|
Definition
|
|
Term
| What tab contains the user's logon name, logon hours, computers permitted to logon to, account options, and account expiration? |
|
Definition
|
|
Term
| What tab contains profile path, logon script path, home directory and share documents folder? |
|
Definition
|
|
Term
| What tab contains user's home, pager, mobile, fax, and IP telephone numbers and space for comments? |
|
Definition
|
|
Term
| What tab contains the user's Title, Department, Company, Manager, and Direct Reports? |
|
Definition
|
|
Term
| (T/F) A user account is a security principal. |
|
Definition
|
|
Term
| Specifically, where are local profiles stored? |
|
Definition
| %Systemdrive%\Documents and Settings\%Username% folder |
|
|
Term
| What are the purposes of using pre-configured profiles? |
|
Definition
- Provide a productive work environment with easy access to needed network resources and applications
- Remove access to unnecessary resources and applications
- Simplify help desk troubleshooting by enforcing a more straightforward and consistent desktop
|
|
|
Term
| Where are roaming profiles stored? |
|
Definition
| On a network share accessible to the user at logon |
|
|
Term
| What are the affects of roaming profiles on the network? |
|
Definition
| Server load and network traffic |
|
|
Term
| How do you make a profile mandatory? |
|
Definition
| Change the name of the profile's registry file from Ntuser.dat to Ntuser.man |
|
|
Term
| What is a collection of folders and data that stores the user's current desktop environment, application settings, and personal data? |
|
Definition
|
|
Term
| What are the advantages of a user profile? |
|
Definition
| Multiple users can log into the same computer |
|
|
Term
| What are the three profile types? |
|
Definition
|
|
Term
| (T/F) A mandatory profile is a read-only roaming profile. |
|
Definition
|
|
Term
| What are the four check boxes on the accounts tab? |
|
Definition
- Store Password Using Reversible Encryption
- Account is disabled
- Smart Card is Required for Interactive Logon
- Account is Trusted for Delegation
|
|
|
Term
| How does an account lockout occur? |
|
Definition
| When the user violates the policy |
|
|
Term
| Why must you be certain before deleting an account? |
|
Definition
| If you delete a user, then re-create it, it will have a new SID, so the new user has none of the memberships or permissions of the old user. |
|
|
Term
| Which tabs are available when selecting multiple accounts to modify? |
|
Definition
- General tab
- Account tab
- Address tab
- Profile tab
- Organization tab
|
|
|
Term
| Which properties tab is the most crucial? |
|
Definition
|
|
Term
| How do you unlock a user? |
|
Definition
| Active Directory, then user object properties, Account tab, uncheck box |
|
|
Term
| How do you reset a password for a user account? |
|
Definition
| Select "Reset Password" from Action menu in Active Directory, then enter new password twice and check the "User must change password at next logon" box. |
|
|
Term
| What are the two group types? |
|
Definition
|
|
Term
| What are the three group scopes? |
|
Definition
- Domain Local
- Global
- Universal
|
|
|
Term
| List the seven Special Identities. |
|
Definition
- Everyone
- Network
- Interactive
- Anonymous Logon
- Authenticated Users
- Creator Owner
- Dialup
|
|
|
Term
| Which Special Identity is not authenticated? |
|
Definition
|
|
Term
| What is the purpose of a distribution group? |
|
Definition
| Used by applications as lists for non-security related functions only. |
|
|
Term
| (T/F) Distribution groups can be used to assign permissions. |
|
Definition
|
|
Term
| What determines where in the network the group can be used to assign group permissions? |
|
Definition
|
|
Term
| What is the purpose of a Domain Local group and where can members be added from? |
|
Definition
- Used to assign permissions to resources
- Members can be added from any domain
|
|
|
Term
| What is the purpose of a Global group and where can members be added from? |
|
Definition
- Used to organize users who share similar network access requirements
- Members can be added ONLY from domain in which group is created
|
|
|
Term
| What is the purpose of a Universal group and where can members be added from? |
|
Definition
- Used to assign permissions to related resources in multiple domains
- Members can be added from any domain
|
|
|
Term
| Universal groups can only be created in which domain functional levels? |
|
Definition
- Windows 2000 mixed
- Windows 2003
|
|
|
Term
| What is the recommended level of group nesting? |
|
Definition
|
|
Term
| What is the command-line tool used to find groups? |
|
Definition
|
|
Term
| What special identity represents all current users, including guests and users from other domains? |
|
Definition
| Everyone special identity |
|
|
Term
| What special identity represents any user who is using network resources, but did not go through the authentication process? |
|
Definition
| Anonymous Logon special identity |
|
|
Term
| What special identity represents all users who are authenticated into the network. |
|
Definition
| Authenticated Users special identity |
|
|
Term
| What determines where in the network the group can be used to assign group permissions? |
|
Definition
|
|
Term
| What character is used to designate a "hidden" share? |
|
Definition
|
|
Term
| What are the five properties of a share that you can configure? |
|
Definition
- Share name
- Description
- User Limit
- Permissions
- Offline Settings
|
|
|
Term
| What does publishing a share do? |
|
Definition
| Creates an object in Active Directory representing the share, allowing Administrators to find the shared folder. |
|
|
Term
| What access does the Everyone Special Identity have on a newly created share? |
|
Definition
|
|
Term
| What console do you have to access in order to list all shares on a computer? |
|
Definition
| Computer Management Console |
|
|
Term
| What are the three share permissions? |
|
Definition
|
|
Term
| What are the five default administrative shares? |
|
Definition
- drives$
- ADMIN$
- IPC$
- PRINT$
- NETLOGON
|
|
|
Term
| What is the drives$ Administrative share? |
|
Definition
| Windows 2003 shares the root of each drive as a hidden share for administrative purposes |
|
|
Term
| What is the ADMIN$ Administrative share? |
|
Definition
| The systemroot folder on the system |
|
|
Term
| What is the IPC$ Administrative share? |
|
Definition
| Used to name pipes during remote administration |
|
|
Term
| What is the PRINT$ Administrative share? |
|
Definition
| Enables remote printer administration |
|
|
Term
| What is the NETLOGON Administrative share? |
|
Definition
| Used to support user logon, storing user logon scripts and profiles |
|
|
Term
| What are ways to connect to shared folders? |
|
Definition
- Map Network Drive wizard
- Add Network Place wizard
- Run command
- My Network Places
- Search Active Directory
|
|
|
Term
| For inheritance to work what two characteristics must be present? |
|
Definition
- The permission Allow Users to Read and Execute is specified to Apply to: This folder, subfolders, and files.
- When new objects are created and set by default to "Allow Inheritable Permissions from the Parent TO Propagate to This Object"
|
|
|
Term
| When would you want to override inheritance? |
|
Definition
| To modify permissions to provide additional access or restrict access to a user or group. |
|
|
Term
| What are effective permissions? |
|
Definition
| The resulting permissions when ACLs contain multiple user entries that have multiple group memberships |
|
|
Term
| Which takes precedence, Allow or Deny? |
|
Definition
|
|
Term
| Which takes precedence, file or folder? |
|
Definition
|
|
Term
| What allows permissions assigned at one folder to flow down to subsequent files and folders? |
|
Definition
|
|
Term
| What contains a list of all user accounts and groups that have been granted access for the file or folder as well as type of access granted. |
|
Definition
| ACL (Access Control List) |
|
|
Term
| (T/F) By default, subfolders and files inherit permissions that are assigned to their parent. |
|
Definition
|
|
Term
| How can you verify that permissions are inherited from the parent folder? |
|
Definition
| The check boxes under permissions are shaded |
|
|
Term
| (T/F) NTFS permissions are cumulative. |
|
Definition
|
|
Term
| What type of inheritance does Active Directory use for permissions? |
|
Definition
|
|
Term
| If an account has been deleted, recreating the account would be enough for the user to access resources again? |
|
Definition
|
|
Term
| Where would you go in order to determine what happened to a missing account? |
|
Definition
|
|
Term
| Where would you go to create a new account? |
|
Definition
| Active Directory Users and Computers |
|
|
Term
| What does a normal user need to access Active Directory Users and Computers through his/her account? |
|
Definition
|
|
Term
| In order for administrative permissions to take effect on a user account, what does the user have to do if he/she is already logged on? |
|
Definition
| Log off, then log back on |
|
|
Term
| What are the default permissions for a newly created share? |
|
Definition
- Administrators - Full Control
- Everyone - Read
|
|
|
Term
| How does Microsoft define an Event? |
|
Definition
| Any significant occurance in the OS or an application that requires users (particularly Administrators) to be notified. |
|
|
Term
| Name the six logs that could be present on a Domain Controller. |
|
Definition
- Application Log
- System Log
- Security Log
- Directory Service Log
- File Replication Service Log
- DNS Log
|
|
|
Term
| What does the System Monitor allow you to analyze? |
|
Definition
|
|
Term
| What provides quick information on applications and services currently running on your server? |
|
Definition
|
|
Term
| What part of Task Manager is the most useful and provides a list of running processes on the system and measures their performance in simple data? |
|
Definition
|
|
Term
| What log contains information about events generated by Windows 2003 components, such as services and device drivers? |
|
Definition
|
|
Term
| What log contains information about security-related events, such as failed logons, attempts to access protected resources and success or failure of audited events? |
|
Definition
|
|
Term
| What log contains information about specific programs running on the computer, as determined by application developer? |
|
Definition
|
|
Term
| What are the five event types? |
|
Definition
- Error
- Warning
- Information
- Success Audit
- Failure Audit
|
|
|
Term
| What event is a significant problem, such as loss of data or functionality and its icon? |
|
Definition
- Error
- Red circle with a white X
|
|
|
Term
| What event that might not be significant, but might indicate a future problem and its icon? |
|
Definition
- Warning
- Yellow triangle with black explanation point
|
|
|
Term
| What event describes the successful operation of an application, driver, or service and its icon? |
|
Definition
- Information
- White speech bubble with blue "i"
|
|
|
Term
| What event is an audited security access attempt that succeeds and its icon? |
|
Definition
|
|
Term
| What event is a significant problem, such as loss of data or functionality and its icon? |
|
Definition
|
|
Term
| What are the three log retention settings? |
|
Definition
- Overwrite events as needed
- Overwrite events older than X number of days
- Do not overwrite events (clear log manually)
|
|
|
Term
| What monitors conditions within local and remote computers anywhere in the network and summarizes performance at selected levels? |
|
Definition
|
|
Term
| What collects performance counter data in a comma or tab seperated format for easy import to spreadsheet or database programs? |
|
Definition
|
|
Term
| What are the two primary disk objects that contain counters in the system monitor? |
|
Definition
|
|
Term
| (T/F) Task manager is a real-time monitoring tool. |
|
Definition
|
|
Term
| If the user can print a job from another application on their computer, the error is most likely related to ____? |
|
Definition
|
|
Term
| If the user cannot print to the printer from any application and other users can print to printers on the network, the error is likely localized. |
|
Definition
|
|
Term
| You can confirm connectivity between the print client and the print server by ________. |
|
Definition
| Printers and Faxes folder |
|
|
Term
| An error opening the printer window while confirming connectivity between the client and the server would indicate a ________. |
|
Definition
| Potential networking, authentication, or security permissions problem |
|
|
Term
| What would you use in order to check that services required for the printer are working properly? |
|
Definition
| Services Microsoft Management Console |
|
|
Term
| What console enables you to start Windows Server 2003 into a command-line console where certain operations, such as replacing damaged files or disabling services are possible? |
|
Definition
|
|
Term
| How can you start the Recovery Console? |
|
Definition
| Boot using the Windows Server 2003 CD-ROM, then pressing "R" when prompted. |
|
|
Term
| What command would you use to install the Recovery Console? |
|
Definition
|
|
Term
| How much disk space is required for a Recovery Console installation? |
|
Definition
|
|
Term
| What administrator account is used by Recovery Console? |
|
Definition
| The Administrator account stored on the registry as Directory Services Restore Mode. |
|
|
Term
| What is the name of the native Windows Server 2003 backup utility? |
|
Definition
|
|
Term
| (T/F) You cannot schedule backups with Ntbackup. |
|
Definition
|
|
Term
| What are the two ways to open Ntbackup? |
|
Definition
- Start Menu, Accessories, System Tools
- Run, ntbackup.exe
|
|
|
Term
| What do you need to do in order to use the standard utility rather than the wizard? |
|
Definition
| Clear the "Always start in wizard mode" check box, then click Advanced Mode. |
|
|
Term
| Can you backup network volumes using the Ntbackup utility? |
|
Definition
|
|
Term
| What is the data to be backed up? |
|
Definition
|
|
Term
| What can be considered a backup target? |
|
Definition
- Single file or folder
- Entire drive
- Entire system
- Another system on the network
|
|
|
Term
| What are the five backup types? |
|
Definition
- Normal (Full)
- Copy
- Differential
- Incremental
- Daily
|
|
|
Term
| What backups DO NOT clear the archive bit? |
|
Definition
|
|
Term
| What is the difference between Normal and Copy? |
|
Definition
| Normal clears archive bit, Copy does not. |
|
|
Term
| Which is fastest to backup, Incremental or Differential? |
|
Definition
|
|
Term
| Which is fastest to restore, Incremental or Differential? |
|
Definition
|
|
Term
| How do backup with removable media? |
|
Definition
- Must be attached
- Must be listed on the Windows 2003 HCL (Hardware Compatability List)
|
|
|
Term
| Where is the System State backed up? |
|
Definition
| Local Computer (not remote) |
|
|
Term
| What data is backed up with a Normal Backup and what is the archive bit status? |
|
Definition
- All selected data
- Clears archive bit
|
|
|
Term
| What data is backed up with a Incremental Backup and what is the archive bit status? |
|
Definition
- All files that have been modified or created since the last full or incremental.
- Clears archive bit
|
|
|
Term
| What data is backed up with a Differential Backup and what is the archive bit status? |
|
Definition
- All files that have been modified or created since the last full or incremental.
- Does not clear archive bit
|
|
|
Term
| What are the two ways you can add a DHCP server? |
|
Definition
- Windows Component Wizard
- Manage Your Server
|
|
|
Term
| How can you verify that the DHCP server service has been properly installed on your computer? |
|
Definition
| Opening the DHCP Console admin tool |
|
|
Term
| When do you need to authorize a DHCP server? |
|
Definition
| When it is integrated into an Active Directory network. |
|
|
Term
|
Definition
| Stand-alone DHCP servers implemented together with Authorized servers. |
|
|
Term
|
Definition
| A pool of IP addresses within a logical subnet that the DHCP server can assign to clients. |
|
|
Term
| What is the DHCP install process? |
|
Definition
- Install Windows Server 2003 DHCP server service software
- Authorize the server in Active Directory
- Create one or more scopes
- Configure DHCP options
- Activate the scope or scopes
|
|
|
Term
| How many scopes can you create per subnet on a single DHCP server? |
|
Definition
|
|
Term
| What is an ip address within a defined scope that is offered to a client? |
|
Definition
|
|
Term
| How do you create new scopes? |
|
Definition
|
|
Term
| How are leases renewed periodically? |
|
Definition
- At 50% of lease time
- Restarting
- Ipconfing /renew
|
|
|
Term
| What is a set of one or more IP addresses, included within the range of a defined scope that you do not want to lease to clients? |
|
Definition
|
|
Term
| What transport protocol is used by DHCP? |
|
Definition
|
|
Term
| What port does DHCP use for the Server Side? |
|
Definition
|
|
Term
| What port does DHCP use for the Client Side? |
|
Definition
|
|
Term
|
Definition
| Rule for balancing scope distribution of addresses where multiple DHCP servers are used to service the same scope. |
|
|
Term
| What are the levels you can configure DHCP options? |
|
Definition
- Reservation level
- Scope level
- Server level
|
|
|
Term
| (T/F) Options set at the reservation level override all others. |
|
Definition
|
|
Term
| What allows you to automatically assign IP addresses, subnet masks, and other configuration information that client computers on a local network? |
|
Definition
|
|
Term
| What command would you use in order to get basic host computer configuration information? |
|
Definition
|
|
Term
| What graphical troubleshooting tool is built into Windows Server 2003 to provide detailed information about the local computer's networking configuration? |
|
Definition
|
|
Term
| What command would display the IP address, subnet mask, and default gateway of a specific computer? |
|
Definition
|
|
Term
| What are the three default categories that Network Diagnostics collects information about? |
|
Definition
- Internet service category
- Computer information category
- Modems and network category
|
|
|
Term
| You can use the ___________ command to query DNS to confirm that DNS is working properly and that MX and A records exist for a particular SMTP domain. |
|
Definition
|
|
Term
| What is a command-line utility used to isolate networking and connectivity problems by performing a series of tests to determine the state of your server? |
|
Definition
|
|
Term
| What utility used the ICMP ECHO commands to test IP connectivity? |
|
Definition
|
|
Term
| What utility resolves names to IP addresses? |
|
Definition
|
|
Term
| What utility can you use to display protocol statistics and current TCP/IP connections? |
|
Definition
|
|
Term
| What utility can you use to determine the path that an IP datagram takes to reach a destination? |
|
Definition
|
|
Term
| What utility is a route-tracing tool that combines the features of ping and tracert and gives additional information that neither of those tools provide? |
|
Definition
|
|
Term
What are the default values for the following:
- hops:
- wait time before timeout:
- period:
- number of queries
|
|
Definition
- 30 hops
- 3 seconds
- 250 milliseconds
- 100
|
|
|
Term
| What is the loopback address used for troubleshooting? |
|
Definition
|
|
Term
| What is one of the first signs of a DHCP failure? |
|
Definition
| When a client loses connectivity to network resources or when a new client cannot establish connectivity in the first place. |
|
|
Term
| When troubleshooting, how can you determine if a client has received and address lease from the server? |
|
Definition
|
|
Term
| Where would you go to learn about an address conflict between two computers? |
|
Definition
| System Log in event viewer |
|
|
Term
| What command would you use to determine if the client obtained an address from a server? |
|
Definition
|
|
Term
| When you detect that the DHCP database information is missing or inconsistent, what can you do in order to resolve this problem? |
|
Definition
| Reconcile DHCP data for any or all scopes. |
|
|
Term
|
Definition
|
|
Term
| What command do you use to renew lease? |
|
Definition
|
|
Term
| What utility do you use to locate rogue servers on a network? |
|
Definition
|
|
Term
| What are the two entries when reconciling? |
|
Definition
|
|
Term
| When verifying scope configuration, what should you verify first? |
|
Definition
|
|
Term
| (T/F) DNS provides a standard both for naming hosts and for locating IP hosts specified by name. |
|
Definition
|
|
Term
| (T/F) The DNS namespace is not based on a hierarchial and logical tree structure. |
|
Definition
|
|
Term
| What are the three types of top-level domains? |
|
Definition
- Organizational
- Geographical
- Reverse
|
|
|
Term
| Give two examples of organizational domains. |
|
Definition
|
|
Term
| (T/F) Within a private namespace you can name and create your own root server or servers and as many subdomains as required. |
|
Definition
|
|
Term
| Can private names be resolved on the Internet? |
|
Definition
|
|
Term
| (T/F) Every node in the DNS domain tree can be identified by a FQDN. |
|
Definition
|
|
Term
| What is a DNS namespace based on a set of private root servers? |
|
Definition
|
|
Term
| What can provide requested information, point to another server that can help resolve the query, or respond that the information is not available? |
|
Definition
|
|
Term
| (T/F) A DSN server is authoritative for a zone if it hosts the zone. |
|
Definition
|
|
Term
| What is a contiguous portion of a network for which the server is authoritative? |
|
Definition
|
|
Term
| What is a service that used DNS protocol to query for information from DNS servers? |
|
Definition
|
|
Term
| What are DNS database entries that are used to answer DNS queries? |
|
Definition
|
|
Term
| When is the DNS cache cleared? |
|
Definition
| When the service is stopped |
|
|
Term
| What are three ways that queries work? |
|
Definition
- Referring to cache
- Recursion
- Iteration
|
|
|
Term
|
Definition
| Occurs when DNS server queries othe DNS servers, receives the answer, then sends back to client. |
|
|
Term
|
Definition
| Where a DNS client attempts to contact additional servers to resolve a name |
|
|
Term
| What does the DNS server properties dialog box allow you to do? |
|
Definition
| Allows you to configure settings that apply to the DNS server and all its hoste zones. |
|
|
Term
| Name the eight tabs contained in the properties dialog box from the DNS server. |
|
Definition
- Interfaces
- Forwarders
- Advanced
- Root Hints
- Debug Logging
- Events Logging
- Monitoring
- Security
|
|
|
Term
| What tab contains a copy of the information found in the WINDOWS\System32\Dns\Cache.dns file? |
|
Definition
|
|
Term
| What tab allows you to restrict the events written to the DNS Events log file to only errors or to errors and warnings? |
|
Definition
|
|
Term
| What tab is available only when the DNS server is also a domain controller? |
|
Definition
|
|
Term
| What DNS server properties tab allows you to specify which of the local computers IP addresses the DNS server should listen to for DNS requests? |
|
Definition
|
|
Term
| What DNS server properties tab allows you to forward queries received by local DNS server to upstream DNS servers, called forwarders? |
|
Definition
|
|
Term
| What DNS server properties tab allows you to enable, disable, and configure certain DNS server options and features, such as recursion, round robin, auto scavenging, and netmask ordering? |
|
Definition
|
|
Term
| What DNS server properties tab allows you to troubleshoot the DNS server by logging the packets it sends and receives? |
|
Definition
|
|
Term
| What DNS server properties tab allows you to test basic functionality with two simple tests? |
|
Definition
|
|
Term
| What are the two simple tests the Monitoring tab allows you to perform? |
|
Definition
- Simple query against local DNS server itself
- Recursive query to the root DNS servers
|
|
|
Term
| What DNS server properties tab allows you to control which users are granted permissions to view, configure, and modify the DNS server and its zones? |
|
Definition
|
|
Term
| Name the three major network security protocols used in a Windows Server 2003 network. |
|
Definition
|
|
Term
| What security protocol would you use for Authentication (prove you are who you say you are)? |
|
Definition
|
|
Term
| What are Network Security protocols used for? |
|
Definition
| To manage and secure authentication, authorization, confidentiality, integrity and nonrepudiation. |
|
|
Term
| How can you load the Securiy Templates snap-in? |
|
Definition
|
|
Term
| By default, several templates are available; can you as the network administrator add more templates in case you need them? |
|
Definition
|
|
Term
| (T/F) You can think of IPSec policies as a collection of packet filters that does not enforce security policy on IP traffic. |
|
Definition
|
|
Term
| If traffic leaving or arriving at the device on which the policy is active matches one of the filters, the traffic is either _______, ________ or ________. |
|
Definition
| blocked, allowed, or negotiated |
|
|
Term
| How are filters defined in an IPSec policy? |
|
Definition
|
|
Term
|
Definition
| The process that determines which IPSec subprotocol will be used, and what specifics, such as key strength and cryptographic algorithms, will be used. |
|
|
Term
| (T/F) When an IPSec policy is Assigned and the IPSec service is running each network communication, only the incoming policies are evaluated to see whether they meet the conditions specified in the IPSec policy. |
|
Definition
|
|
Term
| When you are troubleshooting Kerberos and you have not rebooted the server, what are two important steps you have to perform at the beginning of the process? |
|
Definition
| Purge the Kerberos ticket cache and log on again. |
|
|
Term
| If you are troubleshooting Kerberos and you are going to shutdown the server, what important step do you have to perform before you reboot? |
|
Definition
| Start the network capture on the domain controller. |
|
|
Term
| What is a good practice in order to have less data to look through the logs while you are troubleshooting? |
|
Definition
| Save them, and then you can evaluate them on a different computer. |
|
|
Term
| When troubleshooting an IPSec policy, what tool would you use to verify the current active policy? |
|
Definition
|
|
Term
| When looking for confirmation that the policy is assigned and that its parameters are correct, what command would you use? |
|
Definition
| Netsh Ipsec Static Show All |
|
|
Term
| What are the five Security Paradigms? |
|
Definition
- Authentication
- Authorization
- Confidentiality
- Integrity
- Nonrepudiation
|
|
|
Term
| What security paradigm is used to determine what you can do on network after authentication and what protocols are used? |
|
Definition
- Authorization
- Kerberos and NTLM
|
|
|
Term
| What security paradigm is used to keep data secret and what protocols are used? |
|
Definition
- Confidentiality
- Encryption components of Kerberos, NTLM and IPSec
|
|
|
Term
| What security paradigm is used to ensure data received is the same as data sent, and what protocols are used? |
|
Definition
- Integrity
- Kerberos, NTLM, and IPSec
|
|
|
Term
| What security paradigm is used to determine exactly who sent and received the message, and what protocols are used? |
|
Definition
- Nonrepudiation
- Kerberos and IPSec
|
|
|
Term
| What is the Principle of Least Privilege? |
|
Definition
| No one, including system administrators and IT works, should not have any more access or rights than they need to do their job. |
|
|
Term
| What is being used for authentication when drives are mapped using server IP address instead of computer name? |
|
Definition
|
|
Term
|
Definition
| A software-based traffic analysis tool that allows a user to caputure frames, display and filter captured frames, and edit captured frames. |
|
|
Term
| What tool would you use to diagnose hardware and software problems when the server cannot communicate with other computers? |
|
Definition
|
|
Term
| What are the two available versions of Network Monitor? |
|
Definition
- Basic version
- Full version
|
|
|
Term
| Network Monitor is composed of one administrative tool and one agent, what are the names of those components? |
|
Definition
- Administrative tool - Network Monitor
- Agent - Network Monitor driver
|
|
|
Term
| How can you start capturing data in Network Monitor? |
|
Definition
| In Network Monitor, from Capture menu, select Start. |
|
|
Term
| Network Monitor creates a memory-mapped file for its capture buffer. What is the size limit? |
|
Definition
| It is limited only to the amount of memory you have. |
|
|
Term
| (T/F) You can run Network Monitor in the background to reduce the amount of system resources necessary to operate the program. |
|
Definition
|
|
Term
| (T/F) Network Monitor is installed by default. |
|
Definition
|
|
Term
| How do you install Network Monitor? |
|
Definition
| Add/Remove Programs in Control Panel |
|
|
Term
| What feature does Network Monitor used to copy all frames to its capture buffer? |
|
Definition
| NDIS (Network Driver Interface Specification) |
|
|
Term
| What are the two forms that a service can run requiring little or none user interaction? |
|
Definition
|
|
Term
| What steps do you have to follow to see the current services installed on a specific server? |
|
Definition
| Start Menu, right-click My Computer, Select Manage, select Services. |
|
|
Term
| A service can be in one of three states, name all three. |
|
Definition
|
|
Term
| What are the three possible methods to configure a service for starting? |
|
Definition
- Automatic
- Manual
- Disabled
|
|
|
Term
| What is a service dependency? |
|
Definition
| Some services depend on other services in order to start. |
|
|
Term
| What are the four Service recovery options? |
|
Definition
- Take no action
- Restart the service
- Run a program
- Restart the computer
|
|
|
Term
| When using _______, you are creating a connection to a server's console. |
|
Definition
| Remote Desktop for Administration |
|
|
Term
| Domain controllers will only allow connections via Remote Desktop to ________. |
|
Definition
|
|
Term
| (T/F) You must configure the domain controller security policy to allow connections for all other remote user connections -non-administrator accounts. |
|
Definition
|
|
Term
| (T/F) Errors in standard TCP/IP networking can cause a Remote Desktop connection to fail or be interrupted. |
|
Definition
|
|
Term
| (T/F) Users must belong to the Administrative or Remote Desktop Users group to successfully connect to the server using Remote Desktop for Administration. |
|
Definition
|
|
Term
| Where can Global group members come from and what can they access? |
|
Definition
- Only from local domain
- access resources in any domain
|
|
|
Term
| Where can Domain Local group members come from and what can they access? |
|
Definition
- From any domain
- Access resources only in local domain
|
|
|
Term
| Where can Universal group members come from and what can they access? |
|
Definition
- From any domain
- Access resources in any domain
|
|
|
Term
| (T/F) A group type and group scope must be selected when created. |
|
Definition
|
|
Term
| What do group scopes allow groups to do? |
|
Definition
| To be used in different ways to assign permissions. |
|
|
Term
| What does a group scope determine? |
|
Definition
| Where in the network the group can be used to assign group permissions. |
|
|
Term
| What is the purpose of a Global group? |
|
Definition
| To organize users who share similar network access requirements. |
|
|
Term
| What is the purpose of a Domain Local group? |
|
Definition
| Used to assign permissions to resources. |
|
|
Term
| What is the purpose of a Universal group? |
|
Definition
| Used to assign permissions to related resources in multiple domains. |
|
|
Term
| When planning your OUs, what are the aspects you should keep in mind? |
|
Definition
- OUs are purely logical entities
- OUs are for delegation of administration
- OUs are for Group Policy
- OUs are for controlling object visibility
- OUs are easy to reorganize
- Each OU should have a specific need and purpose to exist
- No limit on how deep a OU tree is
- OUs are mainly administrative units
|
|
|
Term
| What are three typical scenarios for an OU organization? |
|
Definition
- Geographical
- Object types
- Organization
|
|
|
Term
| (T/F) A network is a static entity. |
|
Definition
|
|
Term
| What does implementation of an OU structure require first? |
|
Definition
| That the administrator has the correct permission to create new OUs. |
|
|
Term
| Members of what groups have the authority to create new OUs in a domain? |
|
Definition
- Domain Admins
- Enterprise Admins
|
|
|
Term
| (T/F) Users can be delegated the appropriate permissions to create OUs. |
|
Definition
|
|
Term
| Where do you create the OU structure? |
|
Definition
| Active Directory Users and Computers console |
|
|
Term
| (T/F) Group Policy gives administrators an efficient and pervasive tool to manage logon scripts, security settings such as password policies and user interface restricitions. |
|
Definition
|
|
Term
| (T/F) A computer's settings are processed when the computer logs off and at periodic intervals afterward. |
|
Definition
|
|
Term
| What are the two GPOs created by default, when you install a new Active Directory domain? |
|
Definition
- Default Domain Policy
- Default Domain Controllers Policy
|
|
|
Term
| (T/F) By default, group policies are processed synchronously for Windows 2003, which means that computer policy is completed before the Ctrl+Alt+Delete dialog box is presented, and user policy is completed before the shell becomes active so that the user can start using it. |
|
Definition
|
|
Term
| (T/F) You can link GPOs to sites, domains and OUs. |
|
Definition
|
|
Term
| By default, a GPO named the _______ is linked at the domain level and is typically used to configure account policies for all domain users. |
|
Definition
|
|
Term
| (T/F) When you link a GPO to a site, it affects computers and users based on the IP address of the computer. |
|
Definition
|
|
Term
| (T/F) Group Policy facilitates both centralized and decentralized management of machine and user settings. |
|
Definition
|
|
Term
| What are the two categories of Group Policy settings? |
|
Definition
|
|
Term
| What are the two components of Group Policy? |
|
Definition
|
|
Term
| What enables administrators to centralize the configuration of users' Internet Explorer (IE) browsers, such as the content of Favorites or proxy or security zone settings? |
|
Definition
| Internet Explorer Maintenance |
|
|
Term
| What file is contained in the Group Policy template that contains only the version number? |
|
Definition
|
|
Term
| What are the four ways to alter inheritance? |
|
Definition
- Enforce (No override)
- Block Policy inheritance
- Security Filtering
- WMI Filters
|
|
|
Term
| If you move a computer object to a new OU, how long will Group Policy to take effect? |
|
Definition
|
|
Term
| What do you use to create Group Policy and edit Group Policy? |
|
Definition
- Create - GPMC
- Edit - GPedit
|
|
|
Term
| What is used to filter GPOs? |
|
Definition
|
|
Term
| What is used to manage administative template files? |
|
Definition
|
|
Term
| You must be a member of what group(s) to create GPOs. |
|
Definition
- Administrators
- Group Policy Creator Owners
|
|
|
Term
| What is a collection of user and computer configuration settings that can be linked to computers, sites, domains and OUs to specify the behavior of a users' desktop? |
|
Definition
|
|
Term
| Computer Registry configurations are found where? |
|
Definition
| HKLM (HKEY_LOCAL_MACHINE) |
|
|
Term
| User Registry configurations are found where? |
|
Definition
|
|
Term
| What are the common performance issues with GPOs? |
|
Definition
- Too many settings in a single GPO
- Too many GPOs
- Slow links
- Too many scripts
- Software installation
|
|
|
Term
| (T/F) Local GPOs can be overridden by non-local GPOs. |
|
Definition
|
|
Term
| In what order are GPOs processed? |
|
Definition
|
|
Term
| What type of processing allows each process to finish before another one begins and must finish before desktop is displayed? |
|
Definition
|
|
Term
| What type of processing allows multiple processes to run at the same time, has faster access to the desktop, and may have access to unauthorized settings? |
|
Definition
|
|
Term
| By default, how are policies ran in order to optimize logon? |
|
Definition
|
|
Term
| What command is used to refresh both computer and user Group Policies? |
|
Definition
|
|
Term
| What GPOs are linked to sites? |
|
Definition
|
|
Term
| What GPOs are linked to domains? |
|
Definition
- Account policies
- Legal notice
- Screensaver
- Scripts
- Security settings
- Software installation
- Internet Explorer
- GPO Processing
|
|
|
Term
| By default, what is the Domain Controller for Group Policy options? |
|
Definition
|
|
Term
| What are the two types of scripts? |
|
Definition
- Logon/Logoff
- Startup/Shutdown
|
|
|
Term
| What allows a security administrator to manually configure security levels assigned to a local or nonlocal GPO? |
|
Definition
|
|
Term
| How does Software Installation work through Group Policy? |
|
Definition
- Access Software Installation in Group Policy, decide to deploy to computer or user
- Right-click Software Installation and choose New, Package
- Type path to network share where file is located, or browse to it
- Click open
- Select Published, or Assigned to deploy without modifications, select Advanced too make modifications.
|
|
|
Term
| What is included in an installation package? |
|
Definition
| A new setup method to standardize the setup process. |
|
|
Term
| When deploying, you need a distribution point on your network for making the package available to users and computers. What should be this install location? |
|
Definition
|
|
Term
| (T/F) Once assigned, the install location can be changed in the GPO without redeploying the application. |
|
Definition
|
|
Term
| (T/F) One key limitation is that group policy can be used to distribute software only to computers running Windows 2000 and XP Professional. |
|
Definition
|
|
Term
| What are the three ways that an application can advertise itself? |
|
Definition
- Shortcuts
- File Association
- COM components
|
|
|
Term
| If you are publishing an application, when is the software available for installation? |
|
Definition
| When the next user to whom the GPO applies logs on. |
|
|
Term
| When you assign an application to a user, who starts the installation? |
|
Definition
| User, or if "Install this application at logon" is checked, the setup is automatic. |
|
|
Term
| When you assign an application to a computer, who starts the installation? |
|
Definition
| Automatic when the computer starts. |
|
|
Term
| What are the three areas within Group Policy that handle Active Directory Security? |
|
Definition
- Security Settings
- Auditing and Security Logging
- Security Configuration and Analysis
|
|
|
Term
| When setting account policies in Active Directory, how many account policies per domain can be applied? |
|
Definition
|
|
Term
| The policies in the _______ security area pertain to the security settings on the computer used by an application or user in the site, domain, or OU to which the GPO is linked. |
|
Definition
|
|
Term
| What is a software management feature of Windows 2003 that is an administrators primary tool for managing software within an organization? |
|
Definition
| Software Installation Extension |
|
|
Term
| How is an application assigned to a user advertised? |
|
Definition
| The next time he/she logs in regardless of which computer. |
|
|
Term
| What is a service that allows OS to manage the installation process? |
|
Definition
|
|
Term
| What are the three key parts to Windows Installer? |
|
Definition
|
|
Term
| (T/F) Installation options affect how an application is installed, managed, and removed. |
|
Definition
|
|
Term
| What security area provides an important new security feature that acts as a governor for group membership? |
|
Definition
|
|
Term
| What security area is used to configure security and startup settings for services running on a computer? |
|
Definition
|
|
Term
| (T/F) System services used on a computer should not be tracked. |
|
Definition
|
|
Term
| (T/F) Unnecessary or unused services should be set to manual. |
|
Definition
|
|
Term
| What attributes does the Event Log security area define in relation to the application, security and system event logs? |
|
Definition
- Max log size
- Access rights for each log
- Retention settings and methods
|
|
|
Term
| Can you manage individual settings using the GPMC? |
|
Definition
|
|
Term
| Name one of the new functions that GPMC introduces. |
|
Definition
- Reporting
- Backup and Restore for individual GPOs
- Scripting GPO management tasks
|
|
|
Term
| (T/F) GPMC helps you learn and understand Group Policy architecture better because of its intuitive user interface. |
|
Definition
|
|
Term
| (T/F) GPMC makes it harder to deploy, manage and troubleshoot Group Policy. |
|
Definition
|
|
Term
| (T/F) GPMC is one of the Windows Server 2003 Feature Packs. |
|
Definition
|
|
Term
| What OS must be running in the computer intwo which you want to install GPMC? |
|
Definition
- Windows Server 2003
- Windows XP with SP1 and .NET Framework
|
|
|
Term
| You can run the GPMC from the _____ menu. |
|
Definition
|
|
Term
| Name the two top-levels on the left pane of the GPMC. |
|
Definition
- Group Policy Management
- Forest
|
|
|
Term
| What node provides you with access to the Group Policy Modeling Wizard, which helps you plan policy deployment and simulate settings for testing purposes? |
|
Definition
|
|
Term
| What node provides access to the Group Policy Results Wizard? |
|
Definition
|
|
Term
| (T/F) Sites are hidden by default. |
|
Definition
|
|
Term
| What are the four nodes listed under the Forest in GPMC? |
|
Definition
- Domains
- Sites
- Group Policy Modeling
- Group Policy results
|
|
|
Term
| (T/F) Group Policy Management helps plan policy deployment and simulate settings for testing purposes. |
|
Definition
|
|
Term
| What groups together all of the Group Policy Management functionality except managing individual settings? |
|
Definition
|
|