ГлавнаяРейтингиЧемпионатыРегистрацияТусовкаФорум Поиск

 Вы можете создать собственный тест и разместить на своем сайте

Тест: Implementing and Supporting Microsoft Windows NT Server 4.0 - User Groups & Security

Описание теста:
Implementing and Supporting Microsoft Windows NT Server 4.0 - User Groups & Security
Пройти тест >>


Your new server is going to contain the home directories for all the users in your domain. Under User Manager for Domains, which environment variable will simplify the task of setting up the home directories?

How many different types of groups does NT Support?

Point to Point Tunneling Protocol is a protocol which is widely used to set up Virtual Private Networks. Which of the following is the best description of what a VPN is.

Which of the following is the best description of a "Subject"

Your company has two single domains named CORP and FINANCE. The president of the company logs into the CORP domain as John. He and two other VP's are members of the CORPS managers global group. John needs to read permissions for the salary directory in the FINANCE domain. The account mangers local group in the FINANCE domain has change permission for the salary directory. How should you plan your network so John has the required access, keeping in mind that one else should have access to the salary directory?

You want to allow users that logon to an NT Workstation computer that is not a member of the domain to access resources on a server in your Marketing domain. You create a duplicate user account in the Marketing domain for each NT workstation user account the requires the access to the resource. What else will you have to do?

Suppose BillG is logged on to a Windows NT domain with the password Yippee. He wants to connect to the shared directory \\Products, where his password is Hooray. What will happen when he tries to connect?

You have a local group called LaserP_Users. Only users who need access to a specific color laser are members. How could you make sure that your users could only manage their own print jobs but still be able to view all the jobs sent to this printer?

You have installed NT Server using the default configuration. Later you install Network Monitor Tool and Agent. You have saved sets of captured data, so where are they located on your hard drive?

You want to make sure that you're enforcing one system policy for all the NT Workstation in your domain. Where should you store the ntconfig.pol file so you make sure each user's local policies are automatically modified when they log on?

Which one of the following is not a default NT group ?

Which of the following is not an advantage for maintaining a secure network under the domain structure?

Barney needs to access a file from a shared folder called DATA in a trusting domain. The Domain Users group of the trusted domain has Change permission to the file and the file resides on an NTFS partition. Barney's user account only has Read permission for the DATA share. The Domain Users group for the trusted Domain has Full Control for the Share. If Barney logs on remotely what will be his level of access?

In each domain controller in the resource domain, the existence of the trust relationship is represented by an LSA trusted-domain object. The object contains the name of the trusted domain and the domain security identifier (SID). The password associated with the trust link is stored in a LSA secret object, which is stored in which registry key.

Other then LMHOSTS files what is another way to reduce NetBIOS broadcast traffic?

John is a member of the Domain Users, Accounting and Marketing Groups. Permissions on a private shared directory are access with shared permission having no name of the owner. The domain users have read, Accounting has change and Marketing has no access. Users1 have full control and Users3 have full control. Which permission is applied to John for the private shared directory?

You need to make sure that your users can't modify the profiles you create for them. You have gone in and created a new user account and made all the modification to the user profile. After copying the new template to each users profile directory what else do you need to implement the profiles correctly?

You have made a system policy of custom setting and restrictions for three different global groups in your domain. Several of the user accounts however are members of more then one of the groups. How can you control the conflicting settings in the group.

You have created new group policies on your NT Workstation and want to merger them with the existing policy file ntconfig.pol on your Primary Domain Controller. How do you do it?

Your LAN has 2 domains. Sales and Corps. Sales trusts Corps and all the user accounts are in the Corps domain. You want to allow users to backup home directories that are on an NTFS partition of a member server in the Sales Domain. How do you set it up?

Where would you set a users home directory path?

What would you use to host the following services: Web, FTP and Gopher on a private TCP/IP based network or over the Internet?

You have a user named Terry and she needs to access a file on a shared directory in the Sales domain. Terry's computer is in the Marketing domain and is a member of the Managers Global Group. The Sales Domain trusts the Marketing domain and the guest account is disabled on both domains. What should you do to enable Terry and all the members of the Manager's group to access the file?

You are going to migrate NetWare user accounts to your NT Server. You know that some user accounts are duplicated on the NetWare Servers and that there are also matching NT accounts. What should you do to insure correct migration of user account into the new NT environment?

You have set up separate user profiles and directories for all the users in your domain. What must you do to allow users to start using the new profiles?

You want to log changes that are made to the domain directory database. Which option should you select in the audit policy dialog box? Note: Your domain architecture consists of one PDC 3 BDCs and 3 Member Servers.

One of your users has quit the company. Why is it a good idea to temporarily disable their account as opposed to deleting it?

You have forgotten the Administrators password for the NT File and Print Server in your department. What is one thing you can do to fix the situation.

Your NT Server network provides resources to 200 clients. The biggest percentage of them are help desk support personnel who are continuously access a shared Microsoft Access database. What should you do to optimize the Server?

Your Domain has one PDC and three BDC. It is serving about 8,000 client computers. The PDC is also a WIN Server and is used in the Authentication process. How should you optimize the PDC by using the server dialog box.

John is connecting to a Backup Domain Controller that has his user account. The BDC however fails to authenticate the user’s password. What is the most likely reason why this is happening?

Which of the following is not an object’s security descriptor.

You want to start monitoring the maintenance activities of the employee that administrators your MARKETING domain. Which events are you going to audit?

You have logged in as an Administrator and used User Manger for Domains to enable File and object auditing. What other condition has to be met before you can pull this off?

You have installed a printer for your newly formed legal department. They will be printing very sensitive document to it and are the only department allowed to use this printer. You need to make sure only the legal department has access to the print device and that no one can modify print jobs that are waiting to be printed, even administrators. How are you going to set it up?

You log onto the Corporate domain from an NT Workstation in the Sales domain. Because the Sales domain trusts the Corporate domain what resources will you be able to access?

You want to make sure that when you're using Network Monitor you only work with packets sent from a specific client on the network. All machines are using TCP/IP with DHCP and WIN. How do you setup Network Monitor?

You have hired an assistant to help you manager your growing network. They are going to have to set system audit policies for all the users and groups in your domain. What is the best way to enable the new assistant the ability to do that?

Here is your one and only question about "C2". What the heck is a C2 rating?

Tom is an administrator of a NT Workstation computer. He wants his computer to join with the domain although Tom does not have a domain account. Now the domain administrator can add Tom's computer to the domain which would allow Tom to join. How else can this be accomplished?

You have created a special payroll folder on a member server in the FINANCE domain. You have set up the correct local and global groups and have even assigned the appropriate rights. You would still like to know who tries to access the folder. Which event should you audit?

The law firm you work for has asked you to develop a network security scheme for the company. REQUIRED RESULTS: All the lawyers at your firm need to have remote access to the network and you need to prevent everyone who isn't a lawyer from access the network. OPTIONAL RESULTS: Implement a method to protect passwords as they are transmitted. Also implement a method to protect data while it is transmitted. PROPOSED SOLUTION: Require passwords to be minimum length of 8 characters for all users and force them to be changed every 30 days. Install RAS on one NT Server and configure it to allow access to only the lawyers. Configure RAS to allow any authentication . Install hardware base security host between the RAS server and the Modems. Which result does this produce?

The engineering firm you work for deals in government contracts so bidding and privacy is very important. You are charged with setting up a secure network configuration. REQUIRED RESULTS: All the engineers need to have remote access to the network and you also need to prevent other employees from access remotely. OPTIONAL RESULTS: You have to protect passwords while they are transmitted and you also need to protect data while it is transmitted. PROPOSED SOLUTION: Require passwords with a minimum length of 8 characters for all users and force them to be changed every 30 days. Install RAS on one NT Server and configure it to allow access to only engineers. Configure RAS to allow only Microsoft Authentication (MS-CHAPS). Install hardware based security host between the RAS server and the Modems. Which result did the purpose solution produce?

You are charged with coming up with a backup plan for your companies LAN. It consists of 3 domains Sales, Research and Manufacturing. Each domain has 1 PDC and 2 BDC and several hundred workstations each. The trusts are set up so Manufacturing trusts Sales and Research trusts Sales. REQUIRED RESULTS: Create a group named Sales Backup which has rights to backup all domain controllers in all 3 domains. OPTIONAL RESULTS: Ensure that the Sales Backup group has rights to back up member or servers in all 3 domains also ensure that the Sales Backup group has right to backup all NT Workstation. PURPOSED SOLUTION: Create a global group named Sales Backup. Create local groups named Research Backup, Manufacturing backup and sales backup. Assign each group backup files and directory rights and the restore files and directories rights in their respective domains. Make the Global Sales Backup group a member of each of the local backup groups. Also make the Global Sales Backup group a member of the backup operations group on all member servers and workstation computers

You are charged with coming up with a backup plan for your companies LAN. It consists of 3 domains Sales, Research and Manufacturing. Each domain has 1 PDC and 2 BDC and several hundred workstations each. The trusts are set up so Manufacturing trusts Sales and Research trusts Sales. REQUIRED RESULTS: Create a group named Sales Backup which has rights to backup all domain controllers in all 3 domains. OPTIONAL RESULTS: Ensure that the Sales Backup group has rights to back up member servers in all 3 domains also ensure that the Sales Backup group has right to backup all NT Workstation. PURPOSED SOLUTION: Create a global group named Sales Backup. Create local groups named Research Backup, Manufacturing backup and Sales backup. Assign each group backup files and directory rights and t4he restore files and directories rights in their respective domains. Make the Global Sales Backup group a member of each of the local backup groups.

Your NT Server LAN consists of two domains. CORP and SALES. CORP domain is the master domain and SALES trust CORPS. Mary is part of the budget global group in the CORP domain. Bob in the SALES domain shares the Budget folder and you're using NTFS permissions and assign the CORP Budget Global group read permission to the Budget folder. Mary gets the access denied message when she tries to open the Budget folder. Why?

You have a large domain consisting of 4 other domains. You need to allow users that are adding new NT Workstations the ability to join the domain without needing any configuration or information for the Administrator. How do you set it up?

You work for an insurance agency and the agents want to dial into the companies NT network using their NT Workstations and RAS client software. The information they will be accessing is sensitive and confidential. You need to secure against wiretapping. REQUIRED RESULTS Agents must be able to access your network using RAS and all data transmitted must be encrypted. OPTIONAL RESULTS All passwords much be encrypted and Phone numbers of the call-in locations must be authenticated before allowing connection. PROPOSED SOLUTION Set minimum password length to 10 characters in Account policy dialog box. Grant all agents dial-up access to the RAS server. Configure callback security on RAS server to use the Set By Caller option. Which results does this produce

You are using Performance Monitor to establish a baseline of activity for one of your servers. You have set counters for disk I/O activities and then ran several intensive file access routines to generate the data. When you check back in on Performance Monitor you notice that all the disk counters remained at zero. Why?

Имя:
Пароль:
Забыли пароль?


Регистрация
  Нас более 335 тысяч.
  Присоединяйтесь!

О проекте :: Реклама :: Сотрудничество :: Наши партнеры :: О создателях
TopList Яндекс цитирования