Chapter 5 Key Terms

  1. __________ is a technology created by Microsoft that provides a variety of network services, including the following:
    • LDAP
    • Kerberos-based and single sign-on authentication
    • DNS-based naming and other network information
    • A central location for network administration and delegation of authority
    Active Directory
  2. Windows has default groups called __________. These default groups are granted specific rights and permissions to get you started. Various built-in groups are as follows:
    built-in group
  3. Windows __________ provide a means for authenticating and auditing a computer’s access to a Windows network and access to domain resources.
    computer account
  4. A __________ stores, organizes, and provides access to information in a directory. __________ are used for locating, managing, administering, and organizing common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects.
    directory service
  5. A __________ is used only for nonsecurity functions, such as distributing email, and it cannot be used to assign rights and permissions.
    distribution group
  6. A __________ is a Windows server that stores a replica of the account and security information for the domain and defines the domain boundaries.
    domain controller
  7. __________: contains global groups and universal groups, even though it can also contain user accounts and other domain local groups. It is usually in the domain with the resource to which you want to assign permissions
    or rights.
    domain local group
  8. In today’s networks, you assign logical addresses, such as with IP addressing. Unfortunately, these addresses tend to be hard to remember, especially in the case of newer, more complicated IPv6 addresses. Therefore, you need to use some form of naming service that will allow you to translate logical names, which are easier to remember, into logical addresses. The most common naming service is __________.
    Domain Name System (DNS)
  9. __________ services to automatically assign IP addresses and related parameters (including subnet mask and default gateway and length of the lease) so that a host can immediately communicate on an IP network when it starts.
    Dynamic Host Configuration Protocol (DHCP)
  10. because there are certain functions that can be handled by only one domain controller at a time, Active Directory uses __________ roles, also known as operations master roles.
    Flexible Single Master Operations (FSMO) roles
  11. A __________ is made of one or more trees (although most people think of a forest as two or more trees).
    forest
  12. A __________ describes the exact position of a host with the
    DNS hierarchy. Examples include the following:
    • www.microsoft.com
    • technet.microsoft.com
    • server1.sales.microsoft.com
    fully qualified domain name (FQDN)
  13. The __________ of a domain or forest depends on which Windows Server operating system versions are running on the domain controllers in that domain or forest.
    functional level
  14. A __________global catalog replicates the information of every object in a tree and forest. However, instead of storing the entire object, it stores just those attributes that are most frequently used in search operations, such as a user’s first and last name, computer name, and so forth.
    global catalog
  15. __________:  can contain user accounts and other global groups. Global
    groups are designed to be “global” for the domain. After you place user accounts into global groups, the global groups are typically placed into domain local groups or local groups.
    global group
  16. A __________ is a collection or list of user accounts or computer accounts.
    group
  17. __________ is one of the most powerful features of Active Directory that controls the working environment for user accounts and computer accounts.
    group policy
  18. The __________ can be edited and is ready to use.
    hosts file
  19. The__________ is an application protocol for querying and modifying data using directory services running over TCP/IP
    Lightweight Directory Access Protocol (LDAP)
  20. A server that is not running as a domain controller is known as a __________.
    member server
  21. An __________ is a distinct, named set of attributes or characteristics that represent a network resource
    object
  22. To help organize objects within a domain and minimize the number of domains you require, you can use __________, commonly known as OUs.
    organizational unit
  23. A __________ defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute.
    permission
  24. A __________ authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or backing up files and directories on a system.
    right
  25. A ___________ is used to assign rights and permissions and gain access to network resources. It can also be used as a distribution group.
    security group
  26. A __________ is one or more IP subnets that are connected by a high-speed link, typically defined by a geographical location
    site
  27. A __________ is made of one or more domains (although most people think of a __________ as two or more domains) with contiguous name space.
    tree
  28. To allow users in one domain to access resources in another domain, Active Directory uses __________.
    trust relationship
  29. __________: This group scope is designed to contain global groups from multiple
    domains.
    universal group
  30. A __________ enables a user to log on to a computer and domain. As a result, it can used to prove the identity of a user, and this information can then be used to determine what a user can access and what kind of access he or she will have (authorization).
    user account
  31. Another name resolution technology is __________, which translates from NetBIOS (computer name) to specify a network resource.
    Windows Internet Name Service (WINS)
Author
Blake.Barnett
ID
337485
Card Set
Chapter 5 Key Terms
Description
Windows Server Administration Fundamentals
Updated