1. ACL
    Access Control List: A list of all security descriptors that have been set up for a particular object, such as for a shared folder or a shred printer.
  2. Bridgehead Server
    A domain controller at each AD site with access to a site network link, which is designated as the DC to exchange replication information. There is only on e bridgehead server per site.
  3. Container
    An AD object that houses other objects, such as a tree that houses domains or a domain that houses organizational units.
  4. Contiguous Namespace
    A namespace in which every child object has a portion of its name fom its parent object.
  5. Directory Service
    A large container (dbs) of network data and resources, such as computers, printer, useraccounts, and user groups, that enables management and fast access to those resources.
  6. Disjointed Namespace
    A namespace in which the child object name does not resemble the parent object name
  7. Distribution Group
    A list of users that enables one e-mail message to be sent to all users on the list. A distribution group is not used for secureity and thus cannot appear in an access control list (ACL)
  8. DC
    Domain Controller: A Windows Server 03 or 08 server that contains a full copy of the AD information, is used to add a new object to AD, and replicates all changes made to it so the changes are updated on every DC in the same domain.
  9. Domain Function Level
    Refers to the Windows Server operating systems on domain controllers and the domain-specific functions they support. Depending on the functional level, one, two, or all of the flollowing operating systems are supported: Windows 2000, 03, & 08 Servers.
  10. Domain Local Security Group
    A group that is used to manage resources--shared folders and printers, for example--in its home domain, and that is primarily used to give global groups access to those resources.
  11. Forest
    A grouping of AD trees that each have contiguous namespaces within their own domain structure, but that have disjointed namespaces between trees. The trees and their domains use the same schema and global catalog.
  12. Forest Functional Level
    A forest-wide setting that refers to the types of domain controllers in a forest, which can be any combination of Win 00, 03, 08 Servers. The level also reflects the types of AD services and functions supported.
  13. Global Catalog
    A repository for all objects and the most frequently used attributes for each object in all domains. Each forest has a single global catalog that can be replicated onto multiple servers.
  14. Global Security Group
    A group that typically contains user accounts from its home domain, and that is a member of domain local groups in the same or other domains, so as to give that global group's member accounts access to the resources defined to the domain local groups.
  15. GUID
    Globally Unique Identifier: a unique number, up to 16 characters long, that is associated with an AD object.
  16. Kerberos Transitive Trust Relationship
    A set of two-way trusts between two or more domains (or forests in a forest trust) in which Kerberos security is used.
  17. Local Security Group
    A group of user accounts that is used to manage resources on a standalone computer
  18. Local User Profile
    A desktop setup that is associated with one or more accounts to determine what startup programs are used, additional desktop icons, and other customizations. A user profile is local to the computer in which it is stored.
  19. Mandatory User Profile
    A user profile set up by the server administrator that is loaded from the server to the client each time the user logs on; changes that the user makes to the profile are not saved.
  20. Member Server
    A server on an AD managed network that is not installed to have AD.
  21. Multimaster Replication
    Win Server 03 and 08 networks can have multiple servers called DC's that store AD information and replicate it to each other. Because each DC acts as a master, replication does not stop when one DC is down and updates to AD continue, for example creating a new account.
  22. Name Resolution
    A process used to translate a computer's logical or host name into a network address, such as to a dotted decimal address associated with a computer--and vice versa.
  23. Namespace
    A logical area on a network that contains directory services and named objects, and that has the ability to perform name resolution.
  24. Object
    A network resource, such as a server or a user account, that has distinct attributes or properties, is defined in a domain, and exists in AD.
  25. OU
    Organizational Unit: A grouping of objects within a domain that provides a means to establish specific policies for governing those objects, and that enables object management to be delegated.
  26. RODC
    Read-Only Domain Controller: A domain controller that houses AD information, but cannot be updated, such as to create a new account. This specialized domain controller receives updates from regular DC's, but does not replicate to any DCs because it is read-only by design.
  27. Roaming Profile
    Desktop settings that are associated with an account so that the same settings are employed no matter which computer is used to access the account (the profile is downloaded to the client from a server).
  28. Schema
    Elements used in the definition of each object contained in AD, including the object class and its attributes.
  29. Scope
    Scope of Influence: the reach of a type of group, such as access to resources in a single domain or access to all resources in all domains in a forest. (another meaning for the term scope is the beginning through ending IP addresses defined in a DHCP server for use by DHCP clients.
  30. Security Group
    Used to assign a group of users permission to access network resources.
  31. Site
    An option in AD to interconnect IP subnets so that the server can determine the fastest route to connect clients for authentication and to connect DCs for replication of AD. Site information also enables AD to create redundant routes for DC replication.
  32. Transitive Trust
    A trust relationship between two or more domains in a tree, in which each domain has access to objects in the others.
  33. Tree
    Related domains that use a contiguous namespace, share the same schema, and have two-way transitive trust relationship.
  34. Two-Way Trust
    A domain relationship in which both domains are trusted and trusting, enabling one to have access to objects in the other.
  35. Universal Security Group
    A group that is used to provide access to resources in any domain within a forest. A common implementation is to make global groups that contain accounts members of a universal group that has access to resources.
Card Set
Windos Server 2008 Ch 4, Palmer