Term
This service is required to use the runas feature |
|
Definition
|
|
Term
This command-line tool can be used to move an object from one OU to another |
|
Definition
|
|
Term
This tool is used to move objects from one domain to another |
|
Definition
Active Directory Migration Tool |
|
|
Term
Hackers will use this attack to identify a user's password by trying numerous words and word combinations until they find a match |
|
Definition
|
|
Term
When you create this item do not use words from the dictionary |
|
Definition
|
|
Term
This can be used to run a single command using administrative privileges while logging onto a workstation or server using a Domain User account |
|
Definition
|
|
Term
This can be used for authentication in lieu of a password when used with an ATM or a smart card |
|
Definition
personal identification number (PIN) |
|
|
Term
Use this tool to grant authority to a user or group of users over a portion of the Active Directory tree |
|
Definition
Delegation of Control Wizard |
|
|
Term
This method of moving objects from one OU to another was introduced in Windows Server 2003 |
|
Definition
|
|
Term
A dictionary attack is one type of this attack |
|
Definition
|
|
Term
Which interface allows you to grant limited permissions within Active Directory to individual users or groups to adhere to a principle of least privilege in administering Active Directory? a. Delegation of Authority Wizard b. Delegation of Control Wizard c. Control Wizard d. Authority Wizard |
|
Definition
Delegation of Control Wizard
The Delegation of Control Wizard within the Active Directory Users and Computers MMC snap-in allows you to delegate permissions to perform a number of preconfigured tasks, as well as create custom tasks to be delegated |
|
|
Term
Which program allows you to use the Secondary Logon service to launch individual programs and utilities using administrative privileges? a. Runas b. Wscript c. Cscript d. Secwiz |
|
Definition
Runas
You can run a program using alternate credentials from the GUI by using the right-click context menu or from the command line by using runas.exe |
|
|
Term
Which command-line utility can be used to move an Active Directory object from one container to another? a. Dsget b. Dsrm c. Dsmove d. Adm |
|
Definition
Dsmove
Use the dsmove.exe utility to quickly and efficiently move Active Directory objects from a command prompt or within a script |
|
|
Term
What is a numeric or alphanumeric character sequence that you enter with a smart card to access a server or other Active Directory resource? a. Personal Identification Number (PIN) b. Password Identification Number (PIN) c. Smart card password d. Smart card identifier |
|
Definition
Personal Identification Number (PIN)
When the necessary PKI infrastructure has been deployed, you can deploy smart card devices that can be used with a PIN to enable two-factor authentication in an Active Directory environment. |
|
|
Term
What is a password that has sufficient length and complexity that it is difficult for a hacker or other malicious user to hack? a. Long password b. Smart card password c. Strong password d. Personal identification password |
|
Definition
Strong Password
A strong password is one that is created adhering to a minimum password length and is of a sufficient complexity that it is resistant to password-cracking attacks |
|
|
Term
Which service enables you to use the runas command-line utility? a. Secondary Service b. Secondary Logon c. Runas Service d. Alternate Credentials Service |
|
Definition
Secondary Logon
The Secondary Logon service in Windows allows you to use runas or the Run as administrator GUI option to launch individual executables using alternate credentials |
|
|
Term
What is the recommended method for moving Active Directory objects from one domain to another? a. Movetree.exe b. Dsmove c. Active Directory Migration Tool (ADMT) d. Drag-and-drop |
|
Definition
Active Directory Migration Tool (ADMT)
When moving objects from one Active Directory domain to another, the supported mechanism is the Active Directory Migration Tool (ADMT), a free download from the Microsoft Website |
|
|
Term
Which password-cracking attack functions by attempting every possible combination of alphanumeric characters until it finds a match? a. Trojan horse b. Dictionary attack c. Rootkit d. Boot virus |
|
Definition
Dictionary Attack
A dictionary attack is an automated password-cracking tool. Its effectiveness can be minimized by the use of strong passwords that are changed on a regular basis |
|
|
Term
What is a new GUI option in Windows Server 2008 and Windows Vista that allows you to launch a specific application using elevated privileges? a. Delegation of Control Wizard b. Active Directory Administrative Credentials c. Run as Administrator d. Delegation of Privilege Wizard |
|
Definition
Run as Administrator
Windows Server 2008 and Windows Vista gives you the ability to right-click a particular program and select Run as administrator, which allows you to log on to a computer as a non-administrative user and elevate your privileges only when it is specifically required |
|
|
Term
With a username, what is needed to access network resources in a default Active Directory environment? a. Password b. Access Token c. Smart card d. PIN |
|
Definition
Password
In a default Active Directory environment, logons are processed using a username and password combination. In an environment where smart card authentication has been enabled, this can be supplemented or replaced by the use of smart cards and PINs, but this capability is not present in an out-of-the-box Active Directory installation |
|
|