Exam 7: Managing Ous and Active Directory Accounts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How often is the password for a computer account changed by Active Directory?​

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

C

What different types of objects can be members of a distribution group?

Free
(Essay)
4.8/5
(29)
Correct Answer:
Verified

User accounts,contacts,other distribution groups,security groups,and computers can be members of distribution groups.

​The Administrator account should not be re-named,but should at least used a secure password.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

What special identity group is used when a user accesses an FTP server that doesn't require user account logon?​

(Multiple Choice)
5.0/5
(36)

​An explicit "allow" permission will override an inherited "deny" permission.

(True/False)
4.8/5
(36)

Which statement is true regarding the use of the Logon Hours option under a user's account?

(Multiple Choice)
4.8/5
(34)

What is a downlevel user logon name used for?​

(Multiple Choice)
4.9/5
(45)

​What is the most typically used group type conversion?

(Multiple Choice)
4.8/5
(37)

How can an administrator enable or disable accounts using the command line?​

(Multiple Choice)
4.8/5
(39)

Select the true statement regarding the conversion of group scope:​

(Multiple Choice)
4.8/5
(40)

​The _____________ determines the reach of a group's application in a domain or forest: which security principals in a forest can be group members and to which forest resources a group can be assigned rights or permissions.

(Short Answer)
4.9/5
(37)

Select the special character below that can't be used within a username:​

(Multiple Choice)
4.9/5
(42)

The _____________ cmdlet within PowerShell can be used to rename an object in Active Directory.​

(Short Answer)
4.8/5
(36)

​Select below the built-in group that facilitates anonymous access to web resources by Internet Information Services

(Multiple Choice)
4.8/5
(37)

In a single domain environment,what is the Microsoft recommended best practice for assigning access to resources?

(Essay)
4.7/5
(36)

How can the output of a command be redirected to a file instead of being displayed on screen?​

(Multiple Choice)
4.9/5
(37)

​After a template account has been created,what can be done to ensure that the template account does not pose a security risk?

(Multiple Choice)
4.9/5
(37)

Permission inheritance can be configured such that permissions are only inherited by specific types of child object types.​

(True/False)
4.9/5
(32)

When a user leaves a company,why is it preferable to disable the user rather than delete the user?

(Essay)
4.8/5
(40)

How does piping work on the command line?

(Essay)
4.8/5
(35)
Showing 1 - 20 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)