Deck 1: Designing Active Directory Domain Services

Full screen (f)
exit full mode
Question
Fine-grained password policies can be implemented if the domain functional level is set to at least ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
Use Space or
up arrow
down arrow
to flip the card.
Question
SID filtering should be disabled by an automated process.
Question
The ____ for Active Directory defines the objects that can be created in Active Directory.

A) schema
B) directory
C) database
D) template
Question
A ____ is a group of well-connected computers or well-connected subnets.

A) domain
B) site
C) forest
D) trust
Question
For most applications, a single-domain, single-forest design will work.
Question
A ____ trust is granted between several domains without creating explicit trust relationships between the different domains.

A) non-transitive
C) transitive
B) one-way
D) foreign
Question
____ is an Active Directory preparation tool that can modify the schema by adding objects and properties needed to support Windows Server 2008 domain controllers.

A) ADSIEdit
B) ADPrep
C) DCPromo
D) GPUpdate
Question
If you want users or groups to be able to access a resource using SID history, you must enable SID filtering.
Question
A domain functional level or forest functional level can be raised and then undone (or lowered) as necessary.
Question
Forest trusts are possible once the forest functional level has been raised to ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
Question
The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.

A) domain-wide
C) schema-wide
B) tree-wide
D) forest-wide
Question
Fine-grained password and account ____ policies are a significant addition to Windows Server 2008.

A) lockout
B) length
C) timeout
D) login
Question
When selective authentication is implemented on a forest trust, you need to grant the ____ permission on each server or computer where access is granted.

A) Allowed to Authenticate
C) Run as Service
B) Replace Token
D) Act as Part of the Operating System
Question
An Active Directory domain is hosted on a server called a ____.

A) member server
B) domain master
C) domain controller
D) role master
Question
A ____ trust creates an explicit trust relationship between two domains and is not transferred to any other domains.

A) non-transitive
B) transitive
C) one-way
D) foreign
Question
The ____ authentication option can be used to prevent users in another forest from automatically being authenticated.

A) restricted
C) filtered
B) selective
D) one-way
Question
Trusts within a forest are ____ trusts.

A) one-way
B) foreign
C) non-transitive
D) transitive
Question
When you see the forest functional level is Windows Server 2008, you also know that every domain and domain controller in the forest must be running at least ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
Question
In a ____, users in each domain can be granted access to resources in both domains.

A) one-way trust
B) two-way trust
C) foreign trust
D) restricted trust
Question
It's possible to create alternative UPN suffixes and assign these to users in the domain.
Question
List the domain functional levels that a target domain can be operating in when using ADMT v3.1.
Question
A(n) _________________________ is used within a domain to organize objects.
Question
____ is used when objects are migrated between domains in separate forests.

A) Interforest migration
C) Interdomain migration
B) Intraforest migration
D) Intradomain migration
Question
ADMT v3.1 should be installed and run on a Windows Server 2008 domain controller in the ____________________ domain.
Question
Explain the difference between autonomy and isolation.
Question
Access to any resource within the domain is controlled by a(n) ____.

A) Access Control Entity
C) Discretionary Access Control List
B) Discretionary Access Control Object
D) Access Control List
Question
Discuss the security risk of SID history if you are migrating accounts between forests that aren't completely trusted.
Question
You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____

A) netdom query trust
C) netdom query pdc
B) netdom query fsmo
D) netdom query dc
Question
How is the migration of objects handled between domains?
Question
Discuss what happens when SID filtering is disabled.
Question
Discuss the difference between domain controllers and servers when raising the level to Windows Server 2008.
Question
Beyond autonomy, what are two other reasons to create separate domains?
Question
You are designing a plan that will merge two companies and you need to create a forest trust relationship between two forests.What are some considerations you should keep in mind?
Question
____ prevents the risk of an attacker obtaining SID history data by blocking the use of any SIDs that did not originate in the same domain.

A) SID blocking
C) SID masking
B) SID selecting
D) SID filtering
Question
The ADPrep switch ____ is used to prepare the forest for Windows Server 2008 or Windows Server 2008 R2 domain controllers.

A) /ForestBuild
C) /ForestPrep
B) /ForestNew
D) /ForestSelect
Question
An Active Directory ____________________ includes one or more trees comprised of one or more domains.
Question
____________________ is achieved when an organization can independently manage their data.
Question
_________________________ is used when objects are migrated between domains in the same forest.
Question
You can disable SID filtering using the ____ command on the trusting domain.

A) Netdom
C) Wscript
B) Netf
D) Netsh
Question
List the extra steps that must be taken to allow SID history to work between different forests.
Question
List the trusts that can be used to create a trust relationship in order to run ADMT.
Question
Match between columns
Provides independent and exclusive control of a resource
Active Directory domain
Provides independent and exclusive control of a resource
Active Directory tree
Provides independent and exclusive control of a resource
global catalog
Provides independent and exclusive control of a resource
Group Policy
Provides independent and exclusive control of a resource
autonomy
Provides independent and exclusive control of a resource
isolation
Provides independent and exclusive control of a resource
ADMT
Provides independent and exclusive control of a resource
security identifier (SID)
Provides independent and exclusive control of a resource
User Principal Name (UPN)
Is an administrative boundary and holds a database of objects
Active Directory domain
Is an administrative boundary and holds a database of objects
Active Directory tree
Is an administrative boundary and holds a database of objects
global catalog
Is an administrative boundary and holds a database of objects
Group Policy
Is an administrative boundary and holds a database of objects
autonomy
Is an administrative boundary and holds a database of objects
isolation
Is an administrative boundary and holds a database of objects
ADMT
Is an administrative boundary and holds a database of objects
security identifier (SID)
Is an administrative boundary and holds a database of objects
User Principal Name (UPN)
Is used to uniquely identify an object in a domain
Active Directory domain
Is used to uniquely identify an object in a domain
Active Directory tree
Is used to uniquely identify an object in a domain
global catalog
Is used to uniquely identify an object in a domain
Group Policy
Is used to uniquely identify an object in a domain
autonomy
Is used to uniquely identify an object in a domain
isolation
Is used to uniquely identify an object in a domain
ADMT
Is used to uniquely identify an object in a domain
security identifier (SID)
Is used to uniquely identify an object in a domain
User Principal Name (UPN)
Can be used to migrate objects from one domain to another within the same forest or between different forests
Active Directory domain
Can be used to migrate objects from one domain to another within the same forest or between different forests
Active Directory tree
Can be used to migrate objects from one domain to another within the same forest or between different forests
global catalog
Can be used to migrate objects from one domain to another within the same forest or between different forests
Group Policy
Can be used to migrate objects from one domain to another within the same forest or between different forests
autonomy
Can be used to migrate objects from one domain to another within the same forest or between different forests
isolation
Can be used to migrate objects from one domain to another within the same forest or between different forests
ADMT
Can be used to migrate objects from one domain to another within the same forest or between different forests
security identifier (SID)
Can be used to migrate objects from one domain to another within the same forest or between different forests
User Principal Name (UPN)
Is a listing of all the objects in the entire forest
Active Directory domain
Is a listing of all the objects in the entire forest
Active Directory tree
Is a listing of all the objects in the entire forest
global catalog
Is a listing of all the objects in the entire forest
Group Policy
Is a listing of all the objects in the entire forest
autonomy
Is a listing of all the objects in the entire forest
isolation
Is a listing of all the objects in the entire forest
ADMT
Is a listing of all the objects in the entire forest
security identifier (SID)
Is a listing of all the objects in the entire forest
User Principal Name (UPN)
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Active Directory domain
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Active Directory tree
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
global catalog
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Group Policy
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
autonomy
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
isolation
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
ADMT
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
security identifier (SID)
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
User Principal Name (UPN)
Allows a user to log on with an account that looks like an e-mail address
Active Directory domain
Allows a user to log on with an account that looks like an e-mail address
Active Directory tree
Allows a user to log on with an account that looks like an e-mail address
global catalog
Allows a user to log on with an account that looks like an e-mail address
Group Policy
Allows a user to log on with an account that looks like an e-mail address
autonomy
Allows a user to log on with an account that looks like an e-mail address
isolation
Allows a user to log on with an account that looks like an e-mail address
ADMT
Allows a user to log on with an account that looks like an e-mail address
security identifier (SID)
Allows a user to log on with an account that looks like an e-mail address
User Principal Name (UPN)
Includes one or more domains with a common namespace
Active Directory domain
Includes one or more domains with a common namespace
Active Directory tree
Includes one or more domains with a common namespace
global catalog
Includes one or more domains with a common namespace
Group Policy
Includes one or more domains with a common namespace
autonomy
Includes one or more domains with a common namespace
isolation
Includes one or more domains with a common namespace
ADMT
Includes one or more domains with a common namespace
security identifier (SID)
Includes one or more domains with a common namespace
User Principal Name (UPN)
Is the tool used to automate the management and administration of users and computers in the domain
Active Directory domain
Is the tool used to automate the management and administration of users and computers in the domain
Active Directory tree
Is the tool used to automate the management and administration of users and computers in the domain
global catalog
Is the tool used to automate the management and administration of users and computers in the domain
Group Policy
Is the tool used to automate the management and administration of users and computers in the domain
autonomy
Is the tool used to automate the management and administration of users and computers in the domain
isolation
Is the tool used to automate the management and administration of users and computers in the domain
ADMT
Is the tool used to automate the management and administration of users and computers in the domain
security identifier (SID)
Is the tool used to automate the management and administration of users and computers in the domain
User Principal Name (UPN)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Designing Active Directory Domain Services
1
Fine-grained password policies can be implemented if the domain functional level is set to at least ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
D
2
SID filtering should be disabled by an automated process.
False
3
The ____ for Active Directory defines the objects that can be created in Active Directory.

A) schema
B) directory
C) database
D) template
A
4
A ____ is a group of well-connected computers or well-connected subnets.

A) domain
B) site
C) forest
D) trust
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
For most applications, a single-domain, single-forest design will work.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ trust is granted between several domains without creating explicit trust relationships between the different domains.

A) non-transitive
C) transitive
B) one-way
D) foreign
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is an Active Directory preparation tool that can modify the schema by adding objects and properties needed to support Windows Server 2008 domain controllers.

A) ADSIEdit
B) ADPrep
C) DCPromo
D) GPUpdate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
If you want users or groups to be able to access a resource using SID history, you must enable SID filtering.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
A domain functional level or forest functional level can be raised and then undone (or lowered) as necessary.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Forest trusts are possible once the forest functional level has been raised to ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ authentication option allows Windows to automatically authenticate any users in another forest to access resources in the local forest.

A) domain-wide
C) schema-wide
B) tree-wide
D) forest-wide
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Fine-grained password and account ____ policies are a significant addition to Windows Server 2008.

A) lockout
B) length
C) timeout
D) login
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
When selective authentication is implemented on a forest trust, you need to grant the ____ permission on each server or computer where access is granted.

A) Allowed to Authenticate
C) Run as Service
B) Replace Token
D) Act as Part of the Operating System
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
An Active Directory domain is hosted on a server called a ____.

A) member server
B) domain master
C) domain controller
D) role master
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ trust creates an explicit trust relationship between two domains and is not transferred to any other domains.

A) non-transitive
B) transitive
C) one-way
D) foreign
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ authentication option can be used to prevent users in another forest from automatically being authenticated.

A) restricted
C) filtered
B) selective
D) one-way
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Trusts within a forest are ____ trusts.

A) one-way
B) foreign
C) non-transitive
D) transitive
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
When you see the forest functional level is Windows Server 2008, you also know that every domain and domain controller in the forest must be running at least ____.

A) Windows NT
B) Windows Server 2000 Native
C) Windows Server 2003
D) Windows Server 2008
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
In a ____, users in each domain can be granted access to resources in both domains.

A) one-way trust
B) two-way trust
C) foreign trust
D) restricted trust
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
It's possible to create alternative UPN suffixes and assign these to users in the domain.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
List the domain functional levels that a target domain can be operating in when using ADMT v3.1.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) _________________________ is used within a domain to organize objects.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
____ is used when objects are migrated between domains in separate forests.

A) Interforest migration
C) Interdomain migration
B) Intraforest migration
D) Intradomain migration
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
ADMT v3.1 should be installed and run on a Windows Server 2008 domain controller in the ____________________ domain.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Explain the difference between autonomy and isolation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Access to any resource within the domain is controlled by a(n) ____.

A) Access Control Entity
C) Discretionary Access Control List
B) Discretionary Access Control Object
D) Access Control List
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Discuss the security risk of SID history if you are migrating accounts between forests that aren't completely trusted.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
You can easily determine what servers hold all the roles by opening a command prompt and entering the following command: ____

A) netdom query trust
C) netdom query pdc
B) netdom query fsmo
D) netdom query dc
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
How is the migration of objects handled between domains?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Discuss what happens when SID filtering is disabled.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Discuss the difference between domain controllers and servers when raising the level to Windows Server 2008.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Beyond autonomy, what are two other reasons to create separate domains?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
You are designing a plan that will merge two companies and you need to create a forest trust relationship between two forests.What are some considerations you should keep in mind?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ prevents the risk of an attacker obtaining SID history data by blocking the use of any SIDs that did not originate in the same domain.

A) SID blocking
C) SID masking
B) SID selecting
D) SID filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The ADPrep switch ____ is used to prepare the forest for Windows Server 2008 or Windows Server 2008 R2 domain controllers.

A) /ForestBuild
C) /ForestPrep
B) /ForestNew
D) /ForestSelect
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
An Active Directory ____________________ includes one or more trees comprised of one or more domains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ is achieved when an organization can independently manage their data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
_________________________ is used when objects are migrated between domains in the same forest.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
You can disable SID filtering using the ____ command on the trusting domain.

A) Netdom
C) Wscript
B) Netf
D) Netsh
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
List the extra steps that must be taken to allow SID history to work between different forests.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List the trusts that can be used to create a trust relationship in order to run ADMT.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Provides independent and exclusive control of a resource
Active Directory domain
Provides independent and exclusive control of a resource
Active Directory tree
Provides independent and exclusive control of a resource
global catalog
Provides independent and exclusive control of a resource
Group Policy
Provides independent and exclusive control of a resource
autonomy
Provides independent and exclusive control of a resource
isolation
Provides independent and exclusive control of a resource
ADMT
Provides independent and exclusive control of a resource
security identifier (SID)
Provides independent and exclusive control of a resource
User Principal Name (UPN)
Is an administrative boundary and holds a database of objects
Active Directory domain
Is an administrative boundary and holds a database of objects
Active Directory tree
Is an administrative boundary and holds a database of objects
global catalog
Is an administrative boundary and holds a database of objects
Group Policy
Is an administrative boundary and holds a database of objects
autonomy
Is an administrative boundary and holds a database of objects
isolation
Is an administrative boundary and holds a database of objects
ADMT
Is an administrative boundary and holds a database of objects
security identifier (SID)
Is an administrative boundary and holds a database of objects
User Principal Name (UPN)
Is used to uniquely identify an object in a domain
Active Directory domain
Is used to uniquely identify an object in a domain
Active Directory tree
Is used to uniquely identify an object in a domain
global catalog
Is used to uniquely identify an object in a domain
Group Policy
Is used to uniquely identify an object in a domain
autonomy
Is used to uniquely identify an object in a domain
isolation
Is used to uniquely identify an object in a domain
ADMT
Is used to uniquely identify an object in a domain
security identifier (SID)
Is used to uniquely identify an object in a domain
User Principal Name (UPN)
Can be used to migrate objects from one domain to another within the same forest or between different forests
Active Directory domain
Can be used to migrate objects from one domain to another within the same forest or between different forests
Active Directory tree
Can be used to migrate objects from one domain to another within the same forest or between different forests
global catalog
Can be used to migrate objects from one domain to another within the same forest or between different forests
Group Policy
Can be used to migrate objects from one domain to another within the same forest or between different forests
autonomy
Can be used to migrate objects from one domain to another within the same forest or between different forests
isolation
Can be used to migrate objects from one domain to another within the same forest or between different forests
ADMT
Can be used to migrate objects from one domain to another within the same forest or between different forests
security identifier (SID)
Can be used to migrate objects from one domain to another within the same forest or between different forests
User Principal Name (UPN)
Is a listing of all the objects in the entire forest
Active Directory domain
Is a listing of all the objects in the entire forest
Active Directory tree
Is a listing of all the objects in the entire forest
global catalog
Is a listing of all the objects in the entire forest
Group Policy
Is a listing of all the objects in the entire forest
autonomy
Is a listing of all the objects in the entire forest
isolation
Is a listing of all the objects in the entire forest
ADMT
Is a listing of all the objects in the entire forest
security identifier (SID)
Is a listing of all the objects in the entire forest
User Principal Name (UPN)
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Active Directory domain
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Active Directory tree
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
global catalog
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
Group Policy
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
autonomy
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
isolation
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
ADMT
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
security identifier (SID)
Provides independence, allowing a department or group to make decisions based on their own needs within the organization
User Principal Name (UPN)
Allows a user to log on with an account that looks like an e-mail address
Active Directory domain
Allows a user to log on with an account that looks like an e-mail address
Active Directory tree
Allows a user to log on with an account that looks like an e-mail address
global catalog
Allows a user to log on with an account that looks like an e-mail address
Group Policy
Allows a user to log on with an account that looks like an e-mail address
autonomy
Allows a user to log on with an account that looks like an e-mail address
isolation
Allows a user to log on with an account that looks like an e-mail address
ADMT
Allows a user to log on with an account that looks like an e-mail address
security identifier (SID)
Allows a user to log on with an account that looks like an e-mail address
User Principal Name (UPN)
Includes one or more domains with a common namespace
Active Directory domain
Includes one or more domains with a common namespace
Active Directory tree
Includes one or more domains with a common namespace
global catalog
Includes one or more domains with a common namespace
Group Policy
Includes one or more domains with a common namespace
autonomy
Includes one or more domains with a common namespace
isolation
Includes one or more domains with a common namespace
ADMT
Includes one or more domains with a common namespace
security identifier (SID)
Includes one or more domains with a common namespace
User Principal Name (UPN)
Is the tool used to automate the management and administration of users and computers in the domain
Active Directory domain
Is the tool used to automate the management and administration of users and computers in the domain
Active Directory tree
Is the tool used to automate the management and administration of users and computers in the domain
global catalog
Is the tool used to automate the management and administration of users and computers in the domain
Group Policy
Is the tool used to automate the management and administration of users and computers in the domain
autonomy
Is the tool used to automate the management and administration of users and computers in the domain
isolation
Is the tool used to automate the management and administration of users and computers in the domain
ADMT
Is the tool used to automate the management and administration of users and computers in the domain
security identifier (SID)
Is the tool used to automate the management and administration of users and computers in the domain
User Principal Name (UPN)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.