Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CNIT 242 Exam 1 || Comprehensive Actual Questions & Verified Answers (A+ Guide Solution)||, Exams of Information Technology

CNIT 242 Exam 1 || Comprehensive Actual Questions & Verified Answers (A+ Guide Solution)|| Guaranteed Pass

Typology: Exams

2024/2025

Available from 07/14/2025

DoctorFaith
DoctorFaith 🇺🇸

5

(5)

877 documents

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download CNIT 242 Exam 1 || Comprehensive Actual Questions & Verified Answers (A+ Guide Solution)|| and more Exams Information Technology in PDF only on Docsity!

What is the purpose of roaming profiles Roaming profile advantages Roaming profile disadvantages how do you set a password policy What is an ideal password policy How are roaming profiles set up allows for the user to always have a consistent environment as changes are always made i. Always up to dateii. Available anywhere with access to network share i. Increase logon/logoff timeii. Versioning issues if the users logs into multiple clients simultaneouslyiii. The copy of the profile remains on the client after logoff Group policy management > create a new GPO > Edit the GPO > computer configuration > windows settings > security settings > account policies > password policy force periodic changes, disallow last # of passwords, mix case, non alpha characters Group policy management > Edit GPO > computer config > policies > administrative templates > system > user profiles > right click 'set roaming profile path for all users logging onto What is the difference between a site and a domain a. Forest: single instance of active directoryi. Within a forest you can have multipledomains CNIT 242 exam 7 What is the difference between a tree and a forest What is a local profile what is a mandatory profile what is a roaming profile this computer’ then Edit > enable in properties > enter the path a. Domain: collection of objects thatshare the same databaseb. Site: represent the physical structureor topology of your network. A collectionof well connected sub nets ii. Two or more trees that don't share a contiguous namespaceb. Tree: collection of domains that share a contiguous namespace basic type of profilei. Purpose: accounts on stand alone computer a read only profile assigned to an accounti. Purpose: used for accounts associated with specific tasks users profile stored is stored on a network sharei. Purpose: consistent environment as changes are always available What is the purpose of DDNS Directory naming conventions WINS- windows internet naming system NETBIOS - 15 user defined characters What is the relationship between group policy and organizational units Browser opens a connection to server using IP address providedvi. Browser displays requested page on computer screen i. Method of automatically updating aname server in the Domain Name System C - CountryO - OrganizationOU - Organizational UnitCN - Common Name Provides central mapping of host names to network addressesProcess:Host registers itself with a WINS server Asks WINS server for the network address by using the station's NetBIOS name - Eliminates the need to broadcast 4 types of NetBIOS name resolutions: B-node (0x0) BroadcastP-node (0x2) Peers (WINS)M-node (0x4) Mixed (Broadcast then WINS)H-node (0x8) Hybrid (WINS then Broadcast) a. Group policy: set of rules which control the working environment of user accounts and computer accountsb. Organizational unit: smallest scope orunit to which you a. provides centralized management andconfiguration of operating systems, ap- CNIT 242 exam 7 What is the purpose of group policy What order is Group policy applied How are group policy conflicts resolved What are rights? can assign group policysettings or delegate administrative authority plications and users settings in the active directory a. Local policyb. Site policyc. Domain policyd. OU policy a. If parent GPO has a value for settingand a child does noti. Child inherits parents GPO in fullb. If a parent GPO has a value for asetting and a child GPO has a non- conflicting value for the same settingi. Child inherits parents GPO in full andapplies its own alsoc. Parent GPO has a value for a settingand child GPO has conflicting value forsame settingi. Child inherits GPO but the conflictingsetting on the child overwrites the inherited values a. logon capabilities: can be denied togroups or usersi. Done with GPM What is the purpose of active directory? What is the purpose of replication? What is LDAP? Explain domain trust relationships What is FQDN? transferand update methods are inadequate a. Microsoft's network directory. Centralrepository of networked device information for querying, updating, and authenticating against the data b. process by which the changes thatare made on one domain controller aresynchronized with all other domain controllers in the domain or forest that storecopies of the same information c. open, vendor neutral, industry standard application protocol for accessingand maintaining distributed directory information services over an internet protocol network a. a way to allow users from a trusteddomain to access services in a trustingdomain.b. If a user or application is authenticatedby one domain, its authentication is accepted by all other domains that trust theauthenticating domain. Fully qualified domain name, is a domain name that specifies its exact location in CNIT 242 exam 7 the tree hierarchy of the domain name system What is pruning and grafting? What is Kerberos How does Kerberos work? What three servers are required for Kerberos What is the difference between a GPO that is enabled and enforced? Objects can be easily moved from one location to anotheri. Items in the directory can be moved to new locations in the directory a. strong network authentication protocolfor client/ server application i. Admins create realms that will encompass all that is available to accessii. The client, lives within the realm, as well as the service or house you want to request and the key distribution center iii. 2 messages, one decrypt-able and one notiv. KDC stores all of the secret keys for user machines and services in its database one authentication server, one ticket granting server, at least one application server b. Enabled: group policy is linked to theOU - policy apples to objects within OUc. Enforced: policy cannot be overwrittenby another policy